[info] Using makefile-style concurrent boot in runlevel 2. [ 24.319985] audit: type=1800 audit(1540726503.551:21): pid=5399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.347486] audit: type=1800 audit(1540726503.551:22): pid=5399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. 2018/10/28 11:35:29 fuzzer started 2018/10/28 11:35:31 dialing manager at 10.128.0.26:37113 2018/10/28 11:35:32 syscalls: 1 2018/10/28 11:35:32 code coverage: enabled 2018/10/28 11:35:32 comparison tracing: enabled 2018/10/28 11:35:32 setuid sandbox: enabled 2018/10/28 11:35:32 namespace sandbox: enabled 2018/10/28 11:35:32 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/28 11:35:32 fault injection: enabled 2018/10/28 11:35:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/28 11:35:32 net packed injection: enabled 2018/10/28 11:35:32 net device setup: enabled 11:38:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000100), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="4f4b3385f4aed895015b98b850603f1c0a3ca53e2ec879694525b9b4d6e181b9a1edc3d3cbdb4985bb2a07c443bed5b77f1b7aa9f082209d1256e31964f227525063466729d42c5e83034a486a9d16227a42e3e30dfdc595e5b62171b70a3b51b39bdeb1e88ac967095a90640b39775ed2027b83da42989b8c") ptrace$cont(0x20, r0, 0x0, 0x0) syzkaller login: [ 244.102406] IPVS: ftp: loaded support on port[0] = 21 11:38:43 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) [ 244.358047] IPVS: ftp: loaded support on port[0] = 21 11:38:43 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000300), 0xbdaf0c38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000780)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000580, 0x0, 0x0, 0x200005b0, 0x20000738], 0x0, &(0x7f0000000540), &(0x7f0000000580)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 244.636802] IPVS: ftp: loaded support on port[0] = 21 11:38:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015002}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)) write$tun(r0, &(0x7f0000000340)={@void, @val={0x0, 0x0, 0x19ff}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xff23) [ 245.213037] IPVS: ftp: loaded support on port[0] = 21 11:38:44 executing program 4: [ 245.695714] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.717566] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.733636] device bridge_slave_0 entered promiscuous mode [ 245.850115] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.863650] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.870987] device bridge_slave_1 entered promiscuous mode [ 246.011519] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.037936] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.040324] IPVS: ftp: loaded support on port[0] = 21 [ 246.053251] device bridge_slave_0 entered promiscuous mode [ 246.062705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.163627] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.185196] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.193241] device bridge_slave_1 entered promiscuous mode [ 246.201825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.266942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:38:45 executing program 5: [ 246.411954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.604882] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.617587] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.643730] device bridge_slave_0 entered promiscuous mode [ 246.686689] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.692581] IPVS: ftp: loaded support on port[0] = 21 [ 246.805079] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.813655] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.820029] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.829469] device bridge_slave_1 entered promiscuous mode [ 246.869575] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.896833] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.950485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.068347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.237403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.262283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.442710] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.462629] team0: Port device team_slave_0 added [ 247.470055] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.480959] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.496628] device bridge_slave_0 entered promiscuous mode [ 247.514919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.582430] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.589822] team0: Port device team_slave_1 added [ 247.630232] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.646817] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.654106] device bridge_slave_1 entered promiscuous mode [ 247.661417] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.670318] team0: Port device team_slave_0 added [ 247.706011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.727324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.757233] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.842569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.856053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.874938] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.893753] team0: Port device team_slave_1 added [ 247.943307] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.951017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.962812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.049688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.118695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.137052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.158818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.185938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.290312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.311150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.332865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.417660] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.428221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.445218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.459265] team0: