[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.063708][ T26] audit: type=1800 audit(1572786753.669:25): pid=8572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.097676][ T26] audit: type=1800 audit(1572786753.669:26): pid=8572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.147660][ T26] audit: type=1800 audit(1572786753.669:27): pid=8572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.32' (ECDSA) to the list of known hosts. 2019/11/03 13:12:44 fuzzer started 2019/11/03 13:12:45 dialing manager at 10.128.0.26:46619 2019/11/03 13:12:53 syscalls: 2567 2019/11/03 13:12:53 code coverage: enabled 2019/11/03 13:12:53 comparison tracing: enabled 2019/11/03 13:12:53 extra coverage: extra coverage is not supported by the kernel 2019/11/03 13:12:53 setuid sandbox: enabled 2019/11/03 13:12:53 namespace sandbox: enabled 2019/11/03 13:12:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 13:12:53 fault injection: enabled 2019/11/03 13:12:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 13:12:53 net packet injection: enabled 2019/11/03 13:12:53 net device setup: enabled 2019/11/03 13:12:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 13:13:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x246, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000250700"/20, @ANYRES32=0x0, @ANYBLOB="c11d00000000000008001f0002000000140012000c000100626f6e640000000004000200"], 0x3c}}, 0x0) 13:13:58 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) syzkaller login: [ 145.424704][ T8742] IPVS: ftp: loaded support on port[0] = 21 [ 145.602008][ T8742] chnl_net:caif_netlink_parms(): no params data found [ 145.625783][ T8745] IPVS: ftp: loaded support on port[0] = 21 [ 145.674888][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.683713][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.692035][ T8742] device bridge_slave_0 entered promiscuous mode [ 145.709416][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.716510][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state 13:13:58 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000006c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x7}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 145.726084][ T8742] device bridge_slave_1 entered promiscuous mode [ 145.782798][ T8742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 145.803646][ T8742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.865152][ T8742] team0: Port device team_slave_0 added [ 145.888626][ T8742] team0: Port device team_slave_1 added 13:13:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) [ 146.001922][ T8742] device hsr_slave_0 entered promiscuous mode [ 146.068977][ T8742] device hsr_slave_1 entered promiscuous mode 13:13:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 146.204627][ T8747] IPVS: ftp: loaded support on port[0] = 21 [ 146.244946][ T8745] chnl_net:caif_netlink_parms(): no params data found [ 146.255064][ T8749] IPVS: ftp: loaded support on port[0] = 21 [ 146.366591][ T8752] IPVS: ftp: loaded support on port[0] = 21 [ 146.414259][ T8745] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.438363][ T8745] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.446075][ T8745] device bridge_slave_0 entered promiscuous mode 13:13:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0xfd54) [ 146.481143][ T8745] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.490013][ T8745] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.500766][ T8745] device bridge_slave_1 entered promiscuous mode [ 146.558065][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.565300][ T8742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.573287][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.580386][ T8742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.626846][ T8745] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.643665][ T8745] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.675899][ T3062] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.698026][ T3062] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.790332][ T8745] team0: Port device team_slave_0 added [ 146.797975][ T8745] team0: Port device team_slave_1 added [ 146.815466][ T8756] IPVS: ftp: loaded support on port[0] = 21 [ 146.823497][ T8747] chnl_net:caif_netlink_parms(): no params data found [ 146.900313][ T8745] device hsr_slave_0 entered promiscuous mode [ 146.958108][ T8745] device hsr_slave_1 entered promiscuous mode [ 147.007848][ T8745] debugfs: Directory 'hsr0' with parent '/' already present! [ 147.015675][ T8749] chnl_net:caif_netlink_parms(): no params data found [ 147.085607][ T8752] chnl_net:caif_netlink_parms(): no params data found [ 147.156877][ T8752] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.164240][ T8752] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.173980][ T8752] device bridge_slave_0 entered promiscuous mode [ 147.195113][ T8747] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.202659][ T8747] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.210933][ T8747] device bridge_slave_0 entered promiscuous mode [ 147.218456][ T8752] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.225527][ T8752] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.233786][ T8752] device bridge_slave_1 entered promiscuous mode [ 147.269960][ T8747] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.277034][ T8747] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.286507][ T8747] device bridge_slave_1 entered promiscuous mode [ 147.300604][ T8752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.310071][ T8749] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.317121][ T8749] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.325653][ T8749] device bridge_slave_0 entered promiscuous mode [ 147.333386][ T8749] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.340517][ T8749] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.348554][ T8749] device bridge_slave_1 entered promiscuous mode [ 147.374568][ T8752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.407799][ T8752] team0: Port device team_slave_0 added [ 147.422420][ T8742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.442224][ T8752] team0: Port device team_slave_1 added [ 147.457081][ T8747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.473140][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.482624][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.492710][ T8749] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.503357][ T8749] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.543719][ T8747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.561875][ T8742] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.649612][ T8752] device hsr_slave_0 entered promiscuous mode [ 147.687945][ T8752] device hsr_slave_1 entered promiscuous mode [ 147.737799][ T8752] debugfs: Directory 'hsr0' with parent '/' already present! [ 147.756361][ T8749] team0: Port device team_slave_0 added [ 147.772953][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.781991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.790538][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.797659][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.805435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.814210][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.822857][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.830089][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.855275][ T8749] team0: Port device team_slave_1 added [ 147.863081][ T8756] chnl_net:caif_netlink_parms(): no params data found [ 147.894435][ T8747] team0: Port device team_slave_0 added [ 147.905700][ T8747] team0: Port device team_slave_1 added [ 147.970477][ T8747] device hsr_slave_0 entered promiscuous mode [ 148.008086][ T8747] device hsr_slave_1 entered promiscuous mode [ 148.057782][ T8747] debugfs: Directory 'hsr0' with parent '/' already present! [ 148.075852][ T8756] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.083668][ T8756] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.092094][ T8756] device bridge_slave_0 entered promiscuous mode [ 148.103549][ T8756] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.111242][ T8756] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.119476][ T8756] device bridge_slave_1 entered promiscuous mode [ 148.140984][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.183894][ T8756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 148.196327][ T8756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 148.235549][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.247972][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.256556][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.266207][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.278725][ T8756] team0: Port device team_slave_0 added [ 148.311289][ T8749] device hsr_slave_0 entered promiscuous mode [ 148.358103][ T8749] device hsr_slave_1 entered promiscuous mode [ 148.417737][ T8749] debugfs: Directory 'hsr0' with parent '/' already present! [ 148.449347][ T8756] team0: Port device team_slave_1 added [ 148.456518][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.465174][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.474308][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.484049][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.492797][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.501189][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.520695][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.543720][ T8745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.620883][ T8756] device hsr_slave_0 entered promiscuous mode [ 148.668213][ T8756] device hsr_slave_1 entered promiscuous mode [ 148.707729][ T8756] debugfs: Directory 'hsr0' with parent '/' already present! [ 148.762998][ T8742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.772865][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.781903][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.801980][ T8745] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.837427][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.852166][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.861994][ T3062] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.869160][ T3062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.877472][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.948729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.957343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.971545][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.978681][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.997690][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.006319][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.015081][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.024368][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.033731][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.042495][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.051064][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.059476][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.078440][ T8747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.096619][ T8752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.108316][ T8745] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.120401][ T8745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.152188][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.161665][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.174195][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.211375][ T8768] device bond1 entered promiscuous mode [ 149.217463][ T8768] 8021q: adding VLAN 0 to HW filter on device bond1 [ 149.235514][ T8747] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.248394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 13:14:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x246, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000250700"/20, @ANYRES32=0x0, @ANYBLOB="c11d00000000000008001f0002000000140012000c000100626f6e640000000004000200"], 0x3c}}, 0x0) [ 149.256199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.281952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.290104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.299966][ T8752] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.326230][ T8745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.363968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.378955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.388395][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.395453][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.403448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.412456][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.421420][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.428562][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.436319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.445456][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.454262][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.461390][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.485370][ T8772] device bond2 entered promiscuous mode [ 149.492737][ T8772] 8021q: adding VLAN 0 to HW filter on device bond2 [ 149.519922][ T8749] 8021q: adding VLAN 0 to HW filter on device bond0 13:14:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x246, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000250700"/20, @ANYRES32=0x0, @ANYBLOB="c11d00000000000008001f0002000000140012000c000100626f6e640000000004000200"], 0x3c}}, 0x0) [ 149.535913][ T8756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.547446][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.564656][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.590827][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.608248][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.617051][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.631537][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.640459][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.651860][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.660346][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.667402][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.675131][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.683980][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.693089][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.715864][ T8749] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.735521][ T8781] device bond3 entered promiscuous mode [ 149.744805][ T8781] 8021q: adding VLAN 0 to HW filter on device bond3 [ 149.756124][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.778646][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.787262][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 13:14:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x246, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000250700"/20, @ANYRES32=0x0, @ANYBLOB="c11d00000000000008001f0002000000140012000c000100626f6e640000000004000200"], 0x3c}}, 0x0) [ 149.796222][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.804969][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.813705][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.822472][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.831265][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.840091][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.850076][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.862352][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.873123][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.883819][ T8754] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.891113][ T8754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.900729][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.908799][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.920834][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.929621][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.938666][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.946948][ T2523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.962734][ T8756] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.984298][ T8785] device