[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.586627][ T26] audit: type=1800 audit(1570050472.344:25): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.608193][ T26] audit: type=1800 audit(1570050472.354:26): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.648738][ T26] audit: type=1800 audit(1570050472.354:27): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.96' (ECDSA) to the list of known hosts. 2019/10/02 21:08:04 fuzzer started 2019/10/02 21:08:05 dialing manager at 10.128.0.26:43397 2019/10/02 21:08:05 syscalls: 2523 2019/10/02 21:08:05 code coverage: enabled 2019/10/02 21:08:05 comparison tracing: enabled 2019/10/02 21:08:05 extra coverage: extra coverage is not supported by the kernel 2019/10/02 21:08:05 setuid sandbox: enabled 2019/10/02 21:08:05 namespace sandbox: enabled 2019/10/02 21:08:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/02 21:08:05 fault injection: enabled 2019/10/02 21:08:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/02 21:08:05 net packet injection: enabled 2019/10/02 21:08:05 net device setup: enabled 21:10:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:10:28 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000000140)=@generic={0x1e, "01fd000000000000000000f5fffffb00000005a121b80c00000000800000002e0a53b232b93445fb000100000000ffff0f82e52b0a669ae43a620170a00021f069cb028c00f9ecff1458d1ea03000030ff2de58360090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc145eb184900"}, 0x80) syzkaller login: [ 211.023393][ T8723] IPVS: ftp: loaded support on port[0] = 21 [ 211.153996][ T8725] IPVS: ftp: loaded support on port[0] = 21 21:10:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4100, 0x0) r3 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000180)=0x7f, 0x4) listen(r3, 0x0) splice(r2, &(0x7f0000000040), r3, &(0x7f0000000080), 0xffffffffffffff1a, 0xc) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 211.196890][ T8723] chnl_net:caif_netlink_parms(): no params data found [ 211.255658][ T8723] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.277617][ T8723] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.299793][ T8723] device bridge_slave_0 entered promiscuous mode [ 211.321112][ T8723] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.328188][ T8723] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.346197][ T8723] device bridge_slave_1 entered promiscuous mode [ 211.377675][ T8728] IPVS: ftp: loaded support on port[0] = 21 [ 211.412358][ T8723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:10:29 executing program 3: futex(&(0x7f000000cffc), 0x109, 0x0, 0x0, 0x0, 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) futex(0x0, 0x9, 0x1, 0x0, &(0x7f0000048000), 0x0) unlink(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xbe867fa38347d568}, 0x200, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000440)='dev ', 0x203) r2 = accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000001c0)={'nr0\x00', {0x2, 0x4e24, @empty}}) write(r1, &(0x7f0000000000)="160004b1", 0x4) fcntl$addseals(r1, 0x409, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000002) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140)={0x9}, 0x14) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) write(r4, &(0x7f0000000600), 0x0) ioctl$KDSETMODE(r4, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xfffffffffd) [ 211.464860][ T8723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.540446][ T8723] team0: Port device team_slave_0 added [ 211.570912][ T8723] team0: Port device team_slave_1 added [ 211.594524][ T8725] chnl_net:caif_netlink_parms(): no params data found 21:10:29 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000008880)=[{0x0}], 0x1}, 0xfffffffb}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket(0x10, 0x2, 0x0) write(r5, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="02090000020000070000000042e20000"], 0x10}}, 0x0) socket$inet6(0xa, 0x2000000080803, 0x1) socket(0x11, 0x800000003, 0x0) recvmmsg(r5, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@broadcast, @in6=@remote, 0x4e20, 0x400, 0x4e21, 0x1ff, 0xa, 0x20, 0xa0, 0x2}, {0x7, 0xfff, 0x9, 0x6, 0x1, 0x44, 0x3, 0x1}, {0x9c84, 0xdfd1, 0x3, 0xffffffffffffffad}, 0xa9, 0x6e6bbf, 0x0, 0x1, 0x2}, {{@in6=@loopback, 0x4d3, 0x32}, 0x2, @in6=@mcast1, 0x3507, 0x328ad2959b927f78, 0x3, 0x20, 0x0, 0x0, 0x8000}}, 0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 211.761631][ T8723] device hsr_slave_0 entered promiscuous mode [ 211.799056][ T8723] device hsr_slave_1 entered promiscuous mode [ 211.874130][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.885916][ T8731] IPVS: ftp: loaded support on port[0] = 21 [ 211.894335][ T8725] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.906617][ T8725] device bridge_slave_0 entered promiscuous mode [ 211.923661][ T8723] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.930893][ T8723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.938745][ T8723] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.945807][ T8723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.960261][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.967309][ T8725] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.975062][ T8733] IPVS: ftp: loaded support on port[0] = 21 [ 211.985846][ T8725] device bridge_slave_1 entered promiscuous mode [ 212.007619][ T8725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:10:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(0x0, 0xe2, 0x410000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x140000) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) dup3(r3, r2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x84601030}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b400", @ANYRES16, @ANYBLOB="000221bd7000fedbcf250100080008000100", @ANYRES32, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004008100000008000600", @ANYRES32, @ANYBLOB='\b', @ANYRES32=r5, @ANYBLOB, @ANYRES32], 0xa}, 0x1, 0x0, 0x0, 0x40080}, 0x40) sendmmsg$sock(r3, 0x0, 0x0, 0x4000000) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x277, 0x0, 0x17b], [0x3a]}) r9 = syz_open_dev$sndctrl(&(0x7f0000000700)='/dev/snd/controlC#\x00', 0x8, 0x84101) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r9, 0xc008551b, &(0x7f0000000740)={0x9, 0x4, [0x80000001]}) r10 = getpgrp(0x0) setpriority(0x1, r10, 0x101) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x18, 0x4, 0x3, 0x0, r11}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r12, &(0x7f00000001c0), 0x0}, 0x20) mmap(&(0x7f0000fed000/0x11000)=nil, 0x11000, 0x16ca9a2f22726620, 