Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2019/11/24 17:26:27 fuzzer started 2019/11/24 17:26:29 dialing manager at 10.128.0.26:37225 2019/11/24 17:26:30 syscalls: 2563 2019/11/24 17:26:30 code coverage: enabled 2019/11/24 17:26:30 comparison tracing: enabled 2019/11/24 17:26:30 extra coverage: enabled 2019/11/24 17:26:30 setuid sandbox: enabled 2019/11/24 17:26:30 namespace sandbox: enabled 2019/11/24 17:26:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/24 17:26:30 fault injection: enabled 2019/11/24 17:26:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/24 17:26:30 net packet injection: enabled 2019/11/24 17:26:30 net device setup: enabled 2019/11/24 17:26:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/24 17:26:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:29:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setrlimit(0x7, &(0x7f0000000000)) dup(r0) 17:29:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0xffffffffffffffda, 0x1, {0x7, 0x1e}}, 0x50) [ 231.860790][ T8839] IPVS: ftp: loaded support on port[0] = 21 [ 231.933540][ T8841] IPVS: ftp: loaded support on port[0] = 21 17:29:12 executing program 2: [ 232.055679][ T8839] chnl_net:caif_netlink_parms(): no params data found [ 232.207758][ T8841] chnl_net:caif_netlink_parms(): no params data found [ 232.220859][ T8839] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.227971][ T8839] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.237304][ T8839] device bridge_slave_0 entered promiscuous mode [ 232.265381][ T8839] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.285210][ T8839] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.300281][ T8839] device bridge_slave_1 entered promiscuous mode [ 232.334508][ T8841] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.341721][ T8841] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.352392][ T8841] device bridge_slave_0 entered promiscuous mode 17:29:12 executing program 3: [ 232.380522][ T8841] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.387697][ T8841] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.412659][ T8845] IPVS: ftp: loaded support on port[0] = 21 [ 232.430812][ T8841] device bridge_slave_1 entered promiscuous mode [ 232.475989][ T8839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.496257][ T8839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.544188][ T8841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.566492][ T8839] team0: Port device team_slave_0 added [ 232.577775][ T8839] team0: Port device team_slave_1 added [ 232.587797][ T8841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.636699][ T8848] IPVS: ftp: loaded support on port[0] = 21 [ 232.670032][ T8841] team0: Port device team_slave_0 added 17:29:13 executing program 4: memfd_create(&(0x7f0000000040)='^cgroup\x00', 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, @local, 0x0, 0xffffffff, 'dh\x00', 0x18}, 0x2c) [ 232.713376][ T8839] device hsr_slave_0 entered promiscuous mode 17:29:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x60, &(0x7f0000000000)={0x0, @local, 0x0, 0x0, 'dh\x00', 0x18}, 0x2c) [ 232.910079][ T8839] device hsr_slave_1 entered promiscuous mode [ 232.962289][ T8841] team0: Port device team_slave_1 added [ 233.000792][ T8850] IPVS: ftp: loaded support on port[0] = 21 [ 233.091003][ T8853] IPVS: ftp: loaded support on port[0] = 21 [ 233.123905][ T8845] chnl_net:caif_netlink_parms(): no params data found [ 233.182630][ T8841] device hsr_slave_0 entered promiscuous mode [ 233.219982][ T8841] device hsr_slave_1 entered promiscuous mode [ 233.269971][ T8841] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.286449][ T8839] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 233.383306][ T8839] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 233.443423][ T8839] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 233.529388][ T8839] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 233.635123][ T8841] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 233.711996][ T8845] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.719136][ T8845] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.727401][ T8845] device bridge_slave_0 entered promiscuous mode [ 233.734892][ T8848] chnl_net:caif_netlink_parms(): no params data found [ 233.745429][ T8841] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 233.791401][ T8841] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 233.849823][ T8845] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.856908][ T8845] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.865479][ T8845] device bridge_slave_1 entered promiscuous mode [ 233.883772][ T8841] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 233.987084][ T8848] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.995136][ T8848] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.005524][ T8848] device bridge_slave_0 entered promiscuous mode [ 234.014216][ T8848] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.021365][ T8848] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.029054][ T8848] device bridge_slave_1 entered promiscuous mode [ 234.060755][ T8845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.100706][ T8848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.116012][ T8848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.127156][ T8845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.216000][ T8845] team0: Port device team_slave_0 added [ 234.248052][ T8850] chnl_net:caif_netlink_parms(): no params data found [ 234.258365][ T8845] team0: Port device team_slave_1 added [ 234.270481][ T8848] team0: Port device team_slave_0 added [ 234.284783][ T8839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.318423][ T8853] chnl_net:caif_netlink_parms(): no params data found [ 234.331969][ T8848] team0: Port device team_slave_1 added [ 234.413356][ T8845] device hsr_slave_0 entered promiscuous mode [ 234.460431][ T8845] device hsr_slave_1 entered promiscuous mode [ 234.499816][ T8845] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.543889][ T8839] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.570590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.579287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.588030][ T8850] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.596060][ T8850] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.605412][ T8850] device bridge_slave_0 entered promiscuous mode [ 234.662942][ T8848] device hsr_slave_0 entered promiscuous mode [ 234.700136][ T8848] device hsr_slave_1 entered promiscuous mode [ 234.789756][ T8848] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.811604][ T8853] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.818666][ T8853] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.829524][ T8853] device bridge_slave_0 entered promiscuous mode [ 234.838173][ T8850] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.846200][ T8850] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.854100][ T8850] device bridge_slave_1 entered promiscuous mode [ 234.870129][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.878767][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.887916][ T2937] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.895090][ T2937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.903514][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.912684][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.921410][ T2937] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.928474][ T2937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.936478][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.957588][ T8853] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.966219][ T8853] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.981287][ T8853] device bridge_slave_1 entered promiscuous mode [ 235.002262][ T8850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.042763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.058446][ T8850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.084011][ T8850] team0: Port device team_slave_0 added [ 235.091929][ T8850] team0: Port device team_slave_1 added [ 235.104868][ T8845] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 235.152594][ T8853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.187828][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.200958][ T8845] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 235.282926][ T8850] device hsr_slave_0 entered promiscuous mode [ 235.320137][ T8850] device hsr_slave_1 entered promiscuous mode [ 235.379892][ T8850] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.389114][ T8853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.403780][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.412629][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.428096][ T8841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.437655][ T8845] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 235.501948][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.510336][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.518853][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.527547][ T8848] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 235.572146][ T8845] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 235.640148][ T8853] team0: Port device team_slave_0 added [ 235.650702][ T8848] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 235.693768][ T8853] team0: Port device team_slave_1 added [ 235.714811][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.724402][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.733158][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.742050][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.750653][ T8848] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 235.792265][ T8848] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 235.873509][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.885025][ T8850] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 235.934237][ T8850] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 235.992964][ T8850] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 236.041532][ T8850] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 236.145197][ T8853] device hsr_slave_0 entered promiscuous mode [ 236.200062][ T8853] device hsr_slave_1 entered promiscuous mode [ 236.239839][ T8853] debugfs: Directory 'hsr0' with parent '/' already present! [ 236.255891][ T8841] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.274675][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.283494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.326283][ T8839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.340867][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.349504][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.359246][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.366359][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.374525][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.382124][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.420818][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.428731][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.444640][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.457204][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.464764][ T8857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.475730][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.484388][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.525652][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.534748][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.543418][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.553042][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.562181][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.570660][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.578838][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.608624][ T8853] netdevsim netdevsim5 netdevsim0: renamed from eth0 17:29:16 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x24d9b1ee4f00d880, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r1, 0x0, 0x0) readv(r1, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) write$UHID_DESTROY(r1, 0x0, 0x0) pipe(&(0x7f0000000000)) socket(0x0, 0x803, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r2, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001680)=[{0x0}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x235) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000102, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000800)=ANY=[], 