bond4 entered promiscuous mode [ 149.990498][ T8785] 8021q: adding VLAN 0 to HW filter on device bond4 [ 149.999961][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.011948][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.028342][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.036183][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.045397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.054055][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.061185][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.069570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 13:14:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x80006040045010, &(0x7f0000000140)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000040)='./file0\x00') [ 150.106379][ T8752] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.121124][ T8752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.158006][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.166560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.203047][ C0] hrtimer: interrupt took 25187 ns 13:14:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) [ 150.228060][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.235156][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.256406][ T8794] Process accounting resumed [ 150.261793][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:14:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x80006040045010, &(0x7f0000000140)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000040)='./file0\x00') [ 150.273615][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.283162][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.290317][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.298888][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.317797][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 13:14:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) [ 150.326796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.336083][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.346271][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.407057][ T8749] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 150.446628][ T8799] Process accounting resumed 13:14:03 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x80006040045010, &(0x7f0000000140)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000040)='./file0\x00') [ 150.451241][ T8749] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.462244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.505694][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.523549][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.536749][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.551879][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.563368][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.572516][ T8806] Process accounting resumed [ 150.575630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.591890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.602466][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.615008][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.623812][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.632403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.643794][ T8747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.667240][ T8756] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 150.678262][ T8756] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.703527][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.711946][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.720218][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.728914][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.737188][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.745986][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.754404][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.762692][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.771553][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.781522][ T8752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.816800][ T8749] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.860717][ T8756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.972892][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 150.972907][ T26] audit: type=1804 audit(1572786843.579:31): pid=8825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir886538960/syzkaller.dChjSC/0/bus" dev="sda1" ino=16529 res=1 [ 151.079152][ T26] audit: type=1804 audit(1572786843.639:32): pid=8825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir886538960/syzkaller.dChjSC/0/bus" dev="sda1" ino=16529 res=1 13:14:03 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000006c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x7}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:14:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 13:14:03 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) [ 151.276303][ T26] audit: type=1804 audit(1572786843.879:33): pid=8843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir886538960/syzkaller.dChjSC/1/bus" dev="sda1" ino=16539 res=1 13:14:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0xfd54) 13:14:04 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x80006040045010, &(0x7f0000000140)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000040)='./file0\x00') 13:14:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:04 