[ 70.517676][ T27] audit: type=1800 audit(1579254661.279:26): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 71.450466][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 71.450478][ T27] audit: type=1800 audit(1579254662.239:29): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 71.477683][ T27] audit: type=1800 audit(1579254662.239:30): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. 2020/01/17 09:51:12 fuzzer started 2020/01/17 09:51:14 dialing manager at 10.128.0.26:44169 2020/01/17 09:51:15 syscalls: 2871 2020/01/17 09:51:15 code coverage: enabled 2020/01/17 09:51:15 comparison tracing: enabled 2020/01/17 09:51:15 extra coverage: enabled 2020/01/17 09:51:15 setuid sandbox: enabled 2020/01/17 09:51:15 namespace sandbox: enabled 2020/01/17 09:51:15 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/17 09:51:15 fault injection: enabled 2020/01/17 09:51:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/17 09:51:15 net packet injection: enabled 2020/01/17 09:51:15 net device setup: enabled 2020/01/17 09:51:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/17 09:51:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:54:04 executing program 0: openat$rtc(0xffffffffffffff9c, 0x0, 0x50080, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x16b) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2e828}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x101, 0x40e140) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x30028100}, 0xc, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="11cecbc4bf72321db526bdd4025eb456271b4e8746c953fdc53b8156d21d18d88cb2d5722cb1e84dfc2bbc5bb8fbe43eb033984a5800003344c28cb43b7bcba6c1e1a927fac2366f9f1d4fee8f80ca53f32d5d6deccb718b45cbf56fc4594f8f005f4d600cae72cd9001309403a786d2627fffcef2e3c42c5aa62d92d2fc7372021b896a5fd89f536917197bae4ac8bbe6de659f5b17f03d2b905b0f2f0f2c14494f018a77438f249b06e15b31ccee83d7b628a93dd7df9a4bf691d62f8d0010bc56aa2e948c8555e7f1de49b3e97ba1596b7b3f6c357a4b8c0daffc13cd268dc831d01090e0b0c42e5bbcc0df615b0cf58b7803a1efbfc1db665ee009c81f11b409c095ac9d488d29832044f6eba54649dafa263db9b64c0b0ab1412fb84170dcc5f51c97954cb3ac3cc3af63b5d39a3492fdfc9155d5b16e2135c051ea12c0b7d002887d326611be4f8a2b3822e3f4d2e265933a062c902a0980c34f7f705669d58e", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x40}, 0x1) sendmsg(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000700)='/dev/ful\xbb.\xddq\xafb\xd3\x91\x85\xa0\xc1l\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) ftruncate(r1, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x2, 0x10010, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'nr0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socket(0x0, 0x802, 0x0) memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x7ff8, 0x8, 0x0, 0xffffffffffffff1a) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 09:54:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) syzkaller login: [ 254.109373][ T9829] IPVS: ftp: loaded support on port[0] = 21 09:54:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000001a74d027f5ea67be00000001"], 0x10) [ 254.272618][ T9831] IPVS: ftp: loaded support on port[0] = 21 [ 254.303927][ T9829] chnl_net:caif_netlink_parms(): no params data found [ 254.460389][ T9829] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.468059][ T9829] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.479775][ T9829] device bridge_slave_0 entered promiscuous mode [ 254.513179][ T9829] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.520589][ T9829] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.529300][ T9829] device bridge_slave_1 entered promiscuous mode 09:54:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendfile(r0, r2, 0x0, 0xa808) [ 254.606008][ T9834] IPVS: ftp: loaded support on port[0] = 21 [ 254.609357][ T9829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.632806][ T9829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.662364][ T9831] chnl_net:caif_netlink_parms(): no params data found [ 254.747135][ T9829] team0: Port device team_slave_0 added [ 254.774376][ T9829] team0: Port device team_slave_1 added [ 254.817700][ T9831] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.827262][ T9831] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.836480][ T9831] device bridge_slave_0 entered promiscuous mode 09:54:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7a, 0x0, [0x0, 0x0, 0xc0000102], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 254.874192][ T9831] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.884819][ T9831] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.893178][ T9831] device bridge_slave_1 entered promiscuous mode [ 254.952072][ T9829] device hsr_slave_0 entered promiscuous mode [ 254.981172][ T9829] device hsr_slave_1 entered promiscuous mode [ 255.077636][ T9837] IPVS: ftp: loaded support on port[0] = 21 [ 255.143870][ T9831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.178379][ T9834] chnl_net:caif_netlink_parms(): no params data found [ 255.193226][ T9831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:54:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendfile(r0, r1, 0x0, 0xa808) [ 255.273439][ T9840] IPVS: ftp: loaded support on port[0] = 21 [ 255.298359][ T9831] team0: Port device team_slave_0 added [ 255.347777][ T9831] team0: Port device team_slave_1 added [ 255.369678][ T9834] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.388751][ T9834] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.396585][ T9834] device bridge_slave_0 entered promiscuous mode [ 255.448831][ T9834] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.455941][ T9834] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.464188][ T9834] device bridge_slave_1 entered promiscuous mode [ 255.563092][ T9831] device hsr_slave_0 entered promiscuous mode [ 255.608948][ T9831] device hsr_slave_1 entered promiscuous mode [ 255.659096][ T9831] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.667093][ T9831] Cannot create hsr debugfs directory [ 255.674645][ T9834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.690514][ T9834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.710054][ T9842] IPVS: ftp: loaded support on port[0] = 21 [ 255.755093][ T9829] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 255.822807][ T9829] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 255.898080][ T9829] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 255.953011][ T9829] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 256.023985][ T9834] team0: Port device team_slave_0 added [ 256.035246][ T9834] team0: Port device team_slave_1 added [ 256.061228][ T9837] chnl_net:caif_netlink_parms(): no params data found [ 256.203072][ T9834] device hsr_slave_0 entered promiscuous mode [ 256.259232][ T9834] device hsr_slave_1 entered promiscuous mode [ 256.298772][ T9834] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.306371][ T9834] Cannot create hsr debugfs directory [ 256.378728][ T9837] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.386955][ T9837] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.395589][ T9837] device bridge_slave_0 entered promiscuous mode [ 256.445736][ T9831] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 256.511012][ T9837] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.518106][ T9837] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.526536][ T9837] device bridge_slave_1 entered promiscuous mode [ 256.554418][ T9831] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 256.594075][ T9831] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 256.660619][ T9840] chnl_net:caif_netlink_parms(): no params data found [ 256.679584][ T9831] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 256.746511][ T9837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.796861][ T9840] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.804981][ T9840] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.813273][ T9840] device bridge_slave_0 entered promiscuous mode [ 256.822632][ T9837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.855299][ T9840] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.865520][ T9840] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.873551][ T9840] device bridge_slave_1 entered promiscuous mode [ 256.929757][ T9837] team0: Port device team_slave_0 added [ 256.937816][ T9837] team0: Port device team_slave_1 added [ 256.951704][ T9840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.989194][ T9842] chnl_net:caif_netlink_parms(): no params data found [ 257.000608][ T9840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.082004][ T9837] device hsr_slave_0 entered promiscuous mode [ 257.109237][ T9837] device hsr_slave_1 entered promiscuous mode [ 257.148838][ T9837] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 257.156547][ T9837] Cannot create hsr debugfs directory [ 257.183980][ T9840] team0: Port device team_slave_0 added [ 257.190086][ T9834] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 257.234727][ T9834] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 257.294668][ T9834] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 257.361083][ T9840] team0: Port device team_slave_1 added [ 257.423709][ T9840] device hsr_slave_0 entered promiscuous mode [ 257.479702][ T9840] device hsr_slave_1 entered promiscuous mode [ 257.538743][ T9840] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 257.548249][ T9840] Cannot create hsr debugfs directory [ 257.566589][ T9834] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 257.634165][ T9842] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.642037][ T9842] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.650730][ T9842] device bridge_slave_0 entered promiscuous mode [ 257.691765][ T9842] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.699692][ T9842] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.707772][ T9842] device bridge_slave_1 entered promiscuous mode [ 257.762679][ T9842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.776436][ T9829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.796590][ T9842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.860575][ T9842] team0: Port device team_slave_0 added [ 257.890323][ T9842] team0: Port device team_slave_1 added [ 257.909235][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.918046][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.945301][ T9831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.964420][ T9837] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 258.018717][ T9829] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.042936][ T9837] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 258.091289][ T9837] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 258.202032][ T9842] device hsr_slave_0 entered promiscuous mode [ 258.259244][ T9842] device hsr_slave_1 entered promiscuous mode [ 258.298754][ T9842] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 258.306350][ T9842] Cannot create hsr debugfs directory [ 258.320144][ T9840] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 258.371641][ T9837] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 258.455648][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.464811][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.473591][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.480978][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.504623][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.512606][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.521980][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.531177][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.538390][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.547288][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.555738][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.563706][ T9840] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 258.645894][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.658235][ T9831] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.667458][ T9840] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 258.710816][ T9840] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 258.809974][ T9834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.828366][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.839969][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.849516][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.857136][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.865602][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.895880][ T9834] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.914543][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.925887][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.936131][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.945285][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.952529][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.963330][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.972156][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.982131][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.991351][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.000840][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.015538][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.024803][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.034989][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.061955][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.070823][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.082093][ T2780] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.089862][ T2780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.123026][ T9829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 259.136284][ T9829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 259.165881][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.175488][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.186161][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.197377][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.210616][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.220526][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.229384][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.238840][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.247562][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.256825][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.265792][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.276855][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.285829][ T2780] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.293165][ T2780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.301179][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.312318][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.323321][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.348104][ T9831] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 259.359686][ T9831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 259.376962][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.387478][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.396133][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.407947][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.417468][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.460987][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.470230][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.479732][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.489305][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.498047][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.508180][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.517184][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.526438][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.577553][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.586399][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.594450][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.602838][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.619317][ T9829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.641329][ T9831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.654491][ T9834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 259.666558][ T9834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.681136][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.691010][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.700927][ T9842] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 259.758109][ T9837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.767719][ T9842] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 259.801145][ T9842] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 259.872275][ T9837] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.890935][ T9842] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 259.926784][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.935778][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.944493][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.953091][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.968286][ T9840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.996369][ T9834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.008060][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.018168][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.027612][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.039351][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.049020][ T2691] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.056341][ T2691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.064577][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.073906][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.083102][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.093138][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.102340][ T2691] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.109840][ T2691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.118257][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.150513][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.163817][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.172251][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.213165][ T9840] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.226799][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.238787][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.249587][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.285480][ T9829] device veth0_vlan entered promiscuous mode [ 260.294609][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.307090][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.316253][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.326296][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.335862][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.344954][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.353800][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.362834][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.372043][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.380723][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.394155][ T9831] device veth0_vlan entered promiscuous mode [ 260.416365][ T9829] device veth1_vlan entered promiscuous mode [ 260.439831][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.447969][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.456269][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.466185][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.475846][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.485141][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.494985][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.504590][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.513284][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.520594][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.535493][ T9831] device veth1_vlan entered promiscuous mode [ 260.564238][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.572632][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.581840][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.591117][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.601199][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.609973][ T2780] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.617327][ T2780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.625594][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.635151][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.643814][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.652589][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.663675][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.672768][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.681982][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.693583][ T9837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.712109][ T9834] device veth0_vlan entered promiscuous mode [ 260.739220][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.770030][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.807059][ T9834] device veth1_vlan entered promiscuous mode [ 260.837878][ T9842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.863169][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.876463][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.885799][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.894712][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.902754][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.926051][ T9837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.950563][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.962018][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.971235][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.980291][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.996132][ T9840] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 261.008343][ T9840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 261.029341][ T9842] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.037513][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.046847][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.092895][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.109698][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.170813][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.180385][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.199458][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.223124][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.236664][ C0] hrtimer: interrupt took 43723 ns 09:54:12 executing program 2: 09:54:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 261.292319][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.312272][ T2780] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.319553][ T2780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.329540][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.341258][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.364944][ T2780] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.372138][ T2780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.438407][ T9840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.476746][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.492625][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 261.517392][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:54:12 executing program 2: [ 261.545784][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.562776][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.615895][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.627650][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.647366][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 09:54:12 executing program 0: 09:54:12 executing program 2: [ 261.664010][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.695300][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.706298][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.727133][ T9837] device veth0_vlan entered promiscuous mode 09:54:12 executing program 2: 09:54:12 executing program 0: [ 261.769471][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 261.792546][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.859716][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.868120][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.890601][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 09:54:12 executing program 2: [ 261.909346][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.928707][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.948005][ T9842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:54:12 executing program 0: [ 261.976083][ T9837] device veth1_vlan entered promiscuous mode [ 262.126527][ T9842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 262.161280][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.177704][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.204055][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.220576][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.316275][ T9840] device veth0_vlan entered promiscuous mode [ 262.341800][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.353267][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.380573][ T9840] device veth1_vlan entered promiscuous mode [ 262.401872][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.418512][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.436854][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 09:54:13 executing program 3: [ 262.521370][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 262.533243][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.567610][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.605580][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.617287][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.627044][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.637100][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.658220][ T9842] device veth0_vlan entered promiscuous mode [ 262.689604][ T9842] device veth1_vlan entered promiscuous mode [ 262.754582][ T9908] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 262.779343][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 262.787928][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 09:54:13 executing program 4: 09:54:13 executing program 5: 09:54:13 executing program 2: 09:54:13 executing program 0: 09:54:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:54:13 executing program 3: 09:54:13 executing program 4: 09:54:13 executing program 2: 09:54:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:54:13 executing program 0: 09:54:13 executing program 3: 09:54:14 executing program 5: 09:54:14 executing program 4: 09:54:14 executing program 0: 09:54:14 executing program 2: 09:54:14 executing program 5: 09:54:14 executing program 4: 09:54:14 executing program 3: 09:54:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:54:14 executing program 0: 09:54:14 executing program 2: 09:54:14 executing program 3: 09:54:14 executing program 5: 09:54:14 executing program 4: 09:54:14 executing program 3: 09:54:14 executing program 0: 09:54:14 executing program 2: 09:54:14 executing program 5: 09:54:14 executing program 4: 09:54:14 executing program 2: 09:54:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:54:15 executing program 5: 09:54:15 executing program 3: 09:54:15 executing program 0: 09:54:15 executing program 2: 