Port device team_slave_0 added [ 248.475879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.492848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.506455] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.513033] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.526976] device bridge_slave_0 entered promiscuous mode [ 248.567863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.609513] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.620534] team0: Port device team_slave_1 added [ 248.636637] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.660066] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.688039] device bridge_slave_1 entered promiscuous mode [ 248.729054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 248.754735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.778024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.785732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.796430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.855572] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.925181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.989781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.062500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.070693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.083067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.146021] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.162257] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.174279] device bridge_slave_0 entered promiscuous mode [ 249.204977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.235429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.245206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.269379] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.289533] team0: Port device team_slave_0 added [ 249.303171] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.309667] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.323384] device bridge_slave_1 entered promiscuous mode [ 249.436140] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.448366] team0: Port device team_slave_1 added [ 249.481664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.514197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.582558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.589452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.598277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.623207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.633664] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.640194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.647266] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.653686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.668786] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.681398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.703972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.717430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.746912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.758034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.783397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.869620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.893473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.904413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.939754] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.946266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.952970] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.959340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.975691] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.003389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.020369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.043064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.075923] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.202298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.214912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.262427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.270348] team0: Port device team_slave_0 added [ 250.284249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.384448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.399171] team0: Port device team_slave_1 added [ 250.424281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 250.431163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.546352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 250.568092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.583004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.598081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.616602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.678022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.699481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.722206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.819546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.834264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.849019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.872786] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.879183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.885879] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.892286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.904302] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.930331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.948055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.983301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.019385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.052812] team0: Port device team_slave_0 added [ 251.223750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.241261] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.277958] team0: Port device team_slave_1 added [ 251.403715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.421270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.439536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.473041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.479987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.492165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.586494] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.592965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.599637] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.606066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.626652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.651788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.672936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.680947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.813458] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.820649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.829910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.234706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.476189] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.482650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.489341] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.495774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.540317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.262157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.357811] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.364254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.370947] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.377373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.390581] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.302208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.983560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.233806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.471673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.707026] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.962883] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.969055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.999756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.167629] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.202859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.211658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.242894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.538744] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.660196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.704449] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.738789] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.156328] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 257.212983] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.219149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.228035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.591469] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.611345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.620206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.764051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.779982] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.033628] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.199379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.492955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.683649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.689834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.700212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.962002] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 259.156486] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.460404] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.472876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.481696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:38:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) 11:38:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0xe) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 11:38:59 executing program 0: perf_event_open(&(0x7f0000001b00)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 1: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 11:38:59 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x400000000000003, r1}, 0x14) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000240)) 11:38:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/126) [ 260.001114] 8021q: adding VLAN 0 to HW filter on device team0 11:38:59 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x400000000000003, r1}, 0x14) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000240)) 11:38:59 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6(0xa, 0x3, 0x800000000000000) ioctl(r1, 0x890f, &(0x7f00000003c0)="153f6234488dd25d766070e1b660e388a45b83ec34f0714b98c7e6866aa5351b7c2d5034da0df4b63b") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0)=0x10000000000078, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x3, 0x8, 0x100000001, 0xffffffffffffff38, 0x2, 0x8, 0x7, 0x0}, &(0x7f0000000800)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000900)={r4, 0x5, 0x0, 0x5e, 0x80000001, 0x7, 0x80, 0x200, {r5, @in6={{0xa, 0x4e21, 0x10000, @mcast1}}, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=0xb0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000a40)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001040)={r0}) syz_genetlink_get_family_id$team(&(0x7f0000000dc0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000001140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="18d1f3c0d88d9dc8d77287329e1cfdec93c32753e927c725d8e1460b8fe4b39794e1c4094f3e1c169a7f2f3a60052295a25cabbf06ef186b1d1925de250273194daf16bd5b5d8186512a91405227e32a6674e4c81c657c7d4087c64e53fe654e9dc1d2d925bed48ce61e70251b21dc7a2e5f089f1dd93c81025d3e7e56d8447ae04fe3fb3495fc000000f591cdf5309be836df37d64d2fc3ae179d769aef1369f51c7e5ceb82b363b8000600000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000600), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={r6, 