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 236.675187][ T8841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.693086][ T8841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.726421][ T8850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.738065][ T8853] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 236.785706][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.795882][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.824017][ T8845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.832469][ T8853] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 236.841014][ C0] hrtimer: interrupt took 66104 ns [ 236.885997][ T8853] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 236.922370][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.931017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.960956][ T8850] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.986171][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.996884][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.007219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.015842][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.043971][ T8845] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.065322][ T8848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.074921][ T8841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.095190][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.123293][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.131861][ T8857] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.138932][ T8857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.146992][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.156174][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.165930][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.173077][ T8857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.183278][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.213326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.223842][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.234804][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.252900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.262563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.271402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.283091][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.290743][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.298608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.308414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.322219][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.336585][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.349009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.358856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.368397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.377719][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.396282][ T8845] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 237.407075][ T8845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.438465][ T8848] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.451684][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.471714][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.480477][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.492455][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.501440][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.516055][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.524888][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.540610][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.549020][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.566646][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.576560][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.591570][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.605420][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.615065][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.628853][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 17:29:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae49, 0xed6799873a77a9c1) [ 237.645072][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.673052][ T8850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.706947][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.717342][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.725868][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.735195][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.744646][ T8857] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.751776][ T8857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.760373][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.776348][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.785807][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.792957][ T8857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.816604][ T8845] 8021q: adding VLAN 0 to HW filter on device batadv0 17:29:18 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000006c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005804000058020000400100004001000070030000700300007003000004000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x3) [ 237.864408][ T8881] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 237.885560][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.893934][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.930466][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.938568][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.948153][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:29:18 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x8, @remote, 0x1000}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000040)) rt_sigsuspend(&(0x7f0000000000), 0x8) [ 238.024345][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.051132][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.064050][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.073149][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.087350][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.098223][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.111832][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.121501][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.130959][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.139312][ T8846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.159970][ T8850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.169308][ T8848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:29:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, 0x0, &(0x7f0000000000)) [ 238.214210][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 17:29:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x6b}, @exit], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 238.287498][ T8853] 8021q: adding VLAN 0 to HW filter on device bond0 17:29:18 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) tkill(r0, 0x8001004000000016) [ 238.402864][ T8848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.411634][ T8910] BPF:hdr_len not found [ 238.438720][ T8853] 8021q: adding VLAN 0 to HW filter on device team0 17:29:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x3300, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) [ 238.465924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.497613][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:29:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00E8\xddV\x82li\x1d/y6\xa2\xea\xff7\xcaz\xb1\x04\xa5\x14[\x1d+5B\\q.\x11\x91Y\xe0\xcb\xc5.$\x13h\xac\x89\xca\x86\x11\x03\x1c\x9d\x06KB\x05,\x84>\x84i\x10\x96\xf1BC\xb31\x7f\x96\x7f\x82\"2\x00\x00\x00\x00\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x81420000a77, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYRESOCT], 0x2c0) [ 238.520608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.547443][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.614926][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.634774][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.658003][ T8857] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.665199][ T8857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.682924][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.692167][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.701361][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.708439][ T8857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.716737][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.755424][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:29:19 executing program 3: futex(0x0, 0x8, 0x0, 0x0, 0x0, 0x0) [ 238.785368][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.806081][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.824428][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.841386][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.857786][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.867117][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.876118][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.912220][ T8853] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.939205][ T8853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.957264][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.966883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.976719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:29:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x62, 0x2}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 239.019259][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.033726][ T8936] x_tables: duplicate underflow at hook 4 [ 239.034915][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.054407][ T8853] 8021q: adding VLAN 0 to HW filter on device batadv0 17:29:19 executing program 5: pipe(&(0x7f0000000000)) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) 17:29:19 executing program 2: mkdir(0x0, 0xa1493c1701022a07) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000240)={0x0, 0xfffffffe}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) r2 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x336, &(0x7f0000000300)={&(0x7f0000000700)={'crc32c-generic\x00\x000\x16\xc7\xec\x91\x05\x0e\xbb\x7f\x11\x97\xa9\x1a\xb4\x00'}}) r3 = request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x0, r3) r4 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x6, 0x80002) sendto$netrom(r4, 0x0, 0x0, 0x800, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@loopback, @initdev}, &(0x7f0000000900)=0xa) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r5, 0x0, 0xe, 0x0, &(0x7f0000000040)="902e3716e9ede14e54c9dd08d63c", 0x0, 0x3ff}, 0x28) ioctl$PPPIOCDISCONN(r4, 0x7439) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf24e96747c77a447) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000600)='wlan1#wlan0!(nodevppp0vboxnet1wlan1[posix_acl_accessmd5sum\x00', 0x3b, 0x1) 17:29:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 17:29:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:29:19 executing program 0: io_setup(0x100000000000c333, &(0x7f0000000180)) 17:29:19 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xc) [ 239.238895][ T8950] x_tables: duplicate underflow at hook 4 17:29:19 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 17:29:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) tkill(0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='I\x00=', 0x0) write(r1, &(0x7f0000000180)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) [ 239.453965][ T8971] mmap: syz-executor.3 (8971) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 17:29:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x3c}}, 0x0) 17:29:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6370, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 17:29:19 executing program 1: futex(&(0x7f0000000040)=0x1, 0x8, 0x0, 0x0, 0x0, 0x0) 17:29:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 17:29:20 executing program 5: mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x4000, 0x3, &(0x7f000000b000/0x4000)=nil) getcwd(&(0x7f00000001c0)=""/197, 0xc5) 17:29:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='loginuid\x00') pread64(r0, 0x0, 0x0, 0x0) 17:29:20 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffd}, 0x0, 0x8) close(r0) r2 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x0) pwritev(r2, &(0x7f0000000740)=[{&(0x7f0000000040)='\x00', 0x312}], 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4000, 0x0) 17:29:20 