[ 73.918255][ T26] audit: type=1800 audit(1565488175.363:27): pid=10157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 73.938931][ T26] audit: type=1800 audit(1565488175.363:28): pid=10157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 74.498461][ T26] audit: type=1800 audit(1565488176.053:29): pid=10157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 74.518717][ T26] audit: type=1800 audit(1565488176.053:30): pid=10157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.193' (ECDSA) to the list of known hosts. 2019/08/11 01:49:45 fuzzer started 2019/08/11 01:49:47 dialing manager at 10.128.0.26:40261 2019/08/11 01:49:48 syscalls: 2487 2019/08/11 01:49:48 code coverage: enabled 2019/08/11 01:49:48 comparison tracing: enabled 2019/08/11 01:49:48 extra coverage: extra coverage is not supported by the kernel 2019/08/11 01:49:48 setuid sandbox: enabled 2019/08/11 01:49:48 namespace sandbox: enabled 2019/08/11 01:49:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/11 01:49:48 fault injection: enabled 2019/08/11 01:49:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/11 01:49:48 net packet injection: enabled 2019/08/11 01:49:48 net device setup: enabled 01:51:13 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 01:51:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63db500000020000000ed69d2bc70ec82f411fcbef537cebc82c2de96aa10aeaa6f16b5d8679c282acc38bbe9cad0", 0x2f) syzkaller login: [ 171.582923][T10326] IPVS: ftp: loaded support on port[0] = 21 [ 171.713051][T10329] IPVS: ftp: loaded support on port[0] = 21 [ 171.723167][T10326] chnl_net:caif_netlink_parms(): no params data found [ 171.795913][T10326] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.804568][T10326] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.813068][T10326] device bridge_slave_0 entered promiscuous mode [ 171.824520][T10326] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.832213][T10326] bridge0: port 2(bridge_slave_1) entered disabled state 01:51:13 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460200000009e2c73593"], 0xd) sendfile(r0, r0, &(0x7f00000000c0), 0x7fffffff) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 171.841087][T10326] device bridge_slave_1 entered promiscuous mode [ 171.892021][T10326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.916216][T10326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.932228][T10329] chnl_net:caif_netlink_parms(): no params data found [ 171.973061][T10326] team0: Port device team_slave_0 added [ 171.981571][T10326] team0: Port device team_slave_1 added [ 172.020211][T10329] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.027308][T10329] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.036237][T10329] device bridge_slave_0 entered promiscuous mode 01:51:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x210282, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) connect$pppoe(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, {0x0, @random="c20525a067d9", 'ip6tnl0\x00'}}, 0x1e) r3 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) link(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) kexec_load(0x0, 0x7, &(0x7f0000000cc0)=[{0x0, 0x0, 0x800}, {&(0x7f0000000780)="984ae03960489e9ba7cef02575b615835247639bdc8c1e815ccb61fac9a9f8b126139757402f9586850ccd5162418fe2a112377c47fd6a655fc672af3c3e37bd31f1b430bd00d8518cb97e9f8c2c3766f5392dd08153", 0x56, 0x2}, {&(0x7f0000000800)}, {&(0x7f0000000900)="6d3894b159b5f936746f52478c709862c079f7c93c7e026e6dc49001909e61f23b2b903ea6c5a75908", 0x29, 0x0, 0xa4}, {&(0x7f0000000140)="38964303e6386ce478e68844fe57f5ebcc99d260ee7c38436d49985fd6b435", 0x1f, 0x9, 0x401}, {0x0, 0x0, 0x5f38, 0x401}, {0x0, 0x0, 0x0, 0x10001}], 0x0) sendfile(r2, r2, 0x0, 0x40fdf) timerfd_create(0x6, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x1000) r4 = gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="2c01000037010002010000000065000000000000000000002ae516b1327bf324ccf65e54e3d315e3a6f898217e18ab7cdc1e6e03ff59e6de70cc2be80e014f452b04c76b308c49f4cbe77f9ad34198b2aa93f0e7c3624a3f185253087816a973d67d4e042f1050c1", @ANYRES32=r4], 0x6c) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x9, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x0, 0xffffffff, 0x7ff, 0x41, &(0x7f0000000040)=""/65, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x7, 0x6, 0x8}, &(0x7f0000000100)=0xdede, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}, 0x10) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)) [ 172.061084][T10332] IPVS: ftp: loaded support on port[0] = 21 [ 172.111535][T10326] device hsr_slave_0 entered promiscuous mode 01:51:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003a00)=[{{0x0, 0x231, &(0x7f0000001380)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000080), 0x3e0) [ 172.308613][T10326] device hsr_slave_1 entered promiscuous mode [ 172.330309][T10329] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.337397][T10329] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.347086][T10329] device bridge_slave_1 entered promiscuous mode [ 172.362997][T10334] IPVS: ftp: loaded support on port[0] = 21 [ 172.392764][T10336] IPVS: ftp: loaded support on port[0] = 21 [ 172.405804][T10326] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.412972][T10326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.420729][T10326] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.427847][T10326] bridge0: port 1(bridge_slave_0) entered forwarding state 01:51:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000070], [0xc1]}) [ 172.458052][T10329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.491376][T10329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.564330][T10329] team0: Port device team_slave_0 added [ 172.594954][T10329] team0: Port device team_slave_1 added [ 172.699801][T10329] device hsr_slave_0 entered promiscuous mode [ 172.748633][T10329] device hsr_slave_1 entered promiscuous mode [ 172.788808][T10329] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.799456][T10326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.812847][T10334] chnl_net:caif_netlink_parms(): no