0x7}, &(0x7f00000009c0)=0x8) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000a80)="503a856487f5183995ea9a0b2bd8603394d4779f92f7f0504e91765bb7ebd02fbd656b356589e29b49665302fefac0f9d13302ab90d22ca1c1fa67ffef3e11a09a4209e4abed920e5536", 0x4a) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0xfffffc86) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f0000000e00), 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) bind(0xffffffffffffffff, &(0x7f0000000c40)=@pptp, 0xff74) accept4$llc(0xffffffffffffffff, &(0x7f0000000a00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b00)=0x10, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/224, &(0x7f0000000540)=0xe0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:38:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) [ 260.650247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 260.791217] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.800515] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.850003] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:39:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000000)) [ 261.050271] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:39:00 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x9, &(0x7f0000000040)=0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xff}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:39:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:39:00 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x400000000000003, r1}, 0x14) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000240)) 11:39:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000240)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) 11:39:00 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6(0xa, 0x3, 0x800000000000000) ioctl(r1, 0x890f, &(0x7f00000003c0)="153f6234488dd25d766070e1b660e388a45b83ec34f0714b98c7e6866aa5351b7c2d5034da0df4b63b") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0)=0x10000000000078, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x3, 0x8, 0x100000001, 0xffffffffffffff38, 0x2, 0x8, 0x7, 0x0}, &(0x7f0000000800)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000900)={r4, 0x5, 0x0, 0x5e, 0x80000001, 0x7, 0x80, 0x200, {r5, @in6={{0xa, 0x4e21, 0x10000, @mcast1}}, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=0xb0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000a40)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001040)={r0}) syz_genetlink_get_family_id$team(&(0x7f0000000dc0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000001140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="18d1f3c0d88d9dc8d77287329e1cfdec93c32753e927c725d8e1460b8fe4b39794e1c4094f3e1c169a7f2f3a60052295a25cabbf06ef186b1d1925de250273194daf16bd5b5d8186512a91405227e32a6674e4c81c657c7d4087c64e53fe654e9dc1d2d925bed48ce61e70251b21dc7a2e5f089f1dd93c81025d3e7e56d8447ae04fe3fb3495fc000000f591cdf5309be836df37d64d2fc3ae179d769aef1369f51c7e5ceb82b363b8000600000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000600), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={r6, 0x7}, &(0x7f00000009c0)=0x8) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000a80)="503a856487f5183995ea9a0b2bd8603394d4779f92f7f0504e91765bb7ebd02fbd656b356589e29b49665302fefac0f9d13302ab90d22ca1c1fa67ffef3e11a09a4209e4abed920e5536", 0x4a) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0xfffffc86) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f0000000e00), 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) bind(0xffffffffffffffff, &(0x7f0000000c40)=@pptp, 0xff74) accept4$llc(0xffffffffffffffff, &(0x7f0000000a00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b00)=0x10, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/224, &(0x7f0000000540)=0xe0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:39:00 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, &(0x7f0000000040)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 11:39:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) [ 261.685247] hrtimer: interrupt took 29664 ns 11:39:00 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) 11:39:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) 11:39:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x1b, 0x5}}) [ 261.840725] sysfs: Unknown parameter 'sysfs' 11:39:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) [ 261.886685] sysfs: Unknown parameter 'sysfs' 11:39:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) 11:39:01 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) 11:39:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:39:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000440)={0x11, @local, 0x0, 0x1, 'none\x00'}, 0x2c) 11:39:01 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='nodiscard,errors=withdraw,commit=0xfffffffffffff801']) [ 262.114702] sysfs: Unknown parameter 'sysfs' [ 262.159476] sysfs: Unknown parameter 'sysfs' [ 262.224428] gfs2: commit mount option requires a positive numeric argument [ 262.244530] gfs2: can't parse mount arguments [ 262.329048] gfs2: commit mount option requires a positive numeric argument [ 262.352315] gfs2: can't parse mount arguments 11:39:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') read$FUSE(r1, &(0x7f0000000280), 0x1000) 11:39:01 executing program 0: shmget(0x0, 0xd000, 0x0, &(0x7f0000ff1000/0xd000)=nil) 11:39:01 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6(0xa, 0x3, 0x800000000000000) ioctl(r1, 0x890f, &(0x7f00000003c0)="153f6234488dd25d766070e1b660e388a45b83ec34f0714b98c7e6866aa5351b7c2d5034da0df4b63b") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0)=0x10000000000078, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x3, 0x8, 0x100000001, 0xffffffffffffff38, 0x2, 0x8, 0x7, 0x0}, &(0x7f0000000800)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000900)={r4, 0x5, 0x0, 0x5e, 0x80000001, 0x7, 0x80, 0x200, {r5, @in6={{0xa, 