executing program 3: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4024}, 0x80) r1 = dup2(r0, 0xffffffffffffffff) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000140)={&(0x7f0000000000), &(0x7f0000000040)=""/245, 0xf5}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r2, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 17:29:20 executing program 5: socket$l2tp(0x18, 0x1, 0x1) getgid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x891e, &(0x7f0000000200)={'yam0\x00', @ifru_data=0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x3c}}, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) [ 240.053439][ T9011] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:29:20 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a61c) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x1) readv(0xffffffffffffffff, &(0x7f0000001680)=[{0x0}], 0x1) write$UHID_DESTROY(r1, &(0x7f00000000c0), 0x235) pipe(&(0x7f0000000000)) socket(0x10, 0x803, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1) readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}], 0x1) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) readv(r2, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc091}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000102, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000073797a3119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a0dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14a8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a04000000000000006a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b2dad868a53e6f5e69746a71ec92dcaa9a7dfab394286e5c81eae45e3a25b942b8da11edb578b453acac03a9d3448806776d083d6d5fe4f833d4d4cfbeef0e0e62be2050000003c32984c6c4b2b9c33d8a624cea95c3b3c6dd873569cf4786fc5166b0300000000001ff28d3ce3e3b8f81e34cf97c9c841cb2ef08107a9a96549e3d259df17e29ed64bd6120813f9f0344e139506701e8fdedb06009b5e4d0c67bda0b928b732cff782b0684075f2cb7851efdd7797ee95d2ac28a8cabd26c15682aa58d31aec956bd7c27806403434b3c30b070bcc8266e12fa66602056256f74675b7cb6a2cd93359de4d87b2708d70c8f3df53caf8fe180c4dea3f5b7a871b30c7a5753b48f7f09192a34b0efaab02dca0517eee10ff30206f78ec82"], 0x1) readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x235) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 17:29:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0, 0x0, 0x0, 0xfe}}], 0x1, 0x0, 0x0) ioprio_get$pid(0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) getresuid(&(0x7f0000000240), 0x0, 0x0) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup2(0xffffffffffffffff, r2) socket(0x10, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0xd48d244347979d52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:29:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x3300, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) 17:29:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="902e3716e9ede14e54c9dd08d63c", 0x0, 0x3ff}, 0x28) 17:29:20 executing program 3: socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x6, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xe3b, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x3c}}, 0x0) 17:29:20 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@broadcast, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @loopback, @link_local, @multicast2}}}}, 0x0) [ 240.455854][ T9024] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) [ 240.465177][ T9011] syz-executor.5 (9011) used greatest stack depth: 22888 bytes left 17:29:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) readv(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/70, 0x46}, {&(0x7f0000000140)=""/141, 0x8d}, {&(0x7f0000000240)=""/175, 0xaf}], 0x3) 17:29:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) get_thread_area(0x0) 17:29:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp={0x5, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:29:21 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, 0x0) 17:29:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, r1) ptrace$poke(0x5, r1, &(0x7f0000000000), 0x0) 17:29:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000004d01aeb757693227e9c960f3c0efa4eecb781632bbd8cb585728293f0e7fac3e165867b271c02ddc5d28dc425a0ba0824bb1950d419967156d1b29ec9e966701d886288fea2fc349942b9a16092d8b94651f003c643edb24487c2f390be6037e2e6a3e0b8c6ab06e248dcae5464b2758d71e9d436f69cfc8dd9f57440053b31a4e940e4fc7"], 0x1}, 0x1, 0x0, 0x0, 0x4024}, 0x80) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') pipe2(&(0x7f0000000280), 0x2000) close(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000800)={{0x2c, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'wlc\x00', 0x0, 0x8, 0x60}, {@loopback, 0x4e25, 0x2, 0x7, 0x6, 0x7}}, 0x44) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 240.774431][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 240.774445][ T27] audit: type=1326 audit(1574616561.064:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9042 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 240.872385][ T27] audit: type=1326 audit(1574616561.164:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9051 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 17:29:21 executing program 0: r0 = epoll_create(0x6) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x20000000}) 17:29:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000004d01aeb757693227e9c960f3c0efa4eecb781632bbd8cb585728293f0e7fac3e165867b271c02ddc5d28dc425a0ba0824bb1950d419967156d1b29ec9e966701d886288fea2fc349942b9a16092d8b94651f003c643edb24487c2f390be6037e2e6a3e0b8c6ab06e248dcae5464b2758d71e9d436f69cfc8dd9f57440053b31a4e940e4fc7"], 0x1}, 0x1, 0x0, 0x0, 0x4024}, 0x80) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') pipe2(&(0x7f0000000280), 0x2000) close(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000800)={{0x2c, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'wlc\x00', 0x0, 0x8, 0x60}, {@loopback, 0x4e25, 0x2, 0x7, 0x6, 0x7}}, 0x44) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 17:29:21 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) [ 241.515506][ T27] audit: type=1326 audit(1574616561.804:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9042 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 241.613309][ T12] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max 