0x10, r12, 0x0) readv(r12, &(0x7f0000004680)=[{&(0x7f0000000500)=""/68, 0x44}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000440)=""/44, 0x2c}, {&(0x7f0000000580)=""/81, 0x51}, {&(0x7f0000000600)=""/84, 0x54}, {&(0x7f0000000680)=""/50, 0x32}, {0x0}, {&(0x7f0000004480)=""/135, 0x87}, {&(0x7f0000004540)=""/138, 0x8a}, {&(0x7f0000004600)=""/98, 0x62}], 0xa) clock_gettime(0x3, &(0x7f0000000180)) [ 212.044630][ T8725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.152780][ T8725] team0: Port device team_slave_0 added [ 212.189543][ T8728] chnl_net:caif_netlink_parms(): no params data found [ 212.201590][ T8725] team0: Port device team_slave_1 added [ 212.215538][ T8723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.232811][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.251458][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.260364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 212.353078][ T8737] IPVS: ftp: loaded support on port[0] = 21 [ 212.410757][ T8725] device hsr_slave_0 entered promiscuous mode [ 212.448980][ T8725] device hsr_slave_1 entered promiscuous mode [ 212.488863][ T8725] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.502015][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.511169][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.527810][ T8723] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.537800][ T8733] chnl_net:caif_netlink_parms(): no params data found [ 212.546848][ T8731] chnl_net:caif_netlink_parms(): no params data found [ 212.564650][ T8728] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.571886][ T8728] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.581249][ T8728] device bridge_slave_0 entered promiscuous mode [ 212.603416][ T8728] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.610971][ T8728] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.621254][ T8728] device bridge_slave_1 entered promiscuous mode [ 212.638591][ T8728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.677680][ T8728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.694256][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.702886][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.711845][ T8734] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.718947][ T8734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.758239][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.766549][ T8733] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.774402][ T8733] device bridge_slave_0 entered promiscuous mode [ 212.786763][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.795688][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.804410][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.811456][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.819665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.839761][ T8731] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.846841][ T8731] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.855262][ T8731] device bridge_slave_0 entered promiscuous mode [ 212.864307][ T8731] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.871604][ T8731] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.879670][ T8731] device bridge_slave_1 entered promiscuous mode [ 212.886449][ T8733] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.893938][ T8733] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.902216][ T8733] device bridge_slave_1 entered promiscuous mode [ 212.911260][ T8728] team0: Port device team_slave_0 added [ 212.920619][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.929774][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.938287][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.948500][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.000990][ T8728] team0: Port device team_slave_1 added [ 213.051645][ T8728] device hsr_slave_0 entered promiscuous mode [ 213.089096][ T8728] device hsr_slave_1 entered promiscuous mode [ 213.128953][ T8728] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.140603][ T8731] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.151052][ T8733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.165449][ T8733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.183287][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.192275][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.201459][ T8737] chnl_net:caif_netlink_parms(): no params data found [ 213.215923][ T8731] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.243527][ T8731] team0: Port device team_slave_0 added [ 213.261308][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.270067][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.278131][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.286675][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.297693][ T8733] team0: Port device team_slave_0 added [ 213.305141][ T8733] team0: Port device team_slave_1 added [ 213.311743][ T8731] team0: Port device team_slave_1 added [ 213.337122][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.345309][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.353702][ T8737] device bridge_slave_0 entered promiscuous mode [ 213.361880][ T8723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.384958][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.395304][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.403092][ T8737] device bridge_slave_1 entered promiscuous mode [ 213.471081][ T8733] device hsr_slave_0 entered promiscuous mode [ 213.518999][ T8733] device hsr_slave_1 entered promiscuous mode [ 213.578731][ T8733] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.641021][ T8731] device hsr_slave_0 entered promiscuous mode [ 213.679105][ T8731] device hsr_slave_1 entered promiscuous mode [ 213.718833][ T8731] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.732610][ T8737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.744354][ T8737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.771813][ T8737] team0: Port device team_slave_0 added [ 213.779002][ T8737] team0: Port device team_slave_1 added [ 213.832787][ T8737] device hsr_slave_0 entered promiscuous mode [ 213.889027][ T8737] device hsr_slave_1 entered promiscuous mode [ 213.938835][ T8737] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.954058][ T8723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.008066][ T8725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.047820][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.057828][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.070830][ T8725] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.088341][ T8733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.119290][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.128192][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.137678][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.144770][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.152352][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.160992][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.169475][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.176519][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.184137][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.192571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.210248][ T8728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.225853][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.235647][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.244696][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.254461][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.263357][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.271135][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.310439][ T8733] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.321719][ T8728] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.330440][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.343723][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.352796][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.362249][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.370348][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.378453][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.386639][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.394621][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.409384][ T8725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.424268][ T8737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.450998][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.459828][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.486435][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.493568][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.502217][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.511076][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.519880][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.526939][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.534819][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.543791][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.552455][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.559558][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.567113][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.576165][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.584699][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.591799][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.600155][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.608623][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.617889][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.626134][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:10:32 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82c0c0, 0x0) timer_create(0x0, &(0x7f0000000080), 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 214.644599][ T8731] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.669093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.682167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.704704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.713519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.722540][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.732826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.742723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.753908][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.765054][ C0] hrtimer: interrupt took 25300 ns [ 214.777442][ T8731] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.794365][ T8737] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.810589][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.818301][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.832679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.843846][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 21:10:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8002, &(0x7f0000000380)=0x1, 0xeda) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 214.856651][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.867651][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.882353][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.893503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.904236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.915945][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.925727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.934742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.943154][ T8761] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 214.960064][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.968448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.976982][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.985408][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.002886][ T8725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.032526][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.044324][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.086733][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.095473][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.104094][ T8741] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.111182][ T8741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.119670][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.128198][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.136909][ T8741] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.144003][ T8741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.153977][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.163023][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.171722][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.180816][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.198898][ T8741] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.205953][ T8741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.222790][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:10:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 