[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.414394][ T24] audit: type=1800 audit(1560191028.183:25): pid=8814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.457298][ T24] audit: type=1800 audit(1560191028.183:26): pid=8814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.492624][ T24] audit: type=1800 audit(1560191028.183:27): pid=8814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts. 2019/06/10 18:24:00 fuzzer started 2019/06/10 18:24:03 dialing manager at 10.128.0.26:39853 2019/06/10 18:24:03 syscalls: 2465 2019/06/10 18:24:03 code coverage: enabled 2019/06/10 18:24:03 comparison tracing: enabled 2019/06/10 18:24:03 extra coverage: extra coverage is not supported by the kernel 2019/06/10 18:24:03 setuid sandbox: enabled 2019/06/10 18:24:03 namespace sandbox: enabled 2019/06/10 18:24:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/10 18:24:03 fault injection: enabled 2019/06/10 18:24:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/10 18:24:03 net packet injection: enabled 2019/06/10 18:24:03 net device setup: enabled 18:26:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x400301, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syzkaller login: [ 226.647737][ T8982] IPVS: ftp: loaded support on port[0] = 21 18:26:36 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) r1 = dup2(r0, r0) write$P9_RSTAT(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="500000e17c000000bd22e0004900000300000000000000000000000000000000000000f6ffffffffffff00000000"], 0x2e) [ 226.776303][ T8982] chnl_net:caif_netlink_parms(): no params data found [ 226.859708][ T8982] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.868281][ T8982] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.876435][ T8982] device bridge_slave_0 entered promiscuous mode [ 226.899989][ T8982] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.917148][ T8982] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.926913][ T8982] device bridge_slave_1 entered promiscuous mode [ 226.951076][ T8985] IPVS: ftp: loaded support on port[0] = 21 [ 226.983108][ T8982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.011226][ T8982] bond0: Enslaving bond_slave_1 as an active interface with an up link 18:26:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'mime_type:\xc4securityvboxnet0)'}, 0x46, 0x0) [ 227.052873][ T8982] team0: Port device team_slave_0 added [ 227.064596][ T8982] team0: Port device team_slave_1 added [ 227.202817][ T8982] device hsr_slave_0 entered promiscuous mode 18:26:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) [ 227.277458][ T8982] device hsr_slave_1 entered promiscuous mode [ 227.323500][ T8985] chnl_net:caif_netlink_parms(): no params data found [ 227.358142][ T8988] IPVS: ftp: loaded support on port[0] = 21 [ 227.394938][ T8982] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.402156][ T8982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.409910][ T8982] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.416990][ T8982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.493252][ T8990] IPVS: ftp: loaded support on port[0] = 21 [ 227.518416][ T8985] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.525513][ T8985] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.534081][ T8985] device bridge_slave_0 entered promiscuous mode [ 227.565727][ T8985] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.574242][ T8985] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.584809][ T8985] device bridge_slave_1 entered promiscuous mode 18:26:37 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) [ 227.632161][ T8985] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.652073][ T8982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.666724][ T8985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.725566][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.754523][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.779313][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.798136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 227.825166][ T8982] 8021q: adding VLAN 0 to HW filter on device team0 18:26:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x400000000000007, 0x0) [ 227.919148][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.930901][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.939692][ T8993] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.946751][ T8993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.956716][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.977674][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.986092][ T8993] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.993191][ T8993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.003504][ T8985] team0: Port device team_slave_0 added [ 228.054764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.065300][ T8985] team0: Port device team_slave_1 added [ 228.081235][ T8995] IPVS: ftp: loaded support on port[0] = 21 [ 228.180002][ T8985] device hsr_slave_0 entered promiscuous mode [ 228.237429][ T8985] device hsr_slave_1 entered promiscuous mode [ 228.299647][ T8988] chnl_net:caif_netlink_parms(): no params data found [ 228.309336][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.320517][ T8990] chnl_net:caif_netlink_parms(): no params data found [ 228.357372][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.366081][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.366859][ T8999] IPVS: ftp: loaded support on port[0] = 21 [ 