17:29:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0100000107030200000000ddffffffe2ffffff8801070008000200000400000800010011e66bf27cff7f0000eb675a0f19c00400a9d36a560000008000000016c51cc85a", @ANYRES32, @ANYBLOB="14008100fe8000000000000000000000000000bb08003000ac39158639b18e66eb11cae21414aa1e84d855c47b9ff6e90ed3f5a516a5d44520792da8bfa0e8431c4149858548b5ea36aa4b754761ac0309a8a1d709c0b7c419fa797c67e766b085ffd202bdc86c7fa2c890041fd409c523e34d36156e29c15773d41e20a3370ae0a3fff0e1051e0000008204b2ef1cff5dbcf02d918b67bf3c9fe10dc09013cb16ad4fd269aaaf281a34d1bd12358e41c9d3f0544e55badd0247b5b332395ee974344be8a1f8a96d948871407dd7182f40fe6cf74ff2adafd44a5f473d4efe9b259c7223499bc7d9ac86ba563838c5eb0796b31dc61d68d008cff5c265674bfd867a103f3cbae9941074bd1df591ef841e092b7eef5927f7d6cc164feb5f8d9017d132d71202000000b827a44fba2d4e78bafabd18ec74ff010000000000005970d908f73da9becfb02f059bf9000000001c00"], 0x19c}}, 0x0) [ 241.658017][ T27] audit: type=1326 audit(1574616561.944:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9051 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 241.692129][ T12] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 17:29:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0, 0x0, 0x0, 0xfe}}], 0x1, 0x0, 0x0) ioprio_get$pid(0x1, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup2(0xffffffffffffffff, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0xd48d244347979d52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() [ 241.785253][ T9084] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:22 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x24d9b1ee4f00d880, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000073797a3119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a0dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14a8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a04000000000000006a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b2dad868a53e6f5e69746a71ec92dcaa9a7dfab394286e5c81eae45e3a25b942b8da11edb578b453acac03a9d3448806776d083d6d5fe4f833d4d4cfbeef0e0e62be2050000003c32984c6c4b2b9c33d8a624cea95c3b3c6dd873569cf4786fc5166b0300000000001ff28d3ce3e3b8f81e34cf97c9c841cb2ef08107a9a96549e3d259df17e29ed64bd6120813f9f0344e139506701e8fdedb06009b5e4d0c67bda0b928b732cff782b0684075f2cb7851efdd7797ee95d2ac28a8cabd26c15682aa58d31aec956bd7c27806403434b3c30b070bcc8266e12fa66602056256f74675b7cb6a2cd93359de4d87b2708d70c8f3df53caf8fe180c4dea3f5b7a871b30c7a5753b48f7f09192a34b0efaab02dca0517eee10ff30206f78ec82c72f"], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) 17:29:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000280), 0x1000) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200302c2, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r1, r2, &(0x7f0000000080), 0x2008000fffffffe) 17:29:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x100) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) [ 241.976077][ T9092] EXT4-fs (loop0): error: could not find journal device path: error -2 [ 242.071654][ T9092] EXT4-fs (loop0): error: could not find journal device path: error -2 17:29:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:24 executing program 5: 17:29:24 executing program 1: 17:29:24 executing program 3: 17:29:24 executing program 4: 17:29:24 executing program 2: 17:29:24 executing program 1: 17:29:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:29:24 executing program 5: 17:29:24 executing program 2: [ 243.988357][ T9126] EXT4-fs (loop0): error: could not find journal device path: error -2 17:29:24 executing program 3: [ 244.140051][ T12] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max 17:29:24 executing program 5: 17:29:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:24 executing program 1: [ 244.203542][ T12] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 17:29:24 executing program 2: 17:29:24 executing program 3: [ 244.351417][ T12] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max 17:29:24 executing program 5: [ 244.412845][ T12] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on sz1 17:29:24 executing program 1: 17:29:24 executing program 4: 17:29:24 executing program 5: [ 244.467144][ T9158] EXT4-fs (loop0): error: could not find journal device path: error -2 17:29:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) request_key(0x0, 0x0, 0x0, 0x0) 17:29:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000080)=0x40005, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x7f) sendto$inet6(r0, &(0x7f0000000100)="05030e0040063e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 17:29:24 executing program 5: 17:29:24 executing program 2: [ 244.674680][ T27] audit: type=1326 audit(1574616564.964:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9172 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:25 executing program 5: 17:29:25 executing program 1: 17:29:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000001500), 0x24, 0x0) 17:29:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4c, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000001140)='ifb0\x00') pipe(&(0x7f0000000440)) ptrace$peek(0x2, 0x0, &(0x7f0000000140)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) 17:29:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b0b, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x80000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r7, r6) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x82) dup3(r8, r9, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r11, 0xae60) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r12, 0x4400ae8f, &(0x7f0000000580)={"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"}) r13 = dup3(r10, r11, 0x0) dup2(r13, r12) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000e40)=ANY=[@ANYRESOCT=r5, @ANYRESHEX=r6, @ANYBLOB, @ANYRESDEC=r4, @ANYPTR=&(0x7f0000000980)=ANY=[@ANYRES16=0x0], @ANYBLOB="ccd4500a90f6d73fae1e52e2932b3ee55b60de3a06518b6c7ea9439be61a2ff19cf6f399495363bb535d1a31b7c6956b1b390de6058a151cffc0df615d43b59c77143ccfa45631498174f0e00ff4ee3ab68419ddc8c8f73e2187f90852944443b068814072e23120a407f8a707c7802d81f60a0fbfdccf7261ed1ffc9a030112be3bc137e1a09b3812d58877dcaf3cca27ed50cfff919f3bf53de36658aadb08a5caf528271da84edaa8441b03ed7bed32a66d825cbcb0f307b8a81246dbedece2756d644da8c207fb89485dc0df49043c7af70627cec20fd912575dca8f3c61", @ANYRES64=0x0, @ANYRESHEX=r9, @ANYPTR64=&(0x7f0000000dc0)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000d80)=ANY=[@ANYRESDEC], @ANYRES16, @ANYRESOCT, @ANYRES16, @ANYRES64=r7]], 