215.231554][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.240255][ T8741] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.247305][ T8741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.255252][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.264819][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.274130][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.283251][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.296990][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.305421][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.313832][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:10:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1fc, 0x0) [ 215.358754][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.367493][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.388236][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.410696][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.420934][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.430022][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.437216][ T8779] ptrace attach of "/root/syz-executor.0"[8723] was attempted by "/root/syz-executor.0"[8779] [ 215.445837][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.462325][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.472613][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.481330][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.490060][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.506905][ T8737] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.518539][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.528039][ T8780] ptrace attach of "/root/syz-executor.0"[8723] was attempted by "/root/syz-executor.0"[8780] [ 215.551051][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:10:33 executing program 0: r0 = gettid() accept(0xffffffffffffffff, &(0x7f0000001380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) sched_rr_get_interval(r0, &(0x7f0000001500)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x3, 0x108000001, 0x0, 0xffffffffffffffff, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x988, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xff, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ftruncate(r2, 0x401) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) [ 215.559716][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.567827][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.588525][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.617825][ T8728] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.631497][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.643386][ T8733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.666457][ T8737] 8021q: adding VLAN 0 to HW filter on device batadv0 21:10:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x400}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/120, 0x78}, {&(0x7f00000004c0)=""/116, 0x74}], 0x2, &(0x7f00000003c0)=""/24, 0x18}, 0xfffffffffffffff9}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) 21:10:33 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) [ 215.763602][ T8731] 8021q: adding VLAN 0 to HW filter on device batadv0 21:10:33 executing program 0: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x9) r4 = gettid() tkill(r4, 0x10010000000032) [ 216.243166][ T8821] devpts: called with bogus options [ 216.331312][ T8817] debugfs: Directory 'vcpu0' with parent '8817-4' already present! [ 216.375022][ T8833] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/3' not defined. 21:10:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4100, 0x0) r3 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000180)=0x7f, 0x4) listen(r3, 0x0) splice(r2, &(0x7f0000000040), r3, &(0x7f0000000080), 0xffffffffffffff1a, 0xc) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 21:10:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000040)={0xa, 0x401, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 216.899107][ T8852] debugfs: Directory 'vcpu0' with parent '8852-4' already present! [ 216.978009][ T8821] devpts: called with bogus options 21:10:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:10:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='gid_map\x00') prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 21:10:34 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008a00), 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) write(r5, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) socket$inet6(0xa, 0x2000000080803, 0x1) socket(0x11, 0x800000003, 0x0) recvmmsg(r5, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@broadcast, @in6=@remote, 0x4e20, 0x400, 0x4e21, 0x1ff, 0xa, 0x20, 0xa0}, {0x7, 0xfff, 0x9, 0x6, 0x1, 0x44, 0x3, 0x1}, {0x9c84, 0xdfd1, 0x3, 0xffffffffffffffad}, 0xa9, 0x6e6bbf, 0x0, 0x1, 0x2, 0x2}, {{@in6=@loopback, 0x4d3, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x328ad2959b927f78, 0x3, 0x20, 0xa22, 0x101, 0x8000}}, 0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 21:10:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:10:34 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r0, &(0x7f0000000000)=@full={0xb, @dev, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @bcast, @remote, @default]}, 0x40) [ 217.168361][ T8871] devpts: called with bogus options 21:10:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000100)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040), 0x4) 21:10:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1fc, 0x0) 21:10:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000100)=0xffffffffffff0000) close(r0) [ 217.438359][ T8887] devpts: called with bogus options 21:10:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {@in=@broadcast, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x80}}]}, 0x13c}}, 0x0) [ 217.496292][ T8902] ptrace attach of "/root/syz-executor.4"[8733] was attempted by "/root/syz-executor.4"[8902] 21:10:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:35 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) [ 217.620327][ T8910] ptrace attach of "/root/syz-executor.4"[8733] was attempted by "/root/syz-executor.4"[8910] 21:10:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000540)={&(0x7f0000ffb000/0x5000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000100)) socket$inet_tcp(0x2, 0x1, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) 21:10:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:35 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f00000002c0)=""/163, 0x100000345, 0x0, 0x0, 