params data found [ 172.832259][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.839780][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.849889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 172.876822][T10339] IPVS: ftp: loaded support on port[0] = 21 [ 172.884840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.893487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.926754][T10326] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.965726][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.974578][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.983040][ T2850] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.990087][ T2850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.010867][T10336] chnl_net:caif_netlink_parms(): no params data found [ 173.037809][T10332] chnl_net:caif_netlink_parms(): no params data found [ 173.049764][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.058587][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.066942][ T2850] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.074049][ T2850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.082216][T10334] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.089458][T10334] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.097127][T10334] device bridge_slave_0 entered promiscuous mode [ 173.108068][T10334] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.115273][T10334] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.123066][T10334] device bridge_slave_1 entered promiscuous mode [ 173.146023][T10334] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.174418][T10334] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.184858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.194017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.202897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.211330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.220355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.261701][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.270695][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.293753][T10332] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.301868][T10332] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.309879][T10332] device bridge_slave_0 entered promiscuous mode [ 173.324227][T10334] team0: Port device team_slave_0 added [ 173.332500][T10334] team0: Port device team_slave_1 added [ 173.339727][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.348050][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.356654][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.365297][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.378773][T10332] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.385862][T10332] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.394008][T10332] device bridge_slave_1 entered promiscuous mode [ 173.414534][T10336] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.421690][T10336] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.429727][T10336] device bridge_slave_0 entered promiscuous mode [ 173.437478][T10336] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.444652][T10336] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.452650][T10336] device bridge_slave_1 entered promiscuous mode [ 173.460705][T10326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.503995][T10336] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.515749][T10332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.528343][T10332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.599845][T10334] device hsr_slave_0 entered promiscuous mode [ 173.648611][T10334] device hsr_slave_1 entered promiscuous mode [ 173.708618][T10334] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.718500][T10336] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.782826][T10332] team0: Port device team_slave_0 added [ 173.795612][T10332] team0: Port device team_slave_1 added [ 173.811554][T10339] chnl_net:caif_netlink_parms(): no params data found [ 173.835727][T10334] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.844737][T10334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.852105][T10334] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.859406][T10334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.895401][T10339] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.904487][T10339] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.912339][T10339] device bridge_slave_0 entered promiscuous mode [ 173.919830][T10340] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.932375][T10340] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.944620][T10336] team0: Port device team_slave_0 added [ 174.000537][T10332] device hsr_slave_0 entered promiscuous mode [ 174.048703][T10332] device hsr_slave_1 entered promiscuous mode [ 174.088285][T10332] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.099265][T10329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.110607][T10339] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.117680][T10339] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.125947][T10339] device bridge_slave_1 entered promiscuous mode [ 174.134598][T10336] team0: Port device team_slave_1 added [ 174.173958][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.182935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.194194][T10339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.204903][T10339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.217239][T10326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.271359][T10336] device hsr_slave_0 entered promiscuous mode [ 174.309956][T10336] device hsr_slave_1 entered promiscuous mode [ 