09:54:15 executing program 4: 09:54:15 executing program 4: 09:54:15 executing program 3: 09:54:15 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6fe8746f93612c209820b1e6b595926c0af2d9a5d1893549"]) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$inet_tcp(0x2, 0x1, 0x0) lstat(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r1) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="02000000010000000000000002000500", @ANYBLOB="020002", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080004", @ANYRES32, @ANYBLOB="080003", @ANYRES32, @ANYBLOB="10001c5e000000002000020000000000"], 0x10, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 09:54:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x5b0, 0x0, &(0x7f00000001c0), 0x10) 09:54:15 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199815491be65c3154ad160c3b3ea8100cbb96a06f8", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 09:54:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)={0x6, {{0x2, 0x0, @multicast2}}, 0x1}, 0x90) [ 264.885468][T10004] ptrace attach of "/root/syz-executor.0"[10002] was attempted by "/root/syz-executor.0"[10004] [ 264.941220][T10005] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 09:54:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:54:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:54:16 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x40) 09:54:16 executing program 0: 09:54:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) 09:54:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x5000) 09:54:16 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x8d}, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000100)=0x2) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x0, 0x0, 0x3, 0x8d27}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 265.687618][T10017] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 09:54:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') ppoll(&(0x7f00000000c0)=[{r3}, {r2, 0xa006}], 0x2, 0x0, 0x0, 0x0) 09:54:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"/537], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 09:54:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11b}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 09:54:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000002480)=""/196, 0xc4}], 0x1}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_getattr(0x0, &(0x7f0000000240)={0x38}, 0x38, 0x0) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x40}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r6 = gettid() r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x62, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/784], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents(r8, 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r8, 0xfffffffffffffe54, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r0, r5, 0x0, 0x4, &(0x7f00000001c0)='GPL\x00'}, 0x30) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x31bd}, 0x0) mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r12 = socket(0x2000000100000010, 0x2, 0x0) sendmsg$nl_route(r12, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_FIOGETOWN(r12, 0x8903, &(0x7f0000000100)=0x0) tkill(r13, 0x36) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) 09:54:16 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$FIDEDUPERANGE(r0, 0x80086601, 0x0) [ 265.978371][T10054] ptrace attach of "/root/syz-executor.5"[10053] was attempted by "/root/syz-executor.5"[10054] [ 266.147911][T10066] ------------[ cut here ]------------ [ 266.153563][T10066] WARNING: CPU: 1 PID: 10066 at fs/overlayfs/file.c:55 ovl_real_fdget_meta+0x4a3/0x540 [ 266.163200][T10066] Kernel panic - not syncing: panic_on_warn set ... [ 266.169808][T10066] CPU: 1 PID: 10066 Comm: syz-executor.5 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 266.179812][T10066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.189995][T10066] Call Trace: [ 266.193446][T10066] dump_stack+0x197/0x210 [ 266.197808][T10066] ? ovl_real_fdget_meta+0x3b0/0x540 [ 266.203175][T10066] panic+0x2e3/0x75c [ 266.207104][T10066] ? add_taint.cold+0x16/0x16 [ 266.211897][T10066] ? printk+0xba/0xed [ 266.215902][T10066] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 266.221405][T10066] ? __warn.cold+0x14/0x3e [ 266.226896][T10066] ? ovl_real_fdget_meta+0x4a3/0x540 [ 266.232222][T10066] __warn.cold+0x2f/0x3e [ 266.236474][T10066] ? report_bug.cold+0x63/0xb2 [ 266.241251][T10066] ? ovl_real_fdget_meta+0x4a3/0x540 [ 266.246560][T10066] report_bug+0x289/0x300 [ 266.251116][T10066] do_error_trap+0x11b/0x200 [ 266.255829][T10066] do_invalid_op+0x37/0x50 [ 266.260272][T10066] ? ovl_real_fdget_meta+0x4a3/0x540 [ 266.265770][T10066] invalid_op+0x23/0x30 [ 266.269954][T10066] RIP: 0010:ovl_real_fdget_meta+0x4a3/0x540 [ 266.275862][T10066] Code: ff 4c 89 f7 e8 6e d9 2c ff e9 fb fc ff ff e8 64 d9 2c ff e9 c7 fc ff ff 4c 89 f7 e8 f7 d9 2c ff e9 5e fd ff ff e8 dd 41 ee fe <0f> 0b 41 bc fb ff ff ff e9 f9 fc ff ff e8 5b d9 2c ff e9 85 fb ff [ 266.295739][T10066] RSP: 0018:ffffc90002307d10 EFLAGS: 00010216 [ 266.301822][T10066] RAX: 0000000000040000 RBX: 0000000004149002 RCX: ffffc900131c2000 [ 266.309918][T10066] RDX: 000000000000668f RSI: ffffffff828755f3 RDI: 0000000000000005 [ 266.317889][T10066] RBP: ffffc90002307d40 R08: ffff88809b5a8500 R09: ffff88809b5a8d98 [ 266.325961][T10066] R10: fffffbfff154a5c8 R11: ffffffff8aa52e47 R12: 000000000014b002 [ 266.334911][T10066] R13: ffff88809af56a80 R14: ffff88809af56af8 R15: ffff888092bde748 [ 266.342926][T10066] ? ovl_real_fdget_meta+0x4a3/0x540 [ 266.348229][T10066] ovl_real_ioctl+0x84/0x190 [ 266.352848][T10066] ? ovl_fsync+0x250/0x250 [ 266.357284][T10066] ovl_ioctl+0x201/0x330 [ 266.361552][T10066] ? ovl_ioctl_set_flags+0x320/0x320 [ 266.366909][T10066] ? tomoyo_file_ioctl+0x23/0x30 [ 266.372588][T10066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.379685][T10066] ? security_file_ioctl+0x8d/0xc0 [ 266.385548][T10066] ? ovl_ioctl_set_flags+0x320/0x320 [ 266.391119][T10066] ksys_ioctl+0x123/0x180 [ 266.395448][T10066] __x64_sys_ioctl+0x73/0xb0 [ 266.400099][T10066] do_syscall_64+0xfa/0x790 [ 266.404624][T10066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.410613][T10066] RIP: 0033:0x45aff9 [ 266.414555][T10066] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.434608][T10066] RSP: 002b:00007f5da07f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.443023][T10066] RAX: ffffffffffffffda RBX: 00007f5da07f96d4 RCX: 000000000045aff9 [ 266.451012][T10066] RDX: 0000000000000000 RSI: 0000000080086601 RDI: 0000000000000003 [ 266.459001][T10066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.466984][T10066] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 266.474952][T10066] R13: 00000000000002d2 R14: 00000000004c3a09 R15: 000000000075bf2c [ 266.484613][T10066] Kernel Offset: disabled [ 266.489028][T10066] Rebooting in 86400 seconds..