0xfffffffffffffeb4) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) pipe(0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000002c0)={{0x0, @multicast1, 0xffff, 0x0, 'dh\x00\x00\x00\x00\x19\x00', 0x0, 0x8}, {@local, 0x1000}}, 0x44) r2 = socket$inet6(0xa, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$inet6(0xa, 0x0, 0x1) socket(0x11, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0xffff, 0x0, 0x10, 0x0, 0x2}}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6}}, 0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000100)=""/65, 0x41, 0x40000121, &(0x7f0000000000)={0x11, 0x14, 0x0, 0x1, 0x100000001, 0x6, @random="67499555940b"}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@local, 0x27}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000040)={@remote, 0x21}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)=0x5) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 21:10:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1000000000001132}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 21:10:36 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000980)=""/139) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000340)) io_setup(0x0, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 21:10:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:36 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x6, &(0x7f00000000c0), 0x10) 21:10:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000540), 0x1000) open(&(0x7f0000000040)='./file0/file1\x00', 0x206000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4, 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x90) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, 0x0) 21:10:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) [ 218.801814][ T8959] device nr0 entered promiscuous mode 21:10:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r1, &(0x7f0000000040), 0xc) [ 219.172422][ T8959] device nr0 entered promiscuous mode 21:10:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82c0c0, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 21:10:37 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b8}, 0x0, 0x0) 21:10:37 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000003c0), 0x1) syz_genetlink_get_family_id$tipc(0x0) 21:10:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:37 executing program 2: tkill(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:10:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x109) r2 = dup2(r0, r1) clone(0x1ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffc37, &(0x7f0000000200)={0x0, 0xffffff4a}}, 0x0) 21:10:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000000c0), 0x10) 21:10:37 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:37 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 21:10:37 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:37 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000780)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cc"]) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000880)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:10:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x4, 0x0, 0xffffffff}, 0x3c) 21:10:37 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:37 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:37 executing program 2: 21:10:38 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:38 executing program 2: 21:10:38 executing program 3: 21:10:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:38 executing program 3: 21:10:38 executing program 4: 21:10:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:38 executing program 2: 21:10:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:10:38 executing program 3: 21:10:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:38 executing program 2: 21:10:38 executing program 3: 21:10:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:10:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:38 executing program 4: 21:10:38 executing program 2: 21:10:39 executing program 3: 21:10:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:39 executing program 4: 21:10:39 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:39 executing program 2: 21:10:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:10:39 executing program 3: 21:10:39 executing program 4: 21:10:39 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:39 executing program 2: 21:10:39 executing program 4: 21:10:39 executing program 3: 21:10:39 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:39 executing program 4: 21:10:39 executing program 2: 21:10:39 executing program 4: 21:10:39 executing program 3: 21:10:39 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:39 executing program 2: 21:10:39 executing program 3: 21:10:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:39 executing program 4: 21:10:40 executing program 2: 21:10:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:40 executing program 4: 21:10:40 executing program 3: 21:10:40 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:40 executing program 2: 21:10:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) set_mempolicy(0x8002, &(0x7f0000000380)=0x1, 0xeda) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 21:10:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:40 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:40 executing program 3: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) 21:10:40 executing program 2: 21:10:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:40 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:40 executing program 4: 21:10:40 executing program 2: 21:10:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:40 executing program 4: 21:10:40 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:40 executing program 2: 21:10:41 executing program 3: 21:10:41 executing program 4: 21:10:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:41 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x80000009, 0x0) 21:10:41 executing program 2: 21:10:41 executing program 2: 21:10:41 executing program 4: 21:10:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:41 executing program 3: 21:10:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 21:10:41 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:41 executing program 2: 21:10:41 executing program 4: 21:10:41 executing program 3: 21:10:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x0) 21:10:41 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:41 executing program 3: 21:10:41 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:10:41 