174.348312][T10336] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.363442][T10329] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.404395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.413894][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.422841][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.429946][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.438313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.446845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.455595][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.462687][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.470926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.496349][T10339] team0: Port device team_slave_0 added [ 174.502821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.511838][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.530701][T10334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.548387][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.557036][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.565952][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.574460][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.583023][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.591705][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.599883][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.608068][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.616968][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.635959][T10339] team0: Port device team_slave_1 added [ 174.653796][T10334] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.662375][T10329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.680115][T10332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.687263][T10342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.695578][T10342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.761328][T10339] device hsr_slave_0 entered promiscuous mode [ 174.798609][T10339] device hsr_slave_1 entered promiscuous mode [ 174.838595][T10339] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.857937][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.875088][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 01:51:16 executing program 0: 01:51:16 executing program 0: [ 174.900047][T10340] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.907161][T10340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.935459][T10332] 8021q: adding VLAN 0 to HW filter on device team0 01:51:16 executing program 0: 01:51:16 executing program 0: [ 174.987024][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.996481][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.007963][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.015083][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.027111][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 01:51:16 executing program 0: [ 175.044580][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.061563][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.069730][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.081708][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 01:51:16 executing program 0: [ 175.091602][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.102926][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.113664][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.123041][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 01:51:16 executing program 0: [ 175.138998][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.148550][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.181740][T10336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.204593][T10334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.216778][T10334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.228763][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.237365][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.246080][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.253188][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.261170][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.270032][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.278518][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.285592][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.293942][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.302417][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.310761][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.319874][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.338066][T10336] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.350211][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.359209][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.367554][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.376314][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.384049][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.391721][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.400221][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.408681][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.417221][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.425918][ T2850] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.434549][ T2850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.442134][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.450418][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.462014][T10329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.485408][T10334] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.493476][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.511157][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.531347][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.538483][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.546788][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.555712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.572126][T10332] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.582701][T10332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.597617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.606654][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.615354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.624372][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