0x9) ioctl$sock_inet_SIOCRTMSG(r7, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e23, @multicast2}, 0x180, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='erspan0\x00', 0x1, 0x7, 0xbd}) openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r14 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r14, 0x0, 0x0, 0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents(r15, &(0x7f00000000c0)=""/31, 0x77c) dup3(0xffffffffffffffff, r15, 0x80000) sendmsg$nl_netfilter(r15, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20048044}, 0x10020) 17:29:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x62}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 244.918608][ T9189] EXT4-fs (loop0): error: could not find journal device path: error -2 17:29:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/251, 0xfb}, {0x0}, {0x0, 0x27b}, {0x0}], 0x10000000000003d2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) shutdown(r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffdc4, 0x0, 0x0, 0x800e0051e) shutdown(r2, 0x0) [ 245.458171][ T27] audit: type=1326 audit(1574616565.744:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9172 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:29:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:25 executing program 2: socketpair(0x1, 0x70000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 17:29:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000000)=0xc) setreuid(0xffffffffffffffff, r1) 17:29:25 executing program 4: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 17:29:25 executing program 5: r0 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000180)) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x20000000}) [ 245.621773][ T27] audit: type=1326 audit(1574616565.914:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9231 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:25 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @empty=0x2}}}}}, 0x0) 17:29:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:26 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x59}, @exit], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:29:26 executing program 5: 17:29:26 executing program 2: 17:29:26 executing program 5: 17:29:26 executing program 3: 17:29:26 executing program 1: 17:29:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:26 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x21) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:29:26 executing program 5: open_tree(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) getgid() connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000400)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_PRIMARY={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) 17:29:26 executing program 4: [ 246.401254][ T27] audit: type=1326 audit(1574616566.694:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9231 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:26 executing program 4: 17:29:26 executing program 1: [ 246.527231][ T9276] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:29:26 executing program 4: 17:29:27 executing program 3: 17:29:27 executing program 1: 17:29:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:27 executing program 5: open_tree(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) getgid() connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000400)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_PRIMARY={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) [ 246.904188][ T9293] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:29:27 executing program 1: 17:29:27 executing program 4: [ 247.003769][ T9298] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:29:27 executing program 2: 17:29:27 executing program 3: 17:29:27 executing program 1: 17:29:27 executing program 4: 17:29:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:27 executing program 1: 17:29:27 executing program 3: 17:29:27 executing program 2: 17:29:27 executing program 5: open_tree(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) getgid() connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000400)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_PRIMARY={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) 17:29:27 executing program 4: 17:29:27 executing program 3: 17:29:27 executing program 2: 17:29:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:28 executing program 1: [ 247.704118][ T9332] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:29:28 executing program 2: 17:29:28 executing program 3: 17:29:28 executing program 4: 17:29:28 executing program 1: 17:29:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000001500), 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 248.148067][ T9356] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:29:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) 17:29:28 executing program 1: r0 = open(&(0x7f0000000500)='./bus\x00', 0x8143242, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x800) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000001380)='/dev/urandom\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x80005) 17:29:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 17:29:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') 17:29:28 executing program 3: memfd_create(&(0x7f0000000040)='^cgroup\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, @local, 0x0, 0x0, 'dh\x00'}, 0x2c) 17:29:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) [ 248.317348][ T27] audit: type=1326 audit(1574616568.604:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9364 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 17:29:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 17:29:28 executing program 1: sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) getpid() r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffffff) [ 248.531756][ T9380] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:29:29 executing program 2: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@broadcast, @remote, [], {@generic={0x806}}}, 