[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.700718][ T26] audit: type=1800 audit(1566835378.668:25): pid=8656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.745604][ T26] audit: type=1800 audit(1566835378.668:26): pid=8656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.783268][ T26] audit: type=1800 audit(1566835378.668:27): pid=8656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2019/08/26 16:03:10 fuzzer started 2019/08/26 16:03:13 dialing manager at 10.128.0.26:45029 2019/08/26 16:03:13 syscalls: 2487 2019/08/26 16:03:13 code coverage: enabled 2019/08/26 16:03:13 comparison tracing: enabled 2019/08/26 16:03:13 extra coverage: extra coverage is not supported by the kernel 2019/08/26 16:03:13 setuid sandbox: enabled 2019/08/26 16:03:13 namespace sandbox: enabled 2019/08/26 16:03:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/26 16:03:13 fault injection: enabled 2019/08/26 16:03:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/26 16:03:13 net packet injection: enabled 2019/08/26 16:03:13 net device setup: enabled 16:05:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x64}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:05:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') sendfile(r0, r2, 0x0, 0x80000002) syzkaller login: [ 213.764342][ T8821] IPVS: ftp: loaded support on port[0] = 21 16:05:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8095, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") r3 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e733) [ 213.968942][ T8824] IPVS: ftp: loaded support on port[0] = 21 [ 214.022873][ T8821] chnl_net:caif_netlink_parms(): no params data found [ 214.154379][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.163408][ T8821] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.172271][ T8821] device bridge_slave_0 entered promiscuous mode [ 214.183299][ T8821] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.191288][ T8821] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.200891][ T8821] device bridge_slave_1 entered promiscuous mode [ 214.238932][ T8827] IPVS: ftp: loaded support on port[0] = 21 [ 214.251032][ T8824] chnl_net:caif_netlink_parms(): no params data found [ 214.267725][ T8821] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.292049][ T8821] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:05:34 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) [ 214.341853][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.353206][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.364929][ T8824] device bridge_slave_0 entered promiscuous mode [ 214.391667][ T8821] team0: Port device team_slave_0 added [ 214.415883][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.423006][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.431957][ T8824] device bridge_slave_1 entered promiscuous mode [ 214.459652][ T8821] team0: Port device team_slave_1 added [ 214.509514][ T8824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.530127][ T8829] IPVS: ftp: loaded support on port[0] = 21 [ 214.544642][ T8824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:05:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cbf81a1c51a32"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xf7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\t\x00\x00\x00\x00\x00\x00\x00\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 214.600694][ T8821] device hsr_slave_0 entered promiscuous mode [ 214.655834][ T8821] device hsr_slave_1 entered promiscuous mode [ 214.791508][ T8831] IPVS: ftp: loaded support on port[0] = 21 16:05:34 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="01"], 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000100)) [ 214.840991][ T8824] team0: Port device team_slave_0 added [ 214.854289][ T8821] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.861985][ T8821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.870390][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.877597][ T8821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.918258][ T8824] team0: Port device team_slave_1 added [ 214.954291][ T8827] chnl_net:caif_netlink_parms(): no params data found [ 214.984976][ T2919] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.993674][ T2919] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.035154][ T8835] IPVS: ftp: loaded support on port[0] = 21 [ 215.068710][ T8824] device hsr_slave_0 entered promiscuous mode [ 215.125907][ T8824] device hsr_slave_1 entered promiscuous mode [ 215.165830][ T8824] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.243656][ T8827] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.251131][ T8827] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.261088][ T8827] device bridge_slave_0 entered promiscuous mode [ 215.291467][ T8829] chnl_net:caif_netlink_parms(): no params data found [ 215.309387][ T8827] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.317169][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.326089][ T8827] device bridge_slave_1 entered promiscuous mode [ 215.351909][ T8827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.381452][ T8821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.392953][ T8827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.444076][ T8821] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.461774][ T8829] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.469785][ T8829] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.479197][ T8829] device bridge_slave_0 entered promiscuous mode [ 215.487836][ T8829] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.496984][ T8829] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.506321][ T8829] device bridge_slave_1 entered promiscuous mode [ 215.530097][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.539617][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.548371][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.557831][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.576276][ T8837] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.583645][ T8837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.595975][ T8827] team0: Port device team_slave_0 added [ 