.633171][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.641623][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.649835][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.657551][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.681862][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.691122][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.717835][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.727330][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.736489][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.752994][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.764404][T10336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.790385][T10332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.846573][T10336] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.883918][T10339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.884120][T10382] sg_write: data in/out 2097116/1 bytes for SCSI command 0xd8-- guessing data in; [ 175.884120][T10382] program syz-executor.1 not setting count and/or reply_len properly [ 175.907831][T10339] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.922874][T10342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.935145][T10342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:51:17 executing program 1: [ 175.949382][T10386] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 175.999924][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.039425][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.048047][ T2850] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.057170][ T2850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.088493][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.097424][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.106215][ T2850] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.113294][ T2850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.121052][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.129976][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.138996][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.156734][T10339] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 176.167645][T10339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.202506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.224436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.253263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.270081][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.289743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.298916][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.316234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.330079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.348614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.367654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.387627][T10339] 8021q: adding VLAN 0 to HW filter on device batadv0 01:51:18 executing program 1: 01:51:18 executing program 0: 01:51:18 executing program 4: 01:51:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x210282, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) connect$pppoe(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, {0x0, @random="c20525a067d9", 'ip6tnl0\x00'}}, 0x1e) r3 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) link(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) kexec_load(0x0, 0x7, &(0x7f0000000cc0)=[{0x0, 0x0, 0x800}, {&(0x7f0000000780)="984ae03960489e9ba7cef02575b615835247639bdc8c1e815ccb61fac9a9f8b126139757402f9586850ccd5162418fe2a112377c47fd6a655fc672af3c3e37bd31f1b430bd00d8518cb97e9f8c2c3766f5392dd08153", 0x56, 0x2}, {&(0x7f0000000800)}, {&(0x7f0000000900)="6d3894b159b5f936746f52478c709862c079f7c93c7e026e6dc49001909e61f23b2b903ea6c5a75908", 0x29, 0x0, 0xa4}, {&(0x7f0000000140)="38964303e6386ce478e68844fe57f5ebcc99d260ee7c38436d49985fd6b435", 0x1f, 0x9, 0x401}, {0x0, 0x0, 0x5f38, 0x401}, {0x0, 0x0, 0x0, 0x10001}], 0x0) sendfile(r2, r2, 0x0, 0x40fdf) timerfd_create(0x6, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x1000) r4 = gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="2c01000037010002010000000065000000000000000000002ae516b1327bf324ccf65e54e3d315e3a6f898217e18ab7cdc1e6e03ff59e6de70cc2be80e014f452b04c76b308c49f4cbe77f9ad34198b2aa93f0e7c3624a3f185253087816a973d67d4e042f1050c1", @ANYRES32=r4], 0x6c) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x9, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x0, 0xffffffff, 0x7ff, 0x41, &(0x7f0000000040)=""/65, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x7, 0x6, 0x8}, &(0x7f0000000100)=0xdede, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}, 0x10) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)) 01:51:18 executing program 2: 01:51:18 executing program 5: 01:51:18 executing program 5: 01:51:18 executing program 4: 01:51:18 executing program 1: 01:51:18 executing program 0: 01:51:18 executing program 2: 01:51:18 executing program 5: 01:51:18 executing program 0: setresuid(0x0, 0xee01, 0x0) r0 = semget$private(0x0, 0x3, 0x0) semctl$SETVAL(r0, 0x0, 0x10, 0x0) 01:51:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) setgid(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 01:51:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") capset(&(0x7f0000000140), 0x0) 01:51:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000108], [0xc1]}) 01:51:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000071, 0x4b565a00, 0x1b], [0xc1]}) 01:51:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r2) rt_tgsigqueueinfo(r2, r2, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x2, 0x81032, r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x100000c, 0x0) 01:51:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, 0x0) getegid() semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) seccomp(0x0, 0x2, &(0x7f0000007ff0)={0x0, 0x0}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}]}, 0x20}, 0x1, 0x0, 0x0, 0x4001}, 0x4800) inotify_init() socket$inet6(0xa, 0x80000, 