0x4e21, 0x10000, @mcast1}}, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=0xb0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000a40)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001040)={r0}) syz_genetlink_get_family_id$team(&(0x7f0000000dc0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000001140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="18d1f3c0d88d9dc8d77287329e1cfdec93c32753e927c725d8e1460b8fe4b39794e1c4094f3e1c169a7f2f3a60052295a25cabbf06ef186b1d1925de250273194daf16bd5b5d8186512a91405227e32a6674e4c81c657c7d4087c64e53fe654e9dc1d2d925bed48ce61e70251b21dc7a2e5f089f1dd93c81025d3e7e56d8447ae04fe3fb3495fc000000f591cdf5309be836df37d64d2fc3ae179d769aef1369f51c7e5ceb82b363b8000600000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000600), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={r6, 0x7}, &(0x7f00000009c0)=0x8) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000a80)="503a856487f5183995ea9a0b2bd8603394d4779f92f7f0504e91765bb7ebd02fbd656b356589e29b49665302fefac0f9d13302ab90d22ca1c1fa67ffef3e11a09a4209e4abed920e5536", 0x4a) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0xfffffc86) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f0000000e00), 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) bind(0xffffffffffffffff, &(0x7f0000000c40)=@pptp, 0xff74) accept4$llc(0xffffffffffffffff, &(0x7f0000000a00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b00)=0x10, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/224, &(0x7f0000000540)=0xe0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:39:01 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r1, 0x12) ptrace(0xffffffffffffffff, 0x0) 11:39:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) 11:39:01 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) 11:39:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000000)={0x1, 0x0, [{0x0, 0x0, 0x9}]}) 11:39:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)="47ff4c00", 0x0, 0x99, &(0x7f0000ce7000)=""/153}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x34, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", &(0x7f00007ec000)=""/52}, 0x28) 11:39:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 11:39:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:39:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f62340100d25d766070") syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000040)) [ 262.850135] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 11:39:02 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$gfs2(&(0x7f0000001680)='gfs2\x00', &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001bc0)={[{@nosuiddir='nosuiddir'}]}) 11:39:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) [ 263.107507] gfs2: not a GFS2 filesystem [ 263.182587] gfs2: not a GFS2 filesystem 11:39:02 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6(0xa, 0x3, 0x800000000000000) ioctl(r1, 0x890f, &(0x7f00000003c0)="153f6234488dd25d766070e1b660e388a45b83ec34f0714b98c7e6866aa5351b7c2d5034da0df4b63b") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0)=0x10000000000078, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x3, 0x8, 0x100000001, 0xffffffffffffff38, 0x2, 0x8, 0x7, 0x0}, &(0x7f0000000800)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000900)={r4, 0x5, 0x0, 0x5e, 0x80000001, 0x7, 0x80, 0x200, {r5, @in6={{0xa, 0x4e21, 0x10000, @mcast1}}, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=0xb0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000a40)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001040)={r0}) syz_genetlink_get_family_id$team(&(0x7f0000000dc0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000001140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="18d1f3c0d88d9dc8d77287329e1cfdec93c32753e927c725d8e1460b8fe4b39794e1c4094f3e1c169a7f2f3a60052295a25cabbf06ef186b1d1925de250273194daf16bd5b5d8186512a91405227e32a6674e4c81c657c7d4087c64e53fe654e9dc1d2d925bed48ce61e70251b21dc7a2e5f089f1dd93c81025d3e7e56d8447ae04fe3fb3495fc000000f591cdf5309be836df37d64d2fc3ae179d769aef1369f51c7e5ceb82b363b8000600000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000600), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={r6, 0x7}, &(0x7f00000009c0)=0x8) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000a80)="503a856487f5183995ea9a0b2bd8603394d4779f92f7f0504e91765bb7ebd02fbd656b356589e29b49665302fefac0f9d13302ab90d22ca1c1fa67ffef3e11a09a4209e4abed920e5536", 0x4a) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0xfffffc86) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f0000000e00), 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) bind(0xffffffffffffffff, &(0x7f0000000c40)=@pptp, 0xff74) accept4$llc(0xffffffffffffffff, &(0x7f0000000a00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b00)=0x10, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/224, &(0x7f0000000540)=0xe0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:39:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:39:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f00000000c0)=0x182, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000006c0), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 11:39:02 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$gfs2(&(0x7f0000001680)='gfs2\x00', &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001bc0)={[{@nosuiddir='nosuiddir'}]}) 11:39:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0x974e) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './bus\x00'}, 0x6e) fdatasync(r3) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 11:39:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x9, &(0x7f0000000040)=0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xff}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:39:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x12, &(0x7f00000001c0)="66b80829a5710f23d00f21f86635300000030f23f8ba200066ed66b9c4080000103266b98704000066b89b00000066ba000000000f30f30fbdc92ed2770c0f01cb0fc71fb800008ec0baf80c66b85fe6228b66efbafc0cec", 