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000006c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x7}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:14:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 13:14:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 151.490644][ T26] audit: type=1804 audit(1572786844.019:34): pid=8852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir886538960/syzkaller.dChjSC/2/bus" dev="sda1" ino=16543 res=1 13:14:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:04 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000006c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x7}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:14:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 13:14:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0xfd54) [ 151.619400][ T8853] Process accounting resumed 13:14:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 151.729381][ T26] audit: type=1804 audit(1572786844.339:35): pid=8872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir886538960/syzkaller.dChjSC/3/bus" dev="sda1" ino=16519 res=1 13:14:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) 13:14:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2, 0x0, 0x7}]}}, &(0x7f0000003580)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 13:14:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0xfd54) 13:14:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) [ 152.037365][ T8893] BPF:[1] FWD (anon) 13:14:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 152.088531][ T8893] BPF:struct [ 152.103188][ T8893] BPF: [ 152.129213][ T8893] BPF:vlen != 0 [ 152.160615][ T8893] BPF: [ 152.160615][ T8893] 13:14:04 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) [ 152.205541][ T8906] BPF:[1] FWD (anon) [ 152.224725][ T8906] BPF:struct 13:14:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75b3e8983e00bcab45dbe99b974e73d9bd34f20a4b675ce3b9cfa8e06df3062b129abe2bb06d133df1733c9fc76db0df8b06df44752d227031c2d562fa9893c052ec89ca350de98458e140dabcf1b6bcdd0d0000000000002c1315aaf622b629beca1f709d78afe6542ed3ef9c58d8cb250a6578e4c2d46b2f7c1e5127574b8dbb620d23dbf15c53b92b4b4b6b7ce626ebac9a4366afb40bb0c85b65087f8c9d8bfe0e7443377da1937602036e635f325caadc5fab515a37bf684d2762ecaed38ef378083c786bf97a71ccf2a8fec92f491eacec5ada642518b7d7606b8824cc3aaa29efb831722aaf2d80b506c415c87df499e1882337179d6659a365105cdf8139c40b4cfea83dc20f8de33f78fa7acc5b035607276d0a9f1605dbfc247b88a1ff0d9758a4cb4e308f4ca3fdeede979fa91104cf46152e82850ef7a532e32a51b8ee2a0d7c553960f609155e4de19a87e01460f86611102ae6d1c331e6ef20c93f30595b"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) [ 152.294838][ T8906] BPF: [ 152.316633][ T8906] BPF:vlen != 0 13:14:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) [ 152.345380][ T8906] BPF: [ 152.345380][ T8906] 13:14:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) 13:14:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 13:14:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2, 0x0, 0x7}]}}, &(0x7f0000003580)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 13:14:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 13:14:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) 13:14:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) [ 152.666508][ T8934] BPF:[1] FWD (anon) 13:14:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) [ 152.700828][ T8934] BPF:struct [ 152.704075][ T8934] BPF: [ 152.706846][ T8934] BPF:vlen != 0 [ 152.747362][ T8934] BPF: [ 152.747362][ T8934] 13:14:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 13:14:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2, 0x0, 0x7}]}}, &(0x7f0000003580)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 13:14:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:05 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) 13:14:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) [ 153.091623][ T8958] BPF:[1] FWD (anon) 13:14:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) [ 153.123695][ T8958] BPF:struct [ 153.136741][ T8958] BPF: [ 153.145784][ T8958] BPF:vlen != 0 [ 153.155547][ T8958] BPF: [ 153.155547][ T8958] 13:14:05 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) 13:14:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2, 0x0, 0x7}]}}, &(0x7f0000003580)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 13:14:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x4008ae6a, &(0x7f0000000300)={0x2, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 13:14:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000180)) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 13:14:06 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x15, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) dup2(r0, r1) socket$vsock_stream(0x28, 0x1, 0x0) 13:14:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) [ 153.532633][ T8983] BPF:[1] FWD (anon) [ 153.543398][ T8983] BPF:struct [ 153.546708][ T8983] BPF: [ 153.554119][ T8983] BPF:vlen != 0 [ 153.561232][ T8983] BPF: [ 153.561232][ T8983] 13:14:06 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x1, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$NBD_SET_SIZE(r0, 0xab01, 0x0) [ 153.606310][ T8987] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:14:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2e020200) semget(0x2, 0x1, 0x200) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) [ 