228.375090][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.389087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.397700][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.444342][ T8988] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.452009][ T8988] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.459815][ T8988] device bridge_slave_0 entered promiscuous mode [ 228.495118][ T8988] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.503633][ T8988] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.511927][ T8988] device bridge_slave_1 entered promiscuous mode [ 228.530210][ T8990] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.537334][ T8990] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.545174][ T8990] device bridge_slave_0 entered promiscuous mode [ 228.553109][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.561569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.590959][ T8990] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.599006][ T8990] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.606583][ T8990] device bridge_slave_1 entered promiscuous mode [ 228.631717][ T8988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.641909][ T8988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.660138][ T8990] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.671764][ T8990] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.700580][ T8990] team0: Port device team_slave_0 added [ 228.714264][ T8990] team0: Port device team_slave_1 added [ 228.721428][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.730145][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.764873][ T8988] team0: Port device team_slave_0 added [ 228.772421][ T8982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.812475][ T8988] team0: Port device team_slave_1 added [ 228.880056][ T8990] device hsr_slave_0 entered promiscuous mode [ 228.917482][ T8990] device hsr_slave_1 entered promiscuous mode [ 229.030256][ T8988] device hsr_slave_0 entered promiscuous mode [ 229.067503][ T8988] device hsr_slave_1 entered promiscuous mode [ 229.130380][ T8995] chnl_net:caif_netlink_parms(): no params data found [ 229.162480][ T8985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.245267][ T8982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.262897][ T8999] chnl_net:caif_netlink_parms(): no params data found [ 229.279409][ T8985] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.299248][ T8995] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.306415][ T8995] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.315193][ T8995] device bridge_slave_0 entered promiscuous mode [ 229.324057][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.332873][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.379075][ T8995] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.386138][ T8995] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.394606][ T8995] device bridge_slave_1 entered promiscuous mode [ 229.418577][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.429720][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.438328][ T8991] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.445391][ T8991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.453580][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.466310][ T8999] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.473549][ T8999] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.482226][ T8999] device bridge_slave_0 entered promiscuous mode [ 229.489941][ T8999] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.496999][ T8999] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.504881][ T8999] device bridge_slave_1 entered promiscuous mode [ 229.528087][ T8995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.538214][ T8999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.548333][ T8999] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.587890][ T8995] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.612482][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.622077][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.631244][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.638372][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.672439][ T8999] team0: Port device team_slave_0 added [ 229.679438][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.688562][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.697439][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.706125][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.714638][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.734978][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.743614][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.762446][ T8988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.775709][ T8995] team0: Port device team_slave_0 added [ 229.790554][ T8999] team0: Port device team_slave_1 added [ 229.790661][ T9009] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 229.835373][ T8985] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 229.852631][ T8985] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.875391][ T8988] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.886508][ T8995] team0: Port device team_slave_1 added [ 229.904654][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.913228][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.922174][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.931140][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.935474][ C0] hrtimer: interrupt took 44330 ns [ 