215.612336][ T8829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.628347][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.637609][ T8837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.646601][ T8837] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.654535][ T8837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.669514][ T8827] team0: Port device team_slave_1 added [ 215.692051][ T8829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.704304][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.729207][ T8824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.808351][ T8827] device hsr_slave_0 entered promiscuous mode [ 215.846333][ T8827] device hsr_slave_1 entered promiscuous mode [ 215.905582][ T8827] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.915781][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.924564][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.933748][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.952523][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.011136][ T8829] team0: Port device team_slave_0 added [ 216.021342][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.036480][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.073482][ T8831] chnl_net:caif_netlink_parms(): no params data found [ 216.101076][ T8829] team0: Port device team_slave_1 added [ 216.109120][ T8835] chnl_net:caif_netlink_parms(): no params data found [ 216.124586][ T8824] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.146799][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.156641][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.168234][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.177065][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.215032][ T8835] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.223781][ T8835] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.233673][ T8835] device bridge_slave_0 entered promiscuous mode [ 216.253688][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.261995][ T8831] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.274278][ T8831] device bridge_slave_0 entered promiscuous mode [ 216.282486][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.290022][ T8831] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.297890][ T8831] device bridge_slave_1 entered promiscuous mode [ 216.319993][ T8831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.334430][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.344024][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.353330][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.360630][ T8834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.369878][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.379207][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.388339][ T8835] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.396570][ T8835] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.405215][ T8835] device bridge_slave_1 entered promiscuous mode [ 216.467636][ T8829] device hsr_slave_0 entered promiscuous mode [ 216.506004][ T8829] device hsr_slave_1 entered promiscuous mode [ 216.545634][ T8829] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.556552][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.567164][ T8831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.588880][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.625144][ T8831] team0: Port device team_slave_0 added [ 216.657079][ T8831] team0: Port device team_slave_1 added [ 216.668790][ T8835] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.694600][ T8824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 216.708282][ T8824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.726171][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.735125][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.743988][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.751683][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.761983][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.771804][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.782921][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.791671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.800906][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.809771][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.818908][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.827644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.836903][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.846870][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.856482][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.864704][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.874406][ T8821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.895803][ T8835] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.971164][ T8824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.001738][ T8835] team0: Port device team_slave_0 added [ 217.038851][ T8831] device hsr_slave_0 entered promiscuous mode [ 217.105835][ T8831] device hsr_slave_1 entered promiscuous mode [ 217.165714][ T8831] debugfs: Directory 'hsr0' with parent '/' already present! [ 217.177561][ T8829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.189947][ T8835] team0: Port device team_slave_1 added [ 217.214678][ T8827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.265016][ T8827] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.280278][ T8829] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.288483][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.297888][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.306857][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.314908][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.357675][ T8835] device hsr_slave_0 entered promiscuous mode [ 217.405923][ T8835] device hsr_slave_1 entered promiscuous mode [ 217.466530][ T8835] debugfs: Directory 'hsr0' with parent '/' already present! [ 217.500541][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.524939][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.535694][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.542894][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.557931][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.567383][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.576929][ T2919] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.584396][ T2919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.595185][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.605015][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.614910][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.623836][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.631047][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.639723][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.647707][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000240)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x80}}) dup2(r1, r0) [ 217.702756][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.721964][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.762478][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.769815][ T8834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.778391][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.787245][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.802472][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.813051][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.819189][ C1] hrtimer: interrupt took 61941 ns 16:05:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendfile(r1, r2, 0x0, 0xbd19) [ 217.863597][ T8829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.879673][ T8829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.907769][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.920099][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.930457][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.940037][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.948851][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.962232][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.970926][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.979581][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.988350][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.997104][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.006252][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.015345][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.024453][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.033229][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.041738][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.050240][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.059496][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.067583][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.077899][ T8827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:05:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='cgroup2\x00\x05\x8b\\\x01\x8fP\xbd\xf1d\\h\xe2l\xad\x8f\x1e\xb7`\xda\xf2#\xb4\xd6#\xae\x1e\t\tB/\x04+a\x14\xe8\x82\aDKY\xbb\x0e\x0e\xe1=\xe7\x838V\xba\xb9\xe4\x05\x81\x8aO\x14P\x87\xf3\x01\x1c\xf3Z\x8cY\xc5m\x8e0\xa4U\xa5\x029\xc6\x8cb\xef\xe9z(\x19D\xa8\xc0\xc0j&\xfc\xd2W\xear\x8e\'\xe2\xc9e\xcdq\x89\x18U5\x0f\x84Q\xb4\xc5\x90Z\xcd\xb38\xbd\x9f\rag\x04\x04!GT\xd7\x0f\xfd\xe6\x9c\xac\x88X\x17U\xebE\x83\x04\xd7', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) 16:05:38 executing program 0: r0 = socket$inet(0x10, 0x3, 0x100000000000c) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="240000000e0607031dfffd946fa2830020200a0009000100071d85a2046e36ad2807eee6", 0x24}], 0x1}, 0x0) [ 218.124144][ T8831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.203300][ T8831] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.240950][ T8827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.241090][ T8874] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 218.261381][ T8829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.270089][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.276754][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 218.278549][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.297111][ T8874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:05:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x28e, &(0x7f0000001a40)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 218.336758][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.352575][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 16:05:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) [ 218.387865][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.395087][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.411158][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.428266][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.437551][ T2919] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.444818][ T2919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.452828][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.465979][ T8835] 8021q: adding VLAN 0 to HW filter on device bond0 16:05:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x28e, &(0x7f0000001a40)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 218.523989][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.534736][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.567972][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.580890][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.590281][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.599378][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.609733][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.618499][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.640010][ T8831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 16:05:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x28e, &(0x7f0000001a40)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 218.667872][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.691128][ T8835] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.701245][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.710914][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.727887][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.742036][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.750774][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.814396][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.842673][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.857931][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.865079][ T8834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.884891][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.895148][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.904438][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.911625][ T8834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.952189][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.012648][ T8831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.039853][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.054985][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.084380][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.110449][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.141249][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.152110][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.169067][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.177945][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.186862][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.203283][ T8835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.216443][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.230265][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.242382][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.279989][ T8835] 8021q: adding VLAN 0 to HW filter on device batadv0 16:05:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0x0, 0x2, r3}) 16:05:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x28e, &(0x7f0000001a40)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 219.480708][ T8938] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 219.617258][ T8937] device nr0 entered promiscuous mode [ 219.934258][ T8937] device nr0 entered promiscuous mode 16:05:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cbf81a1c51a32"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xf7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\t\x00\x00\x00\x00\x00\x00\x00\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 16:05:40 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 16:05:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 16:05:40 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 16:05:40 executing program 5: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) sendmmsg$inet6(r0, &(0x7f0000004240)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="ce3834a9c06d2c2b257a4447b335c1a8"}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)='i', 0x85ce}], 0x5}}, {{&(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000001640)=[{&(0x7f00000002c0)="b2", 0x1}], 0x1}}], 0x2, 0x0) 16:05:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x7, 0x0, 0x0, [{}]}]}}, &(0x7f0000000080)=""/236, 0x32, 0xec, 0x1}, 0x20) 16:05:40 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 16:05:40 executing program 2: r0 = socket$inet(0x2, 0x2800080001, 0x84) bind$inet(r0, &(0x7f0000001740)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x6d, &(0x7f0000000240), &(0x7f0000000280)=0x4d) 16:05:40 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 16:05:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x5, 0x3, 0xe001}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 16:05:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 16:05:40 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) [ 220.520577][ T8962] device nr0 entered promiscuous mode 16:05:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff56, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:05:40 executing program 0: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RSETATTR(r0, &(0x7f0000000080)={0xffffffffffffffb0}, 0x8397) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x1, 0x5}) 16:05:40 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3e0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0305710, 0x0) 16:05:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 16:05:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1}, 0x0) 16:05:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cbf81a1c51a32"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xf7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\t\x00\x00\x00\x00\x00\x00\x00\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 16:05:40 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000005300)) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001480), &(0x7f0000001500)=0x6e) sendto(r0, &(0x7f0000001380)="ad3937c4e980209e2bcf397cff27973bfddc1b5dcc3659a14e903a83ebcdc28e33c20e30cc19024087bf4cbed11ea74d94f92549cbaf195e27be90457cf1d7942ca7c5757b5805e547cf58391ffaa965bf9c20ba02cd07c600e6d394b53cc8201491b34a4d5f11ffd32cb2ba82344679f0dbf510c8955171020fffc1cdf491f2dc71d6525d62d3735918b87c5d680d5137989ab0102f87a2f5ff1385554cb1ac4f40ba132b37ebe8dd6da8c4aaccb46d55d18edb3802dd98754b2634127c9eef4d208b99336899b006c56db592441ef697e09546e884857831e81fcd727288a7580bfacccd65ac59ae552b5845943db8a6a00fcfdccae3f006", 0xf9, 0x44000, &(0x7f0000001540)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x24840000}, 0x80) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001680)='/dev/snapshot\x00', 0x280600, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x20}) write$cgroup_int(r2, &(0x7f0000000180), 0xff8d) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000001600)=0x615a3981, 0x4) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001200)='TIPCv2\x00') bind$llc(r2, &(0x7f0000001300)={0x1a, 0x336, 0x7fffffff, 0x6, 0x0, 0x7, @remote}, 0x10) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000040)=0x2) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f00000012c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001280)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="040028bd7000fcdbdf2505000000100006000400020004000200040002001400f9ff07000200010000000800020000000000ef05d46c463540c16d0dbb5d39338109230303a8509904f41f6616c54690099de18ac6037d65e24683defa5408dd76be8ed1c07005fab277181a2779287ff403a2b307c9ce0b728006979b702ce9a0dbd2f18f4c660f77f32d282a6e0dd383cbb77d0810c7673a83fa7f"], 