0x58}], 0x1, 0x54, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) [ 263.527403] gfs2: not a GFS2 filesystem 11:39:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 11:39:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000440)={0x11, @local, 0x0, 0x0, "6e6f6e65000000000000000000000011"}, 0x2c) 11:39:02 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$gfs2(&(0x7f0000001680)='gfs2\x00', &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001bc0)={[{@nosuiddir='nosuiddir'}]}) 11:39:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x0) 11:39:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000a00)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@rodir='rodir'}, {@utf8='utf8=1'}], [{@fsname={'fsname', 0x3d, 'sysfs\x00'}}, {@appraise='appraise'}]}) [ 263.729743] gfs2: not a GFS2 filesystem [ 263.846278] FAT-fs (loop2): Unrecognized mount option "fsname=sysfs" or missing value [ 263.939329] FAT-fs (loop2): Unrecognized mount option "fsname=sysfs" or missing value 11:39:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400210000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000033c0)={0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xe3, &(0x7f0000000400)=""/227}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", &(0x7f0000000080)=""/41, 0x100}, 0x28) 11:39:03 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6(0xa, 0x3, 0x800000000000000) ioctl(r1, 0x890f, &(0x7f00000003c0)="153f6234488dd25d766070e1b660e388a45b83ec34f0714b98c7e6866aa5351b7c2d5034da0df4b63b") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0)=0x10000000000078, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x3, 0x8, 0x100000001, 0xffffffffffffff38, 0x2, 0x8, 0x7, 0x0}, &(0x7f0000000800)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000900)={r4, 0x5, 0x0, 0x5e, 0x80000001, 0x7, 0x80, 0x200, {r5, @in6={{0xa, 0x4e21, 0x10000, @mcast1}}, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=0xb0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000a40)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001040)={r0}) syz_genetlink_get_family_id$team(&(0x7f0000000dc0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000001140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="18d1f3c0d88d9dc8d77287329e1cfdec93c32753e927c725d8e1460b8fe4b39794e1c4094f3e1c169a7f2f3a60052295a25cabbf06ef186b1d1925de250273194daf16bd5b5d8186512a91405227e32a6674e4c81c657c7d4087c64e53fe654e9dc1d2d925bed48ce61e70251b21dc7a2e5f089f1dd93c81025d3e7e56d8447ae04fe3fb3495fc000000f591cdf5309be836df37d64d2fc3ae179d769aef1369f51c7e5ceb82b363b8000600000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000600), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={r6, 0x7}, &(0x7f00000009c0)=0x8) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000a80)="503a856487f5183995ea9a0b2bd8603394d4779f92f7f0504e91765bb7ebd02fbd656b356589e29b49665302fefac0f9d13302ab90d22ca1c1fa67ffef3e11a09a4209e4abed920e5536", 0x4a) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0xfffffc86) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f0000000e00), 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) bind(0xffffffffffffffff, &(0x7f0000000c40)=@pptp, 0xff74) accept4$llc(0xffffffffffffffff, &(0x7f0000000a00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b00)=0x10, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/224, &(0x7f0000000540)=0xe0) 11:39:03 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='./control\x00', 0x3fffffe) r3 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000040)='./control\x00', r3, &(0x7f0000036000)='./file0\x00', 0x2) 11:39:03 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$gfs2(&(0x7f0000001680)='gfs2\x00', &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001bc0)={[{@nosuiddir='nosuiddir'}]}) 11:39:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000a00)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@rodir='rodir'}, {@utf8='utf8=1'}], [{@fsname={'fsname', 0x3d, 'sysfs\x00'}}, {@appraise='appraise'}]}) 11:39:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x12, &(0x7f00000001c0)="66b80829a5710f23d00f21f86635300000030f23f8ba200066ed66b9c4080000103266b98704000066b89b00000066ba000000000f30f30fbdc92ed2770c0f01cb0fc71fb800008ec0baf80c66b85fe6228b66efbafc0cec", 0x58}], 0x1, 0x54, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) [ 264.443454] gfs2: not a GFS2 filesystem [ 264.465111] FAT-fs (loop2): Unrecognized mount option "fsname=sysfs" or missing value [ 264.493281] ODEBUG: object 00000000fd6a7b26 is on stack 00000000e3c0ab2f, but NOT annotated. [ 264.505507] WARNING: CPU: 1 PID: 7360 at lib/debugobjects.c:369 __debug_object_init.cold.14+0x51/0xdf [ 264.514905] Kernel panic - not syncing: panic_on_warn set ... [ 264.520811] CPU: 1 PID: 7360 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 264.529210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.538576] Call Trace: [ 264.541172] dump_stack+0x244/0x39d [ 264.544810] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.550009] panic+0x2ad/0x55c [ 264.553202] ? add_taint.cold.5+0x16/0x16 [ 264.557360] ? __warn.cold.8+0x5/0x45 [ 264.561165] ? __debug_object_init.cold.14+0x51/0xdf [ 264.566272] __warn.cold.8+0x20/0x45 [ 264.569987] ? __debug_object_init.cold.14+0x51/0xdf [ 264.575093] report_bug+0x254/0x2d0 [ 264.578777] do_error_trap+0x11b/0x200 [ 264.582673] do_invalid_op+0x36/0x40 [ 264.586388] ? __debug_object_init.cold.14+0x51/0xdf [ 264.591540] invalid_op+0x14/0x20 [ 264.595001] RIP: 0010:__debug_object_init.cold.14+0x51/0xdf [ 264.600730] Code: ea 03 80 3c 02 00 75 7c 49 8b 54 24 18 48 89 de 48 c7 c7 c0 f1 40 88 4c 89 85 d0 fd ff ff e8 09 8c d1 fd 4c 8b 85 d0 fd ff ff <0f> 0b e9 09 d6 ff ff 41 83 c4 01 b8 ff ff 37 00 44 89 25 b7 4e 66 [ 264.619635] RSP: 0018:ffff880184fdf308 EFLAGS: 00010086 [ 264.625000] RAX: 0000000000000050 RBX: ffff880184fdfaf8 RCX: ffffc90009eb2000 [ 264.632268] RDX: 0000000000000000 RSI: ffffffff816585a5 RDI: 