229.939474][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.952135][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.966455][ T8990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.050428][ T8999] device hsr_slave_0 entered promiscuous mode [ 230.087642][ T8999] device hsr_slave_1 entered promiscuous mode 18:26:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x400301, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 230.164686][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.183026][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.192001][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.217735][ T3756] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.224809][ T3756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.243330][ T8990] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.260448][ T8985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.302836][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.312060][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.320589][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.329095][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.338402][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.351930][ T8993] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.359065][ T8993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.372782][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.381894][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:26:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 230.449058][ T8995] device hsr_slave_0 entered promiscuous mode [ 230.509223][ T8995] device hsr_slave_1 entered promiscuous mode [ 230.538489][ T9019] libceph: resolve 'l*b' (ret=-3): failed [ 230.544255][ T9019] libceph: parse_ips bad ip '[0::]:,l*b' 18:26:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 230.578749][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.603713][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.632756][ T3756] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.639901][ T3756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.644022][ T9025] libceph: resolve 'l*b' (ret=-3): failed [ 230.657173][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.665898][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.671270][ T9025] libceph: parse_ips bad ip '[0::]:,l*b' 18:26:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 230.674380][ T3756] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.686670][ T3756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.694974][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.703891][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.712595][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.755175][ T8988] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 230.776507][ T9028] libceph: resolve 'l*b' (ret=-3): failed [ 230.782351][ T9028] libceph: parse_ips bad ip '[0::]:,l*b' [ 230.788081][ T8988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 18:26:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 230.806146][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.814737][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.822728][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.846324][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.859655][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.876021][ T9030] libceph: resolve 'l*b' (ret=-3): failed [ 230.876252][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.896087][ T9030] libceph: parse_ips bad ip '[0::]:,l*b' [ 230.896914][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:26:40 executing program 0: mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 230.912521][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.920941][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.930110][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.947352][ T8999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.989023][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.010099][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:26:40 executing program 0: mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 231.034134][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.076193][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.115864][ T8999] 8021q: adding VLAN 0 to HW filter on device team0 18:26:40 executing program 1: r0 = timerfd_create(0x0, 0x0) readv(r0, 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) sendto$inet6(r2, &(0x7f0000000200)="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", 0xfc, 0x0, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfffffdda, 0x0, 0x0, 0xfffffd2f) [ 231.130329][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.144165][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.155384][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.191563][ T8988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.216736][ T8990] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 231.243433][ T8990] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.273307][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 231.287470][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.295948][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.306689][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.320543][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.329613][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.378425][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.400437][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.409342][ T8993] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.416414][ T8993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.429927][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.441871][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.456050][ T8993] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.463161][ T8993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.476577][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.486091][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.506195][ T8990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.574586][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.589268][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.610229][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.619429][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.628383][ T3756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.638359][ T8993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.667327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.676098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.685307][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.694198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:26:41 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 231.711339][ T8995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.720296][ T8999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.758569][ T8995] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.774824][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.793664][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.853261][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.870623][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 18:26:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) accept4(r0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 231.896246][ T8991] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.903483][ T8991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.933914][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.961717][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.972032][ T8991] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.979212][ T8991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.002289][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.023494][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.043688][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 232.060630][ T8999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.111646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.121807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.157566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.166172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.208500][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.231312][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.248478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.256801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.268118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.280264][ T8995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.291166][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.315018][ T8995] 8021q: adding VLAN 0 to HW filter on device batadv0 18:26:42 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 18:26:42 executing program 0: mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:42 executing program 3: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 18:26:42 executing program 1: r0 = timerfd_create(0x0, 0x0) readv(r0, 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) sendto$inet6(r2, &(0x7f0000000200)="c5eed7610f88e268cad0b4772130a9c795067e5dc74e43a210edb01e9242288e5e32d527c480227801b79d5c7cc1de6e482747ecef07472d44bea4f899f336ee68fc629ac49c87bee266ee806cc6bf05c1144892770e861e18cc4bcf08a94ab83d869cfb0b1c5b40ae1443c562849d2be30170c0f444a1ff592883a1b6f9eef05f2beba335a223a9d4997392b7b239a19477e55b77cc5030a9144cde6a7601269e3fbad755e8b7e850fc87fdbe030ba19adebcfb8fbf93e0c4588a4c43f51c587023b50aea3cc195af20dcc6863c5a4b48061a6fda4a3c10a88246952a998a2702436ceebd8ed764e35c258d94348e0c03856eb208066f2671ae8d06", 0xfc, 0x0, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfffffdda, 0x0, 0x0, 0xfffffd2f) 18:26:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x400000000000007, 0x0) 18:26:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x59) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) r1 = socket$inet(0x10, 0x4, 0xfffffffffffffffe) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/69, 0x45}, 0x1}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x40000000, 0x0) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7fff, 0x480201) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000140)={0xbc0004, 0x0, 0x0, [], 0x0}) unshare(0x40000000) socket$netlink(0x10, 0x3, 0x9) creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 232.678525][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 232.698395][ T9110] overlayfs: overlapping lowerdir path [ 232.730378][ T9110] overlayfs: unrecognized mount option "./file0" or missing value 18:26:42 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x400000000000007, 0x0) 18:26:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r2 = dup3(r1, r0, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x34000) 18:26:42 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 232.990132][ T9116] IPVS: ftp: loaded support on port[0] = 21 18:26:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x400000000000007, 0x0) 18:26:43 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:43 executing program 3: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 18:26:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:43 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000080)={0x0, 0x6}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00\x00?