0x0) 17:29:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) [ 248.706176][ T27] audit: type=1800 audit(1574616568.994:40): pid=9391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16607 res=0 17:29:29 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000b67000), &(0x7f00000000c0)=0x4) [ 248.821715][ T27] audit: type=1804 audit(1574616569.004:41): pid=9391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir953711049/syzkaller.LOMzSQ/30/file0" dev="sda1" ino=16607 res=1 17:29:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="902e3716e9ede14e54c9dd08d63c", 0x0, 0x3ff}, 0x28) 17:29:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}, 0x18}]}) 17:29:29 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 248.915761][ T9401] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 248.928505][ T27] audit: type=1804 audit(1574616569.064:42): pid=9393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir953711049/syzkaller.LOMzSQ/30/file0" dev="sda1" ino=16607 res=1 [ 249.047627][ T9393] ------------[ cut here ]------------ [ 249.053732][ T9393] WARNING: CPU: 1 PID: 9393 at lib/iov_iter.c:1162 iov_iter_pipe+0x25b/0x2f0 [ 249.063029][ T9393] Kernel panic - not syncing: panic_on_warn set ... [ 249.069627][ T9393] CPU: 1 PID: 9393 Comm: syz-executor.1 Not tainted 5.4.0-rc8-next-20191122-syzkaller #0 [ 249.079446][ T9393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.090601][ T9393] Call Trace: [ 249.093988][ T9393] dump_stack+0x197/0x210 [ 249.098320][ T9393] ? iov_iter_pipe+0x210/0x2f0 [ 249.103103][ T9393] panic+0x2e3/0x75c [ 249.107096][ T9393] ? add_taint.cold+0x16/0x16 [ 249.107100][ T9411] encrypted_key: key user:syz not found [ 249.107504][ T9411] encrypted_key: keyword 'new' not allowed when called from .update method [ 249.111873][ T9393] ? printk+0xba/0xed [ 249.111901][ T9393] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 249.111913][ T9393] ? __warn.cold+0x14/0x35 [ 249.111931][ T9393] ? iov_iter_pipe+0x25b/0x2f0 [ 249.111942][ T9393] __warn.cold+0x2f/0x35 [ 249.111956][ T9393] ? report_bug.cold+0x63/0xb2 [ 249.111966][ T9393] ? iov_iter_pipe+0x25b/0x2f0 [ 249.111985][ T9393] report_bug+0x289/0x300 [ 249.153541][ T9411] encrypted_key: keyword 'new' not allowed when called from .update method [ 249.154237][ T9393] do_error_trap+0x11b/0x200 [ 249.176578][ T9393] do_invalid_op+0x37/0x50 [ 249.181004][ T9393] ? iov_iter_pipe+0x25b/0x2f0 [ 249.186223][ T9393] invalid_op+0x23/0x30 [ 249.190488][ T9393] RIP: 0010:iov_iter_pipe+0x25b/0x2f0 17:29:29 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 249.195887][ T9393] Code: 83 c0 03 38 d0 7c 04 84 d2 75 33 44 89 63 24 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 8c f6 2d fe 0f 0b e8 85 f6 2d fe <0f> 0b e9 53 fe ff ff 4c 89 f7 e8 96 82 6a fe e9 f5 fd ff ff e8 2c [ 249.216928][ T9393] RSP: 0018:ffff88805701f988 EFLAGS: 00010246 [ 249.219796][ T4006] kobject: 'loop5' (00000000083b5014): kobject_uevent_env [ 249.223007][ T9393] RAX: 0000000000040000 RBX: ffff88805701fa18 RCX: ffffc90008357000 [ 249.238255][ T9393] RDX: 0000000000040000 RSI: ffffffff8345fd4b RDI: 0000000000000004 [ 249.246244][ T9393] RBP: ffff88805701f9c0 R08: ffff88808cf322c0 R09: 0000000000000000 [ 249.246856][ T4006] kobject: 'loop5' (00000000083b5014): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 249.254238][ T9393] R10: fffffbfff139e730 R11: ffffffff89cf3987 R12: ffff888053605800 [ 249.254247][ T9393] R13: 0000000000000010 R14: ffff8880536058c8 R15: ffff8880536058d0 [ 249.254277][ T9393] ? iov_iter_pipe+0x25b/0x2f0 [ 249.254299][ T9393] ? iov_iter_pipe+0x25b/0x2f0 [ 249.254318][ T9393] generic_file_splice_read+0xa7/0x800 [ 249.254332][ T9393] ? fsnotify_first_mark+0x210/0x210 [ 249.254347][ T9393] ? add_to_pipe+0x350/0x350 [ 249.254448][ T9393] ? security_file_permission+0x8f/0x380 [ 249.254470][ T9393] ? rw_verify_area+0x126/0x360 [ 249.288989][ T9414] encrypted_key: key user:syz not found [ 249.289205][ T9414] encrypted_key: keyword 'new' not allowed when called from .update method [ 249.292716][ T9393] ? add_to_pipe+0x350/0x350 [ 249.292733][ T9393] do_splice_to+0x127/0x180 [ 249.292751][ T9393] splice_direct_to_actor+0x2d3/0x970 [ 249.292769][ T9393] ? generic_pipe_buf_nosteal+0x10/0x10 [ 249.292788][ T9393] ? do_splice_to+0x180/0x180 [ 249.292805][ T9393] ? rw_verify_area+0x126/0x360 [ 249.292823][ T9393] do_splice_direct+0x1da/0x2a0 [ 249.292839][ T9393] ? splice_direct_to_actor+0x970/0x970 [ 249.292855][ T9393] ? rcu_read_lock_any_held+0xcd/0xf0 [ 249.292876][ T9393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.292945][ T9393] ? __this_cpu_preempt_check+0x35/0x190 [ 249.292965][ T9393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.398356][ T9393] ? __sb_start_write+0x1e5/0x460 [ 249.403512][ T9393] do_sendfile+0x597/0xd00 [ 249.408084][ T9393] ? do_compat_pwritev64+0x1c0/0x1c0 [ 249.413856][ T9393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.420400][ T9393] ? put_timespec64+0xda/0x140 [ 249.422756][ T4006] kobject: 'loop5' (00000000083b5014): kobject_uevent_env [ 249.426224][ T9393] __x64_sys_sendfile64+0x1dd/0x220 [ 249.439025][ T9393] ? __ia32_sys_sendfile+0x230/0x230 [ 249.444423][ T9393] ? do_syscall_64+0x26/0x790 [ 249.446735][ T4006] kobject: 'loop5' (00000000083b5014): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 249.449116][ T9393] ? lockdep_hardirqs_on+0x421/0x5e0 [ 249.449140][ T9393] ? trace_hardirqs_on+0x67/0x240 [ 249.469659][ T9393] do_syscall_64+0xfa/0x790 [ 249.474192][ T9393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.480102][ T9393] RIP: 0033:0x45a639 [ 249.484001][ T9393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.503614][ T9393] RSP: 002b:00007fda72f39c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 249.512044][ T9393] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a639 [ 249.520050][ T9393] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005 [ 249.528045][ T9393] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 249.536392][ T9393] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fda72f3a6d4 [ 249.544462][ T9393] R13: 00000000004c85aa R14: 00000000004dec38 R15: 00000000ffffffff [ 249.553922][ T9393] Kernel Offset: disabled [ 249.558616][ T9393] Rebooting in 86400 seconds..