executing program 4: clock_adjtime(0x0, &(0x7f0000000080)={0xfff, 0x0, 0x3b9ac9ff}) 21:10:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x0) 21:10:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, 0x0, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 21:10:42 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82c0c0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f00000001c0)=@netrom={'nr', 0x0}, 0x10) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 21:10:42 executing program 4: membarrier(0x10, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) membarrier(0x100000008, 0x0) 21:10:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x0) 21:10:42 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 21:10:42 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 21:10:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) [ 224.519662][ T9353] [ 224.522024][ T9353] ================================================ [ 224.528509][ T9353] WARNING: lock held when returning to user space! [ 224.535000][ T9353] 5.4.0-rc1 #0 Not tainted [ 224.539412][ T9353] ------------------------------------------------ [ 224.545908][ T9353] syz-executor.4/9353 is leaving the kernel with locks still held! [ 224.553880][ T9353] 1 lock held by syz-executor.4/9353: [ 224.559240][ T9353] #0: ffffffff88faad00 (rcu_read_lock){....}, at: membarrier_private_expedited+0x180/0x590 21:10:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:10:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001d00810ee00f80ecdb4cb9e307f029a0500000002f003efb0a0002000300000000000f00060005000600", 0x2e}], 0x1}, 0x0) [ 224.580438][ T3892] kobject: 'loop1' (0000000026d5bfd4): kobject_uevent_env [ 224.598406][ T3892] kobject: 'loop1' (0000000026d5bfd4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 224.627958][ T3892] kobject: 'loop5' (0000000048a0c24a): kobject_uevent_env [ 224.646159][ T3892] kobject: 'loop5' (0000000048a0c24a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 224.661020][ T9353] ------------[ cut here ]------------ [ 224.666511][ T9353] WARNING: CPU: 0 PID: 9353 at kernel/rcu/tree_plugin.h:293 rcu_note_context_switch+0x373/0x1910 21:10:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, 0x0, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 21:10:42 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) [ 224.676995][ T9353] Kernel panic - not syncing: panic_on_warn set ... [ 224.683580][ T9353] CPU: 0 PID: 9353 Comm: syz-executor.4 Not tainted 5.4.0-rc1 #0 [ 224.691288][ T9353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.701334][ T9353] Call Trace: [ 224.704653][ T9353] dump_stack+0x172/0x1f0 [ 224.707282][ T3892] kobject: 'loop5' (0000000048a0c24a): kobject_uevent_env [ 224.708989][ T9353] ? rcu_note_context_switch+0x310/0x1910 [ 224.709001][ T9353] panic+0x2dc/0x755 [ 224.709011][ T9353] ? add_taint.cold+0x16/0x16 [ 224.709024][ T9353] ? printk+0xba/0xed [ 224.709035][ T9353] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 224.709050][ T9353] ? __warn.cold+0x14/0x3c [ 224.734625][ T3892] kobject: 'loop5' (0000000048a0c24a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 224.739764][ T9353] ? rcu_note_context_switch+0x373/0x1910 [ 224.739774][ T9353] __warn.cold+0x2f/0x3c [ 224.739787][ T9353] ? report_bug.cold+0x63/0xad [ 224.739798][ T9353] ? rcu_note_context_switch+0x373/0x1910 [ 224.739813][ T9353] report_bug+0x289/0x300 21:10:42 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x3c) [ 224.779017][ T9353] do_error_trap+0x11b/0x200 [ 224.783610][ T9353] do_invalid_op+0x37/0x50 [ 224.788025][ T9353] ? rcu_note_context_switch+0x373/0x1910 [ 224.791340][ T3892] kobject: 'loop5' (0000000048a0c24a): kobject_uevent_env [ 224.793743][ T9353] invalid_op+0x23/0x30 [ 224.804958][ T9353] RIP: 0010:rcu_note_context_switch+0x373/0x1910 [ 224.805994][ T3892] kobject: 'loop5' (0000000048a0c24a): fill_kobj_path: path = '/devices/virtual/block/loop5' 21:10:42 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x3c) [ 224.811276][ T9353] Code: 8b 13 48 85 d2 75 c3 48 8b 5d c8 65 ff 0d bd 78 a1 7e 0f 85 fa fc ff ff e8 2a e2 9f ff e9 f0 fc ff ff 85 d2 0f 8e 62 fe ff ff <0f> 0b e9 1f fe ff ff 65 8b 1d df 0d a1 7e 83 fb 3f 0f 87 0d 0e 00 [ 224.811284][ T9353] RSP: 0018:ffff888051fffd58 EFLAGS: 00010002 [ 224.811296][ T9353] RAX: ffffffff89c5e674 RBX: ffff8880ae835ac0 RCX: 1ffff1100a3fe0b7 [ 224.811303][ T9353] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff888051ff05b8 [ 224.811311][ T9353] RBP: ffff888051fffdc8 R08: 1ffffffff138b690 R09: fffffbfff138b691 [ 224.811318][ T9353] R10: fffffbfff138b690 R11: ffffffff89c5b487 R12: 0000000000000000 21:10:42 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x3c) [ 224.811331][ T9353] R13: ffff888051ff0240 R14: 0000000000000000 R15: ffff8880ae834d18 [ 224.876350][ T3892] kobject: 'loop5' (0000000048a0c24a): kobject_uevent_env [ 224.878928][ T9353] ? rcu_note_context_switch+0x51f/0x1910 [ 224.878942][ T9353] ? schedule+0xd9/0x260 [ 224.878959][ T9353] ? trace_hardirqs_off+0x62/0x240 [ 224.887025][ T3892] kobject: 'loop5' (0000000048a0c24a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 224.893994][ T9353] __schedule+0x25e/0x1e70 [ 224.894010][ T9353] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 224.894023][ T9353] ? preempt_schedule_irq+0xf3/0x160 [ 224.894035][ T9353] ? __sched_text_start+0x8/0x8 [ 224.894053][ T9353] ? retint_kernel+0x2b/0x2b [ 224.943680][ T9353] schedule+0xd9/0x260 [ 224.947758][ T9353] exit_to_usermode_loop+0x195/0x380 [ 224.953044][ T9353] do_syscall_64+0x65f/0x760 [ 224.957635][ T9353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.963525][ T9353] RIP: 0033:0x459a29 [ 224.967415][ T9353] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.981858][ T3892] kobject: 'loop5' (0000000048a0c24a): kobject_uevent_env [ 224.987017][ T9353] RSP: 002b:00007f86990cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000144 [ 224.995684][ T3892] kobject: 'loop5' (0000000048a0c24a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 225.002480][ T9353] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000459a29 [ 225.002488][ T9353] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000100000008 [ 225.002497][ T9353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.002505][ T9353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86990d06d4 [ 225.002512][ T9353] R13: 00000000004c607f R14: 00000000004daf48 R15: 00000000ffffffff [ 225.003844][ T9353] Kernel Offset: disabled [ 225.057978][ T9353] Rebooting in 86400 seconds..