\x00'}) msgctl$MSG_STAT(0x0, 0xb, 0x0) [ 233.590107][ T9147] IPVS: ftp: loaded support on port[0] = 21 18:26:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 233.687036][ T9160] QAT: Invalid ioctl [ 233.774845][ T9160] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.782643][ T9160] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.032083][ T9160] QAT: Invalid ioctl 18:26:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x59) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) r1 = socket$inet(0x10, 0x4, 0xfffffffffffffffe) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/69, 0x45}, 0x1}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x40000000, 0x0) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7fff, 0x480201) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000140)={0xbc0004, 0x0, 0x0, [], 0x0}) unshare(0x40000000) socket$netlink(0x10, 0x3, 0x9) creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 18:26:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r2 = dup3(r1, r0, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x34000) 18:26:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r0, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000980)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 18:26:46 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20401, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 18:26:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{}, 0x0, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r2, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000080)={0x3, 0x0, [{}, {}, {}]}) 18:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:47 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioprio_set$pid(0x2, 0x0, 0x0) clone(0x801480ff, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) [ 237.390330][ T9186] IPVS: ftp: loaded support on port[0] = 21 18:26:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r2 = dup3(r1, r0, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x34000) 18:26:50 executing program 3: 18:26:50 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:26:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = gettid() kcmp(r1, r1, 0x0, r0, 0xffffffffffffffff) 18:26:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r0, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000980)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 18:26:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getegid() ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000240)={&(0x7f0000000080)=[0x7fffffff, 0x1, 0x2], 0x3, 0x9, 0x9, 0x800, 0x8, 0x190, {0x0, 0x9, 0x7, 0x3, 0x2, 0x0, 0x1, 0x10001, 0x3ff, 0x60b, 0x5765a330, 0x7, 0x0, 0x200, "91f2b39371fbe67dad00a1166fc99c96b941d1bc2d21c6504bfb4df7b12f004a"}}) gettid() ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e23, @broadcast}}) 18:26:50 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) 18:26:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xc29, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000280)={0x7, 0x21, 0x2}, 0x7) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) unshare(0x40000000) timer_gettime(0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) prctl$PR_SET_FPEMU(0xa, 0xb72f37704a5be4b7) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x87, @mcast2}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x100000001, 0x115100) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x2, 0x2000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) 18:26:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) 18:26:50 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[0::]:,l*b:\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) 18:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r2 = dup3(r1, r0, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x34000) 18:26:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) [ 241.063040][ T22] ================================================================== [ 241.071289][ T22] BUG: KASAN: use-after-free in blk_mq_free_rqs+0x49f/0x4b0 [ 241.078597][ T22] Read of size 8 at addr ffff88821994fd10 by task kworker/1:1/22 [ 241.086304][ T22] [ 241.088640][ T22] CPU: 1 PID: 22 Comm: kworker/1:1 Not tainted 5.2.0-rc3-next-20190607 #11 [ 241.097222][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.107295][ T22] Workqueue: events __blk_release_queue [ 241.112837][ T22] Call Trace: [ 241.116135][ T22] dump_stack+0x172/0x1f0 [ 241.120476][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.125424][ T22] print_address_description.cold+0xd4/0x306 [ 241.131413][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.136360][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.141309][ T22] __kasan_report.cold+0x1b/0x36 [ 241.146263][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.151222][ T22] kasan_report+0x12/0x20 [ 241.155569][ T22] __asan_report_load8_noabort+0x14/0x20 18:26:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10001) [ 241.161203][ T22] blk_mq_free_rqs+0x49f/0x4b0 [ 241.165973][ T22] ? dd_exit_queue+0x92/0xd0 [ 241.171087][ T22] ? kfree+0x1ec/0x2a0 [ 241.175174][ T22] blk_mq_sched_tags_teardown+0x126/0x210 [ 241.180903][ T22] ? dd_request_merge+0x230/0x230 [ 241.185931][ T22] blk_mq_exit_sched+0x1fa/0x2d0 [ 241.190881][ T22] elevator_exit+0x70/0xa0 [ 241.195374][ T22] __blk_release_queue+0x127/0x330 [ 241.200524][ T22] process_one_work+0x989/0x1790 [ 241.205476][ T22] ? pwq_dec_nr_in_flight+0x320/0x320 [ 241.210854][ T22] ? lock_acquire+0x16f/0x3f0 [ 241.215571][ T22] worker_thread+0x98/0xe40 [ 241.220086][ T22] ? trace_hardirqs_on+0x67/0x220 [ 241.225127][ T22] kthread+0x354/0x420 [ 241.229215][ T22] ? process_one_work+0x1790/0x1790 [ 241.234421][ T22] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 241.240691][ T22] ret_from_fork+0x24/0x30 [ 241.245120][ T22] [ 241.247455][ T22] Allocated by task 1: [ 241.251532][ T22] save_stack+0x23/0x90 [ 241.255690][ T22] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 241.261323][ T22] kasan_kmalloc+0x9/0x10 [ 241.265656][ T22] kmem_cache_alloc_trace+0x151/0x750 [ 241.271029][ T22] loop_add+0x51/0x8d0 [ 241.275103][ T22] loop_init+0x1fe/0x25a [ 241.279362][ T22] do_one_initcall+0x107/0x7ba [ 241.284129][ T22] kernel_init_freeable+0x4d4/0x5c3 [ 241.289353][ T22] kernel_init+0x12/0x1c5 [ 241.293684][ T22] ret_from_fork+0x24/0x30 [ 241.298104][ T22] [ 241.300436][ T22] Freed by task 9247: [ 241.304420][ T22] save_stack+0x23/0x90 [ 241.308590][ T22] __kasan_slab_free+0x102/0x150 [ 241.313534][ T22] kasan_slab_free+0xe/0x10 [ 241.318045][ T22] kfree+0x106/0x2a0 [ 241.321946][ T22] loop_remove+0xa1/0xd0 [ 241.326196][ T22] loop_control_ioctl+0x320/0x360 [ 241.331221][ T22] do_vfs_ioctl+0xdb6/0x13e0 [ 241.335818][ T22] ksys_ioctl+0xab/0xd0 [ 241.339975][ T22] __x64_sys_ioctl+0x73/0xb0 [ 241.344571][ T22] do_syscall_64+0xfd/0x680 [ 241.349084][ T22] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.354976][ T22] 18:26:51 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) [ 241.357319][ T22] The buggy address belongs to the object at ffff88821994fb00 [ 241.357319][ T22] which belongs to the cache kmalloc-1k of size 1024 [ 241.371368][ T22] The buggy address is located 528 bytes inside of [ 241.371368][ T22] 1024-byte region [ffff88821994fb00, ffff88821994ff00) [ 241.384731][ T22] The buggy address belongs to the page: [ 241.390397][ T22] page:ffffea0008665380 refcount:1 mapcount:0 mapping:ffff8880aa400ac0 index:0x0 compound_mapcount: 0 [ 241.401341][ T22] flags: 0x6fffc0000010200(slab|head) 18:26:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget(0x2, 0x1) msgctl$IPC_RMID(r0, 0x0) r1 = socket(0x400040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x208) [ 241.406734][ T22] raw: 06fffc0000010200 ffffea0008663188 ffffea000865b308 ffff8880aa400ac0 [ 241.415338][ T22] raw: 0000000000000000 ffff88821994e000 0000000100000007 0000000000000000 [ 241.423914][ T22] page dumped because: kasan: bad access detected [ 241.430319][ T22] [ 241.432674][ T22] Memory state around the buggy address: [ 241.438309][ T22] ffff88821994fc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 241.446370][ T22] ffff88821994fc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 241.454432][ T22] >ffff88821994fd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 241.462491][ T22] ^ [ 241.467078][ T22] ffff88821994fd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 241.475156][ T22] ffff88821994fe00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 241.483210][ T22] ================================================================== [ 241.491266][ T22] Disabling lock debugging due to kernel taint [ 241.589632][ T9263] IPVS: ftp: loaded support on port[0] = 21 [ 241.710745][ T22] Kernel panic - not syncing: panic_on_warn set ... [ 241.717396][ T22] CPU: 1 PID: 22 Comm: kworker/1:1 Tainted: G B 5.2.0-rc3-next-20190607 #11 [ 241.727366][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.737429][ T22] Workqueue: events __blk_release_queue [ 241.742968][ T22] Call Trace: [ 241.745804][ T3882] kobject: 'loop4' (000000001a4a092f): kobject_uevent_env [ 241.746261][ T22] dump_stack+0x172/0x1f0 [ 241.756313][ T3882] kobject: 'loop4' (000000001a4a092f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 241.757698][ T22] panic+0x2cb/0x744 [ 241.757712][ T22] ? __warn_printk+0xf3/0xf3 [ 241.757727][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.757740][ T22] ? preempt_schedule+0x4b/0x60 [ 241.757760][ T22] ? ___preempt_schedule+0x16/0x18 [ 241.791228][ T22] ? trace_hardirqs_on+0x5e/0x220 [ 241.796246][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.801180][ T22] end_report+0x47/0x4f [ 241.805316][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.810230][ T22] __kasan_report.cold+0xe/0x36 [ 241.815055][ T22] ? blk_mq_free_rqs+0x49f/0x4b0 [ 241.819969][ T22] kasan_report+0x12/0x20 [ 241.824290][ T22] __asan_report_load8_noabort+0x14/0x20 [ 241.829906][ T22] blk_mq_free_rqs+0x49f/0x4b0 [ 241.834663][ T22] ? dd_exit_queue+0x92/0xd0 [ 241.839229][ T22] ? kfree+0x1ec/0x2a0 [ 241.843283][ T22] blk_mq_sched_tags_teardown+0x126/0x210 [ 241.848987][ T22] ? dd_request_merge+0x230/0x230 [ 241.854008][ T22] blk_mq_exit_sched+0x1fa/0x2d0 [ 241.858924][ T22] elevator_exit+0x70/0xa0 [ 241.863328][ T22] __blk_release_queue+0x127/0x330 [ 241.868419][ T22] process_one_work+0x989/0x1790 [ 241.873338][ T22] ? pwq_dec_nr_in_flight+0x320/0x320 [ 241.878700][ T22] ? lock_acquire+0x16f/0x3f0 [ 241.883356][ T22] worker_thread+0x98/0xe40 [ 241.887843][ T22] ? trace_hardirqs_on+0x67/0x220 [ 241.892876][ T22] kthread+0x354/0x420 [ 241.896937][ T22] ? process_one_work+0x1790/0x1790 [ 241.902129][ T22] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 241.908362][ T22] ret_from_fork+0x24/0x30 [ 241.913722][ T22] Kernel Offset: disabled [ 241.918043][ T22] Rebooting in 86400 seconds..