153.734568][ T8995] block nbd2: Receive control failed (result -22) [ 153.767504][ T8995] block nbd2: shutting down sockets [ 153.777998][ T8995] 13:14:06 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x1, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$NBD_SET_SIZE(r0, 0xab01, 0x0) [ 153.780361][ T8995] ============================================ [ 153.786510][ T8995] WARNING: possible recursive locking detected [ 153.792665][ T8995] 5.4.0-rc5-next-20191031 #0 Not tainted [ 153.798288][ T8995] -------------------------------------------- [ 153.804447][ T8995] kworker/u5:1/8995 is trying to acquire lock: [ 153.810682][ T8995] ffff88808b688d28 ((wq_completion)knbd2-recv){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 153.815128][ T4002] kobject: 'loop2' (00000000370b1322): kobject_uevent_env [ 153.820236][ T8995] [ 153.820236][ T8995] but task is already holding lock: [ 153.820241][ T8995] ffff88808b688d28 ((wq_completion)knbd2-recv){+.+.}, at: process_one_work+0x88b/0x1740 [ 153.820268][ T8995] [ 153.820268][ T8995] other info that might help us debug this: [ 153.820271][ T8995] Possible unsafe locking scenario: [ 153.820271][ T8995] [ 153.820273][ T8995] CPU0 [ 153.820275][ T8995] ---- [ 153.820276][ T8995] lock((wq_completion)knbd2-recv); [ 153.820282][ T8995] lock((wq_completion)knbd2-recv); [ 153.820287][ T8995] [ 153.820287][ T8995] *** DEADLOCK *** [ 153.820287][ T8995] [ 153.820290][ T8995] May be due to missing lock nesting notation [ 153.820290][ T8995] [ 153.820297][ T8995] 3 locks held by kworker/u5:1/8995: [ 153.820299][ T8995] #0: ffff88808b688d28 ((wq_completion)knbd2-recv){+.+.}, at: process_one_work+0x88b/0x1740 [ 153.820319][ T8995] #1: ffff888065d77dc0 ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 153.820344][ T8995] #2: ffff8880a3694978 (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock+0x56/0x90 [ 153.837289][ T4002] kobject: 'loop2' (00000000370b1322): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 153.844495][ T8995] [ 153.844495][ T8995] stack backtrace: [ 153.844509][ T8995] CPU: 0 PID: 8995 Comm: kworker/u5:1 Not tainted 5.4.0-rc5-next-20191031 #0 [ 153.844515][ T8995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.844529][ T8995] Workqueue: knbd2-recv recv_work [ 153.844535][ T8995] Call Trace: [ 153.844552][ T8995] dump_stack+0x172/0x1f0 [ 153.844573][ T8995] __lock_acquire.cold+0x15d/0x385 [ 153.981929][ T8995] ? mark_held_locks+0xf0/0xf0 [ 153.986674][ T8995] lock_acquire+0x190/0x410 [ 153.991159][ T8995] ? flush_workqueue+0xf7/0x14c0 [ 153.996081][ T8995] flush_workqueue+0x126/0x14c0 [ 154.000914][ T8995] ? flush_workqueue+0xf7/0x14c0 [ 154.005835][ T8995] ? lock_downgrade+0x920/0x920 [ 154.010662][ T8995] ? drain_workqueue+0x2b/0x3d0 [ 154.015490][ T8995] ? debug_check_no_obj_freed+0x20a/0x43f [ 154.021188][ T8995] ? find_held_lock+0x35/0x130 [ 154.025932][ T8995] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 154.031822][ T8995] ? mark_lock+0xc2/0x1220 [ 154.036222][ T8995] drain_workqueue+0x1b4/0x3d0 [ 154.040964][ T8995] ? drain_workqueue+0x1b4/0x3d0 [ 154.045878][ T8995] ? kfree+0x226/0x2c0 [ 154.049928][ T8995] destroy_workqueue+0x74/0x6a0 [ 154.054757][ T8995] ? nbd_config_put+0x378/0x870 [ 154.059587][ T8995] nbd_config_put+0x3dd/0x870 [ 154.064245][ T8995] recv_work+0x19b/0x200 [ 154.068468][ T8995] process_one_work+0x9af/0x1740 [ 154.073384][ T8995] ? pwq_dec_nr_in_flight+0x320/0x320 [ 154.078734][ T8995] ? lock_acquire+0x190/0x410 [ 154.083394][ T8995] worker_thread+0x98/0xe40 [ 154.087873][ T8995] ? trace_hardirqs_on+0x67/0x240 [ 154.092877][ T8995] kthread+0x361/0x430 [ 154.096923][ T8995] ? process_one_work+0x1740/0x1740 [ 154.102098][ T8995] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 154.107796][ T8995] ret_from_fork+0x24/0x30 [ 154.120841][ T8980] kobject: 'kvm' (000000000ccf6816): kobject_uevent_env [ 154.128718][ T4002] kobject: 'loop0' (000000007755a168): kobject_uevent_env [ 154.128792][ T9000] kobject: '9p-6' (0000000023d5ab96): kobject_add_internal: parent: 'bdi', set: 'devices' [ 154.143600][ T4002] kobject: 'loop0' (000000007755a168): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 154.160987][ T9007] kobject: '9p-7' (00000000dd913945): kobject_add_internal: parent: 'bdi', set: 'devices' [ 154.165174][ T8980] kobject: 'kvm' (000000000ccf6816): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 154.171317][ T9007] kobject: '9p-7' (00000000dd913945): kobject_uevent_env [ 154.188272][ T9007] kobject: '9p-7' (00000000dd913945): fill_kobj_path: path = '/devices/virtual/bdi/9p-7' [ 154.224798][ T9000] kobject: '9p-6' (0000000023d5ab96): kobject_uevent_env 13:14:06 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) [ 154.258555][ T9000] kobject: '9p-6' (0000000023d5ab96): fill_kobj_path: path = '/devices/virtual/bdi/9p-6' [ 154.276668][ T8742] kobject: '9p-7' (00000000dd913945): kobject_uevent_env [ 154.279850][ T8987] kobject: 'kvm' (000000000ccf6816): kobject_uevent_env [ 154.289356][ T8742] kobject: '9p-7' (00000000dd913945): fill_kobj_path: path = '/devices/virtual/bdi/9p-7' 13:14:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') sendfile(r3, r3, &(0x7f0000000340)=0x74000200, 0x5) [ 154.305088][ T8987] kobject: 'kvm' (000000000ccf6816): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 154.307886][ T8742] kobject: '9p-7' (00000000dd913945): kobject_cleanup, parent 00000000852ba692 [ 154.324799][ T8742] kobject: '9p-7' (00000000dd913945): calling ktype release [ 154.333601][ T8742] kobject: '9p-7': free name [ 154.346808][ T8745] kobject: '9p-6' (0000000023d5ab96): kobject_uevent_env 13:14:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2e020200) semget(0x2, 0x1, 0x200) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) 13:14:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000180)) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 13:14:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000180)) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 154.353501][ T8987] kobject: 'kvm' (000000000ccf6816): kobject_uevent_env [ 154.361864][ T8987] kobject: 'kvm' (000000000ccf6816): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 154.365328][ T8745] kobject: '9p-6' (0000000023d5ab96): fill_kobj_path: path = '/devices/virtual/bdi/9p-6' [ 154.372739][ T4002] kobject: 'loop4' (00000000b00e6d7a): kobject_uevent_env [ 154.388852][ T8745] kobject: '9p-6' (0000000023d5ab96): kobject_cleanup, parent 00000000852ba692 [ 154.418688][ T8745] kobject: '9p-6' (0000000023d5ab96): calling ktype release [ 154.424372][ T4002] kobject: 'loop4' (00000000b00e6d7a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 154.435764][ T8745] kobject: '9p-6': free name [ 154.454031][ T4002] kobject: 'loop5' (00000000c72651c0): kobject_uevent_env [ 154.473164][ T4002] kobject: 'loop5' (00000000c72651c0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 154.497449][ T4002] kobject: 'loop3' (00000000a9459b37): kobject_uevent_env [ 154.507350][ T4002] kobject: 'loop3' (00000000a9459b37): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:14:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2e020200) semget(0x2, 0x1, 0x200) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) [ 154.520918][ T9024] base_sock_release(0000000008975afb) sk=0000000009dd2ef1 [ 154.532257][ T4002] kobject: 'loop0' (000000007755a168): kobject_uevent_env [ 154.544385][ T4002] kobject: 'loop0' (000000007755a168): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 154.562455][ T9024] base_sock_release(0000000030b2a67d) sk=00000000b844d436 [ 154.585004][ T4002] kobject: 'loop1' (0000000031d94247): kobject_uevent_env [ 154.604988][ T4002] kobject: 'loop1' (0000000031d94247): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 154.615193][ T9032] kobject: '9p-8' (00000000559b8f68): kobject_add_internal: parent: 'bdi', set: 'devices' [ 154.615461][ T9032] kobject: '9p-8' (00000000559b8f68): kobject_uevent_env 13:14:07 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) 13:14:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2e020200) semget(0x2, 0x1, 0x200) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) [ 154.657937][ T9032] kobject: '9p-8' (00000000559b8f68): fill_kobj_path: path = '/devices/virtual/bdi/9p-8' [ 154.697101][ T9034] base_sock_release(000000004cf4669c) sk=000000000696f0fa 13:14:07 executing program 1: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) [ 154.714725][ T4002] kobject: 'loop4' (00000000b00e6d7a): kobject_uevent_env [ 154.726307][ T4002] kobject: 'loop4' (00000000b00e6d7a): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:14:07 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) [ 154.755788][ T8745] kobject: '9p-8' (00000000559b8f68): kobject_uevent_env [ 154.771344][ T8745] kobject: '9p-8' (00000000559b8f68): fill_kobj_path: path = '/devices/virtual/bdi/9p-8' [ 154.783160][ T4002] kobject: 'loop0' (000000007755a168): kobject_uevent_env [ 154.792653][ T4002] kobject: 'loop0' (000000007755a168): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:14:07 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) [ 154.792836][ T8745] kobject: '9p-8' (00000000559b8f68): kobject_cleanup, parent 00000000852ba692 [ 154.804387][ T9041] base_sock_release(00000000a5f71d4b) sk=00000000b6e40c3c [ 154.815031][ T8745] kobject: '9p-8' (00000000559b8f68): calling ktype release [ 154.842834][ T8745] kobject: '9p-8': free name [ 154.863444][ T4002] kobject: 'loop0' (000000007755a168): kobject_uevent_env [ 154.870807][ T4002] kobject: 'loop0' (000000007755a168): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 154.878088][ T9044] base_sock_release(000000008534e8b3) sk=00000000e9223ba4 [ 154.907865][ T4002] kobject: 'loop4' (00000000b00e6d7a): kobject_uevent_env [ 154.915026][ T4002] kobject: 'loop4' (00000000b00e6d7a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 154.954300][ T4002] kobject: 'loop1' (0000000031d94247): kobject_uevent_env [ 154.962495][ T4002] kobject: 'loop1' (0000000031d94247): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 154.976999][ T4002] kobject: 'loop0' (000000007755a168): kobject_uevent_env [ 154.986917][ T4002] kobject: 'loop0' (000000007755a168): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 154.998243][ T9048] base_sock_release(000000002d8be786) sk=000000005388e8c7 [ 155.022010][ T4002] kobject: 'loop1' (0000000031d94247): kobject_uevent_env [ 155.029240][ T4002] kobject: 'loop1' (0000000031d94247): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 155.246911][ T4002] kobject: 'loop5' (00000000c72651c0): kobject_uevent_env [ 155.256443][ T4002] kobject: 'loop5' (00000000c72651c0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 155.283980][ T4002] kobject: 'loop3' (00000000a9459b37): kobject_uevent_env [ 155.291460][ T4002] kobject: 'loop3' (00000000a9459b37): fill_kobj_path: path = '/devices/virtual/block/loop3'