0xfffffffffffffe04) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='netdevsim0\x00', 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x2000005) 01:51:19 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb3532da1f23a262055223e7a3a62f15eeb8060dc9cfa30e6783757ae2f0ac6ed75d3212591ccd", 0x27d}], 0x1}, 0x0) 01:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0xc0010117, 0x0, 0xc0000080], [0xc1]}) [ 177.619710][ C1] hrtimer: interrupt took 24471 ns [ 177.619722][T10461] kvm [10457]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 01:51:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d25a0f87b9eb0300cd8000"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f33"], 0x0, 0x59}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 01:51:19 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x27d}], 0x1}, 0x0) 01:51:19 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) link(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x40fdf) timerfd_create(0x0, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYRES32], 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x9, 0x4) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 01:51:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000021], [0xc1]}) [ 177.759921][T10456] kvm [10454]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 177.824581][T10481] ptrace attach of "/root/syz-executor.0"[10479] was attempted by "/root/syz-executor.0"[10481] 01:51:19 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460200000009e2c7359322"], 0xe) sendfile(r0, r0, &(0x7f00000000c0), 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 01:51:19 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0x40000080000100, 0x0, 0x0, 0x0) 01:51:19 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x27d}], 0x1}, 0x0) 01:51:19 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x0) read$alg(r0, &(0x7f00000000c0)=""/19, 0x13) [ 178.076317][T10326] WARNING: CPU: 0 PID: 10326 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 178.085136][T10326] Kernel panic - not syncing: panic_on_warn set ... [ 178.091735][T10326] CPU: 0 PID: 10326 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 178.100923][T10326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.111013][T10326] Call Trace: [ 178.114314][T10326] dump_stack+0x172/0x1f0 [ 178.118756][T10326] ? __blkdev_put+0x5d0/0x810 [ 178.123449][T10326] panic+0x2dc/0x755 [ 178.127353][T10326] ? add_taint.cold+0x16/0x16 [ 178.132056][T10326] ? __kasan_check_write+0x14/0x20 [ 178.134824][ T3880] kobject: 'loop1' (000000001fffe351): kobject_uevent_env [ 178.137184][T10326] ? __warn.cold+0x5/0x4c [ 178.137198][T10326] ? __warn+0xe7/0x1e0 [ 178.137214][T10326] ? __blkdev_put+0x6ba/0x810 [ 178.137234][T10326] __warn.cold+0x20/0x4c [ 178.146472][ T3880] kobject: 'loop1' (000000001fffe351): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 178.148658][T10326] ? __kasan_check_read+0x11/0x20 [ 178.148675][T10326] ? __blkdev_put+0x6ba/0x810 [ 178.148689][T10326] report_bug+0x263/0x2b0 [ 178.148705][T10326] do_error_trap+0x11b/0x200 [ 178.148720][T10326] do_invalid_op+0x37/0x50 [ 178.148731][T10326] ? __blkdev_put+0x6ba/0x810 [ 178.148747][T10326] invalid_op+0x23/0x30 [ 178.148767][T10326] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 178.169454][ T3880] kobject: 'loop3' (0000000000d1082f): kobject_uevent_env [ 178.171925][T10326] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 90 5d e6 ff e9 13 fd ff ff e8 46 6f ab ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 57 5d e6 ff e9 6a fa ff ff 48 8b [ 178.171934][T10326] RSP: 0018:ffff88808ef2fc90 EFLAGS: 00010293 [ 178.171946][T10326] RAX: ffff8880995f0080 RBX: ffff8880a2c4e1c0 RCX: ffffffff81c6a4c4 [ 178.171953][T10326] RDX: 0000000000000000 RSI: ffffffff81c6a9ea RDI: 0000000000000005 [ 178.171970][T10326] RBP: ffff88808ef2fd88 R08: ffff8880995f0080 R09: ffffed1014589c3c [ 178.182490][ T3880] kobject: 'loop3' (0000000000d1082f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.186134][T10326] R10: ffff88808ef2fc80 R11: ffff8880a2c4e1df R12: 0000000000000002 [ 178.186142][T10326] R13: dffffc0000000000 R14: ffff8880a2c4e1d8 R15: ffff8880a2c4e1d8 [ 178.186168][T10326] ? __blkdev_put+0x194/0x810 [ 178.186187][T10326] ? __blkdev_put+0x6ba/0x810 [ 178.301821][T10326] ? bd_set_size+0xb0/0xb0 [ 178.304921][ T3880] kobject: 'loop2' (000000007febc485): kobject_uevent_env [ 178.306341][T10326] ? wait_for_completion+0x440/0x440 [ 178.318733][T10326] blkdev_put+0x98/0x560 [ 178.322990][T10326] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 178.323352][ T3880] kobject: 'loop2' (000000007febc485): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 178.329254][T10326] blkdev_close+0x8b/0xb0 [ 178.329272][T10326] __fput+0x2ff/0x890 [ 178.329284][T10326] ? blkdev_put+0x560/0x560 [ 178.329297][T10326] ____fput+0x16/0x20 [ 178.329312][T10326] task_work_run+0x145/0x1c0 [ 178.329332][T10326] exit_to_usermode_loop+0x316/0x380 [ 178.329347][T10326] do_syscall_64+0x65f/0x760 [ 178.329364][T10326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.329374][T10326] RIP: 0033:0x4134f0 [ 178.329388][T10326] Code: 01 f0 ff ff 0f 83 30 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 9d 2d 66 00 00 75 14 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff [ 178.329404][T10326] RSP: 002b:00007ffc90c55118 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 178.370974][ T3880] kobject: 'loop1' (000000001fffe351): kobject_uevent_env [ 178.371021][T10326] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00000000004134f0 [ 178.382086][ T3880] kobject: 'loop1' (000000001fffe351): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 178.400399][T10326] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 178.400407][T10326] RBP: 0000000000000014 R08: 0000000000000000 R09: 000000000000000a [ 178.400413][T10326] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 178.400419][T10326] R13: 00007ffc90c55150 R14: 000000000002b59f R15: 00007ffc90c55160 [ 178.401516][T10326] Kernel Offset: disabled [ 178.472817][T10326] Rebooting in 86400 seconds..