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000500)=0x100, 0x2) write$cgroup_int(r3, &(0x7f0000000380), 0x10076) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r6, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 16:05:41 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000001c0)={0x4009, 0x9, 0x6, 0x6}) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0xffffffffffffffff, &(0x7f0000c20000/0x1000)=nil, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000003c0)={0x6, 0x9, 0x3, 'queue1\x00', 0x1}) setrlimit(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) sysfs$1(0x1, &(0x7f0000000140)='/dev/admmidi#\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', r4}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) 16:05:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000100)={0x7, 0x35315241, 0x780, 0x438}) 16:05:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000009c0)="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", 0x48b, 0xc001, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000280)="3ce95c98b66a9cdea42aca63276ef1eca3ae3eebcc94bff038047504cdf7aa3a647b508b766deff9a2735edc11437a10c0e9f265c4d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453d75b3306d8f90eae5c942bab9af8f0e5a31701f721bc8a2e7a8767a9549b167eee0f9edd81390a901329cd44207b6b0aaaee0c14f9d85f29820dc0bf6a551ef820552ea00bcdf7f848d0e64ded3eeecd767a7c9bcce561f10240c0e3754953028600148c1b8b62ad4b2218de119ba676d92d511cd77e3dd7841c67318166455ae4987ac63628f0887f3f686d5e06ca5ed3c6384ab280baac816db5f3441a9f28034c64ab06d381be70bc573c7dba0d8a50c81c52bd4d716cc56c5909f22895da61c598176d46912a7d", 0x122, 0x400c020, 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000580), 0x4) [ 221.267820][ T9012] device nr0 entered promiscuous mode [ 221.322309][ T9033] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 221.357479][ T26] kauditd_printk_skb: 3 callbacks suppressed 16:05:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$EVIOCRMFF(r1, 0x40044581, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 16:05:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000100)={0x7, 0x35315241, 0x780, 0x438}) [ 221.357492][ T26] audit: type=1800 audit(1566835541.328:31): pid=9021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.events" dev="sda1" ino=16528 res=0 [ 221.631827][ T9042] input: syz1 as /devices/virtual/input/input5 16:05:41 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004510f, 0x717000) 16:05:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000100)={0x7, 0x35315241, 0x780, 0x438}) 16:05:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000003c00)="2e0000001e000507ed0e80648c6394f201315c030a0006402c00000001000080004800000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 16:05:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x8}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0xb89d}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 16:05:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000100)={0x7, 0x35315241, 0x780, 0x438}) [ 222.149819][ T9055] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:05:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cbf81a1c51a32"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xf7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\t\x00\x00\x00\x00\x00\x00\x00\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 16:05:42 executing program 2: fanotify_init(0x0, 0x3) 16:05:42 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r0, &(0x7f0000008500)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000b80)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}], 0x38}}], 0x2, 0x0) 16:05:42 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x5765, 0x1, 0x1ff, 0x7, 0x0, 0x100, 0x1, 0x4, 0x1, 0x4, 0x1, 0x6, 0x1, 0x4, 0x7, 0x7, 0x10000, 0x4, 0x3, 0xffffffff, 0x10001, 0x8, 0x2, 0x3433911a, 0x7f, 0x77f8, 0xc12a, 0x7, 0x4, 0x3, 0x3, 0x4, 0x80, 0x6, 0x10000, 0x1, 0x0, 0xb20, 0x0, @perf_config_ext={0x0, 0x3}, 0x1000, 0x7, 0x46, 0x0, 0x7, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0xffffff1c) exit(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 16:05:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f00000000c0)={&(0x7f0000000580)={'sha384-generic\x00'}}) 16:05:42 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000200)={0x7, @raw_data="e1dc3d5f669971673a543d565d8dcacd2593b5b652f83538921840a31f89d70529ca9640feb5e935b361ecbf42f4cd58ff16905acf034392535f980fdff9913eea1e666d2b6d5d944d117d4af5d376bc6018dd77ecf9d74ba9e70cb3d2a6696cab071680d7330ca0c26d44f49ddcc1e97acf5306100faeb6a6f932129d38c2bec335ae59c40398f400769c2dd92990307c3dfdc1aee20a4b17b538c91674a5fd10f7b50f698bda85e97327ab70157aafc246250643881fd541dc6a82aa59a6f243fda62bb2d6a318"}) 16:05:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) 16:05:42 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000300)={@dev}, 0x14) sendto$inet6(r0, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 16:05:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000200021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 222.478973][ T9094] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 222.548552][ T9073] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 222.570209][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 16:05:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x5b9f2fa1619ed5a4) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="83"], 0x1) truncate(&(0x7f0000000180)='./file0/bus\x00', 0x0) [ 222.596167][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 222.637729][ T9109] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 222.650713][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 222.706142][ T9073] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 222.796127][ T9092] device nr0 entered promiscuous mode 16:05:42 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0, 0x0, 0x10}, 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) 16:05:42 executing program 3: add_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000240)="af", 0xfffff, 0xfffffffffffffffb) [ 223.259647][ T8824] [ 223.262379][ T8824] ============================= [ 223.279422][ T8824] WARNING: suspicious RCU usage [ 223.284534][ T8824] 5.3.0-rc6-next-20190826 #73 Not tainted [ 223.309715][ T8824] ----------------------------- [ 223.314621][ T8824] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 223.335680][ T8824] [ 223.335680][ T8824] other info that might help us debug this: [ 223.335680][ T8824] [ 223.352464][ T8824] [ 223.352464][ T8824] rcu_scheduler_active = 2, debug_locks = 1 [ 223.360646][ T8824] 1 lock held by syz-executor.1/8824: [ 223.373367][ T8824] #0: ffff88809ba10518 (&type->s_umount_key#32){++++}, at: deactivate_super+0x1aa/0x1d0 [ 223.384124][ T8824] [ 223.384124][ T8824] stack backtrace: [ 223.403710][ T8824] CPU: 0 PID: 8824 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190826 #73 [ 223.413040][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.423339][ T8824] Call Trace: [ 223.426635][ T8824] dump_stack+0x172/0x1f0 [ 223.431031][ T8824] lockdep_rcu_suspicious+0x153/0x15d [ 223.436685][ T8824] ext4_release_system_zone+0x166/0x1a0 [ 223.442351][ T8824] ext4_put_super+0x954/0xd70 [ 223.447044][ T8824] ? ext4_quota_write+0x5a0/0x5a0 [ 223.452098][ T8824] generic_shutdown_super+0x14c/0x370 [ 223.457495][ T8824] kill_block_super+0xa0/0x100 [ 223.462304][ T8824] deactivate_locked_super+0x95/0x100 [ 223.467770][ T8824] deactivate_super+0x1b2/0x1d0 [ 223.472719][ T8824] ? mount_bdev+0x3c0/0x3c0 [ 223.477388][ T8824] ? dput+0x38/0xe10 [ 223.481563][ T8824] ? dput+0x1f2/0xe10 [ 223.485632][ T8824] ? mnt_get_writers.isra.0+0xf9/0x150 [ 223.491101][ T8824] cleanup_mnt+0x351/0x4c0 [ 223.495513][ T8824] ? trace_hardirqs_on+0x67/0x240 [ 223.500556][ T8824] ? __kasan_check_read+0x11/0x20 [ 223.505603][ T8824] __cleanup_mnt+0x16/0x20 [ 223.510125][ T8824] task_work_run+0x145/0x1c0 [ 223.514723][ T8824] exit_to_usermode_loop+0x316/0x380 [ 223.520103][ T8824] do_syscall_64+0x65f/0x760 [ 223.524688][ T8824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.530673][ T8824] RIP: 0033:0x45c2a7 [ 223.534579][ T8824] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.554183][ T8824] RSP: 002b:00007ffc08264738 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 223.562601][ T8824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 223.570828][ T8824] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffc082647e0 [ 223.578879][ T8824] RBP: 000000000000001e R08: 0000000000000000 R09: 0000000000000009 [ 223.586943][ T8824] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffc08265870 [ 223.594916][ T8824] R13: 0000555555caa940 R14: 0000000000000000 R15: 00007ffc08265870 [ 223.628392][ T8824] ------------[ cut here ]------------ [ 223.633891][ T8824] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 223.643163][ T8824] WARNING: CPU: 0 PID: 8824 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 223.652713][ T8824] Kernel panic - not syncing: panic_on_warn set ... [ 223.659490][ T8824] CPU: 0 PID: 8824 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190826 #73 [ 223.668854][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.678973][ T8824] Call Trace: [ 223.682260][ T8824] dump_stack+0x172/0x1f0 [ 223.686684][ T8824] ? debug_print_object+0x90/0x250 [ 223.691819][ T8824] panic+0x2dc/0x755 [ 223.695816][ T8824] ? add_taint.cold+0x16/0x16 [ 223.700646][ T8824] ? __kasan_check_write+0x14/0x20 [ 223.706047][ T8824] ? __warn.cold+0x14/0x3c [ 223.710513][ T8824] ? __warn+0xd9/0x1d0 [ 223.714611][ T8824] ? debug_print_object+0x168/0x250 [ 223.720024][ T8824] __warn.cold+0x2f/0x3c [ 223.724773][ T8824] ? debug_print_object+0x168/0x250 [ 223.730005][ T8824] report_bug+0x289/0x300 [ 223.734393][ T8824] do_error_trap+0x11b/0x200 [ 223.739180][ T8824] do_invalid_op+0x37/0x50 [ 223.743720][ T8824] ? debug_print_object+0x168/0x250 [ 223.749477][ T8824] invalid_op+0x23/0x30 [ 223.753716][ T8824] RIP: 0010:debug_print_object+0x168/0x250 [ 223.759536][ T8824] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 223.779249][ T8824] RSP: 0018:ffff88809ca2fb80 EFLAGS: 00010086 [ 223.785305][ T8824] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 223.793265][ T8824] RDX: 0000000000000000 RSI: ffffffff815bd606 RDI: ffffed1013945f62 [ 223.801330][ T8824] RBP: ffff88809ca2fbc0 R08: ffff888098e1c600 R09: ffffed1015d04109 [ 223.809540][ T8824] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 223.817527][ T8824] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff888095ad6770 [ 223.825521][ T8824] ? vprintk_func+0x86/0x189 [ 223.830388][ T8824] debug_check_no_obj_freed+0x2d4/0x43f [ 223.835975][ T8824] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 223.841640][ T8824] kfree+0xf8/0x2c0 [ 223.845443][ T8824] ext4_put_super+0x8e0/0xd70 [ 223.850334][ T8824] ? ext4_quota_write+0x5a0/0x5a0 [ 223.855483][ T8824] generic_shutdown_super+0x14c/0x370 [ 223.860921][ T8824] kill_block_super+0xa0/0x100 [ 223.865759][ T8824] deactivate_locked_super+0x95/0x100 [ 223.871140][ T8824] deactivate_super+0x1b2/0x1d0 [ 223.876013][ T8824] ? mount_bdev+0x3c0/0x3c0 [ 223.880513][ T8824] ? dput+0x38/0xe10 [ 223.884398][ T8824] ? dput+0x1f2/0xe10 [ 223.888370][ T8824] ? mnt_get_writers.isra.0+0xf9/0x150 [ 223.893920][ T8824] cleanup_mnt+0x351/0x4c0 [ 223.898798][ T8824] ? trace_hardirqs_on+0x67/0x240 [ 223.904049][ T8824] ? __kasan_check_read+0x11/0x20 [ 223.909090][ T8824] __cleanup_mnt+0x16/0x20 [ 223.913500][ T8824] task_work_run+0x145/0x1c0 [ 223.918101][ T8824] exit_to_usermode_loop+0x316/0x380 [ 223.923385][ T8824] do_syscall_64+0x65f/0x760 [ 223.927977][ T8824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.933854][ T8824] RIP: 0033:0x45c2a7 [ 223.937738][ T8824] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.957337][ T8824] RSP: 002b:00007ffc08264738 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 223.969764][ T8824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 223.977768][ T8824] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffc082647e0 [ 223.997822][ T8824] RBP: 000000000000001e R08: 0000000000000000 R09: 0000000000000009 [ 224.006379][ T8824] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffc08265870 [ 224.014435][ T8824] R13: 0000555555caa940 R14: 0000000000000000 R15: 00007ffc08265870 [ 224.024593][ T8824] Kernel Offset: disabled [ 224.029218][ T8824] Rebooting in 86400 seconds..