0000000000000005 [ 264.639533] RBP: ffff880184fdf560 R08: ffff8801c7cf75c0 R09: ffffed003b5e5008 [ 264.646799] R10: ffffed003b5e5008 R11: ffff8801daf28047 R12: ffff8801bc2925c0 [ 264.654063] R13: 000000000001f140 R14: ffff8801bc2925c0 R15: ffff8801c7cf75b0 [ 264.661344] ? vprintk_func+0x85/0x181 [ 264.665238] ? __debug_object_init.cold.14+0x4a/0xdf [ 264.670342] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 264.674928] ? debug_object_free+0x690/0x690 [ 264.679340] ? unwind_get_return_address+0x61/0xa0 [ 264.684291] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 264.689414] ? depot_save_stack+0x292/0x470 [ 264.693742] ? save_stack+0xa9/0xd0 [ 264.697375] ? save_stack+0x43/0xd0 [ 264.700998] ? kasan_kmalloc+0xc7/0xe0 [ 264.704886] ? bpf_test_init.isra.10+0x98/0x100 [ 264.709558] ? zap_class+0x640/0x640 [ 264.713272] ? do_syscall_64+0x1b9/0x820 [ 264.717332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.722741] ? find_held_lock+0x36/0x1c0 [ 264.726802] debug_object_init+0x16/0x20 [ 264.730863] init_timer_key+0xa9/0x480 [ 264.734758] ? init_timer_on_stack_key+0xe0/0xe0 [ 264.739530] ? __might_fault+0x12b/0x1e0 [ 264.743627] ? __lockdep_init_map+0x105/0x590 [ 264.748144] ? __lockdep_init_map+0x105/0x590 [ 264.752646] ? lockdep_init_map+0x9/0x10 [ 264.756712] sock_init_data+0xe1/0xdc0 [ 264.760600] ? sk_stop_timer+0x50/0x50 [ 264.764508] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.770045] ? _copy_from_user+0xdf/0x150 [ 264.774198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.779756] ? bpf_test_init.isra.10+0x70/0x100 [ 264.784429] bpf_prog_test_run_skb+0x255/0xc40 [ 264.789012] ? __lock_acquire+0x62f/0x4c20 [ 264.793261] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 264.798137] ? __lock_acquire+0x62f/0x4c20 [ 264.802454] ? fput+0x130/0x1a0 [ 264.805749] ? __bpf_prog_get+0x9b/0x290 [ 264.809809] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 264.814660] bpf_prog_test_run+0x130/0x1a0 [ 264.818909] __x64_sys_bpf+0x3d8/0x510 [ 264.822817] ? bpf_prog_get+0x20/0x20 [ 264.826634] do_syscall_64+0x1b9/0x820 [ 264.830521] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.835904] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.840848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.845712] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.850744] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.855789] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.860823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.865673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.870874] RIP: 0033:0x457569 [ 264.874069] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.892979] RSP: 002b:00007f52a635dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 264.900698] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 264.907970] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 264.915236] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.922501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52a635e6d4 [ 264.929768] R13: 00000000004bd892 R14: 00000000004cc208 R15: 00000000ffffffff [ 264.937039] [ 264.937046] ====================================================== [ 264.937052] WARNING: possible circular locking dependency detected [ 264.937058] 4.19.0-rc8-next-20181019+ #98 Not tainted [ 264.937064] ------------------------------------------------------ [ 264.937069] syz-executor4/7360 is trying to acquire lock: [ 264.937073] 00000000ee5cca8d ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 264.937089] [ 264.937094] but task is already holding lock: [ 264.937105] 000000006007e3c3 (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 264.937121] [ 264.937127] which lock already depends on the new lock. [ 264.937129] [ 264.937132] [ 264.937138] the existing dependency chain (in reverse order) is: [ 264.937141] [ 264.937143] -> #3 (&obj_hash[i].lock){-.-.}: [ 264.937160] _raw_spin_lock_irqsave+0x99/0xd0 [ 264.937165] __debug_object_init+0x127/0x1290 [ 264.937169] debug_object_init+0x16/0x20 [ 264.937174] hrtimer_init+0x97/0x490 [ 264.937178] init_dl_task_timer+0x1b/0x50 [ 264.937183] __sched_fork+0x2ae/0x590 [ 264.937187] init_idle+0x75/0x740 [ 264.937192] sched_init+0xb33/0xc02 [ 264.937196] start_kernel+0x4be/0xa2b [ 264.937201] x86_64_start_reservations+0x2e/0x30 [ 264.937206] x86_64_start_kernel+0x76/0x79 [ 264.937211] secondary_startup_64+0xa4/0xb0 [ 264.937213] [ 264.937216] -> #2 (&rq->lock){-.-.}: [ 264.937231] _raw_spin_lock+0x2d/0x40 [ 264.937236] task_fork_fair+0xb0/0x6d0 [ 264.937240] sched_fork+0x443/0xba0 [ 264.937245] copy_process+0x2585/0x8770 [ 264.937249] _do_fork+0x1cb/0x11c0 [ 264.937253] kernel_thread+0x34/0x40 [ 264.937258] rest_init+0x28/0x372 [ 264.937262] arch_call_rest_init+0xe/0x1b [ 264.937267] start_kernel+0x9f0/0xa2b [ 264.937272] x86_64_start_reservations+0x2e/0x30 [ 264.937277] x86_64_start_kernel+0x76/0x79 [ 264.937282] secondary_startup_64+0xa4/0xb0 [ 264.937284] [ 264.937287] -> #1 (&p->pi_lock){-.-.}: [ 264.937302] _raw_spin_lock_irqsave+0x99/0xd0 [ 264.937307] try_to_wake_up+0xd2/0x12e0 [ 264.937312] wake_up_process+0x10/0x20 [ 264.937316] __up.isra.1+0x1c0/0x2a0 [ 264.937320] up+0x13c/0x1c0 [ 264.937325] __up_console_sem+0xbe/0x1b0 [ 264.937329] console_unlock+0x80c/0x1190 [ 264.937334] vprintk_emit+0x391/0x990 [ 264.937338] vprintk_default+0x28/0x30 [ 264.937343] vprintk_func+0x7e/0x181 [ 264.937347] printk+0xa7/0xcf [ 264.937351] do_exit.cold.18+0x57/0x16f [ 264.937356] do_group_exit+0x177/0x440 [ 264.937360] __x64_sys_exit_group+0x3e/0x50 [ 264.937365] do_syscall_64+0x1b9/0x820 [ 264.937370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.937373] [ 264.937376] -> #0 ((console_sem).lock){-.-.}: [ 264.937391] lock_acquire+0x1ed/0x520 [ 264.937396] _raw_spin_lock_irqsave+0x99/0xd0 [ 264.937400] down_trylock+0x13/0x70 [ 264.937406] __down_trylock_console_sem+0xae/0x1f0 [ 264.937410] console_trylock+0x15/0xa0 [ 264.937415] vprintk_emit+0x372/0x990 [ 264.937419] vprintk_default+0x28/0x30 [ 264.937424] vprintk_func+0x7e/0x181 [ 264.937428] printk+0xa7/0xcf [ 264.937433] __debug_object_init.cold.14+0x4a/0xdf [ 264.937437] debug_object_init+0x16/0x20 [ 264.937442] init_timer_key+0xa9/0x480 [ 264.937446] sock_init_data+0xe1/0xdc0 [ 264.937451] bpf_prog_test_run_skb+0x255/0xc40 [ 264.937456] bpf_prog_test_run+0x130/0x1a0 [ 264.937461] __x64_sys_bpf+0x3d8/0x510 [ 264.937465] do_syscall_64+0x1b9/0x820 [ 264.937471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.937473] [ 264.937478] other info that might help us debug this: [ 264.937481] [ 264.937485] Chain exists of: [ 264.937487] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 264.937507] [ 264.937511] Possible unsafe locking scenario: [ 264.937514] [ 264.937519] CPU0 CPU1 [ 264.937523] ---- ---- [ 264.937526] lock(&obj_hash[i].lock); [ 264.937537] lock(&rq->lock); [ 264.937547] lock(&obj_hash[i].lock); [ 264.937556] lock((console_sem).lock); [ 264.937564] [ 264.937568] *** DEADLOCK *** [ 264.937571] [ 264.937575] 1 lock held by syz-executor4/7360: [ 264.937578] #0: 000000006007e3c3 (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 264.937597] [ 264.937601] stack backtrace: [ 264.937613] CPU: 1 PID: 7360 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 264.937621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.937625] Call Trace: [ 264.937629] dump_stack+0x244/0x39d [ 264.937635] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.937639] ? vprintk_func+0x85/0x181 [ 264.937645] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 264.937649] ? save_trace+0xe0/0x290 [ 264.937654] __lock_acquire+0x3399/0x4c20 [ 264.937658] ? mark_held_locks+0x130/0x130 [ 264.937663] ? put_dec+0xf0/0xf0 [ 264.937667] ? mark_held_locks+0x130/0x130 [ 264.937672] ? zap_class+0x640/0x640 [ 264.937676] ? pointer_string+0x14e/0x1b0 [ 264.937680] ? number+0xca0/0xca0 [ 264.937686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.937690] ? print_usage_bug+0xc0/0xc0 [ 264.937694] ? ptr_to_id+0xd0/0x1d0 [ 264.937699] ? dentry_name+0x8f0/0x8f0 [ 264.937703] ? zap_class+0x640/0x640 [ 264.937709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.937713] lock_acquire+0x1ed/0x520 [ 264.937718] ? down_trylock+0x13/0x70 [ 264.937722] ? lock_release+0xa10/0xa10 [ 264.937727] ? trace_hardirqs_off+0xb8/0x310 [ 264.937731] ? vprintk_emit+0x1de/0x990 [ 264.937736] ? trace_hardirqs_on+0x310/0x310 [ 264.937741] ? trace_hardirqs_off+0xb8/0x310 [ 264.937745] ? log_store+0x344/0x4c0 [ 264.937750] ? vprintk_emit+0x372/0x990 [ 264.937755] _raw_spin_lock_irqsave+0x99/0xd0 [ 264.937759] ? down_trylock+0x13/0x70 [ 264.937764] down_trylock+0x13/0x70 [ 264.937769] __down_trylock_console_sem+0xae/0x1f0 [ 264.937773] console_trylock+0x15/0xa0 [ 264.937778] vprintk_emit+0x372/0x990 [ 264.937782] ? wake_up_klogd+0x180/0x180 [ 264.937787] ? zap_class+0x640/0x640 [ 264.937792] ? trace_hardirqs_off_caller+0x300/0x300 [ 264.937796] ? print_usage_bug+0xc0/0xc0 [ 264.937801] ? find_held_lock+0x36/0x1c0 [ 264.937805] vprintk_default+0x28/0x30 [ 264.937810] vprintk_func+0x7e/0x181 [ 264.937814] printk+0xa7/0xcf [ 264.937819] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 264.937824] __debug_object_init.cold.14+0x4a/0xdf [ 264.937829] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 264.937834] ? debug_object_free+0x690/0x690 [ 264.937839] ? unwind_get_return_address+0x61/0xa0 [ 264.937844] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 264.937849] ? depot_save_stack+0x292/0x470 [ 264.937853] ? save_stack+0xa9/0xd0 [ 264.937857] ? save_stack+0x43/0xd0 [ 264.937862] ? kasan_kmalloc+0xc7/0xe0 [ 264.937867] ? bpf_test_init.isra.10+0x98/0x100 [ 264.937871] ? zap_class+0x640/0x640 [ 264.937876] ? do_syscall_64+0x1b9/0x820 [ 264.937881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.937886] ? find_held_lock+0x36/0x1c0 [ 264.937890] debug_object_init+0x16/0x20 [ 264.937895] init_timer_key+0xa9/0x480 [ 264.937900] ? init_timer_on_stack_key+0xe0/0xe0 [ 264.937919] ? __might_fault+0x12b/0x1e0 [ 264.937924] ? __lockdep_init_map+0x105/0x590 [ 264.937929] ? __lockdep_init_map+0x105/0x590 [ 264.937933] ? lockdep_init_map+0x9/0x10 [ 264.937937] sock_init_data+0xe1/0xdc0 [ 264.937942] ? sk_stop_timer+0x50/0x50 [ 264.937947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.937951] ? _copy_from_user+0xdf/0x150 [ 264.937957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.937962] ? bpf_test_init.isra.10+0x70/0x100 [ 264.937966] bpf_prog_test_run_skb+0x255/0xc40 [ 264.937971] ? __lock_acquire+0x62f/0x4c20 [ 264.937976] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 264.937980] ? __lock_acquire+0x62f/0x4c20 [ 264.937984] ? fput+0x130/0x1a0 [ 264.937988] ? __bpf_prog_get+0x9b/0x290 [ 264.937993] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 264.937998] bpf_prog_test_run+0x130/0x1a0 [ 264.938002] __x64_sys_bpf+0x3d8/0x510 [ 264.938021] ? bpf_prog_get+0x20/0x20 [ 264.938026] do_syscall_64+0x1b9/0x820 [ 264.938031] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.938036] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.938041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.938047] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.938052] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.938057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.938062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.938067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.938071] RIP: 0033:0x457569 [ 264.938086] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.938091] RSP: 002b:00007f52a635dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 264.938110] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 264.938117] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 264.938124] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.938130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52a635e6d4 [ 264.938137] R13: 00000000004bd892 R14: 00000000004cc208 R15: 00000000ffffffff [ 264.939050] Kernel Offset: disabled [ 265.838753] Rebooting in 86400 seconds..