[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.520798][ T26] audit: type=1800 audit(1566908061.944:25): pid=8555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.559117][ T26] audit: type=1800 audit(1566908061.944:26): pid=8555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.617426][ T26] audit: type=1800 audit(1566908061.954:27): pid=8555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.194' (ECDSA) to the list of known hosts. 2019/08/27 12:14:33 fuzzer started 2019/08/27 12:14:35 dialing manager at 10.128.0.26:45029 2019/08/27 12:14:35 syscalls: 2487 2019/08/27 12:14:35 code coverage: enabled 2019/08/27 12:14:35 comparison tracing: enabled 2019/08/27 12:14:35 extra coverage: extra coverage is not supported by the kernel 2019/08/27 12:14:35 setuid sandbox: enabled 2019/08/27 12:14:35 namespace sandbox: enabled 2019/08/27 12:14:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/27 12:14:35 fault injection: enabled 2019/08/27 12:14:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/27 12:14:35 net packet injection: enabled 2019/08/27 12:14:35 net device setup: enabled 12:17:08 executing program 0: r0 = timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/14, 0xe}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d084887826c, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_free(0xffffffffffffffff) 12:17:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) syzkaller login: [ 228.650507][ T8724] IPVS: ftp: loaded support on port[0] = 21 [ 228.828412][ T8724] chnl_net:caif_netlink_parms(): no params data found [ 228.863579][ T8727] IPVS: ftp: loaded support on port[0] = 21 [ 228.902650][ T8724] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.910600][ T8724] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.919372][ T8724] device bridge_slave_0 entered promiscuous mode [ 228.933540][ T8724] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.940932][ T8724] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.949329][ T8724] device bridge_slave_1 entered promiscuous mode 12:17:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) [ 228.981119][ T8724] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.014225][ T8724] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.058003][ T8724] team0: Port device team_slave_0 added [ 229.081007][ T8724] team0: Port device team_slave_1 added [ 229.162146][ T8724] device hsr_slave_0 entered promiscuous mode 12:17:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x16}, 0x20) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 229.210390][ T8724] device hsr_slave_1 entered promiscuous mode [ 229.286726][ T8729] IPVS: ftp: loaded support on port[0] = 21 [ 229.334122][ T8724] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.341725][ T8724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.349754][ T8724] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.356852][ T8724] bridge0: port 1(bridge_slave_0) entered forwarding state 12:17:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="6f2edefd3659ea5b629ce2f255a86d47", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f00000019c0)="a7cde967f9897c13db0f1f5cb1a12a", 0xf}], 0x1}, 0x0) [ 229.438514][ T8732] IPVS: ftp: loaded support on port[0] = 21 [ 229.455095][ T8727] chnl_net:caif_netlink_parms(): no params data found [ 229.561664][ T8727] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.579021][ T8727] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.587250][ T8727] device bridge_slave_0 entered promiscuous mode [ 229.668010][ T8727] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.675597][ T8727] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.684129][ T8727] device bridge_slave_1 entered promiscuous mode [ 229.724570][ T8735] IPVS: ftp: loaded support on port[0] = 21 [ 229.747636][ T8729] chnl_net:caif_netlink_parms(): no params data found [ 229.769811][ T8727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.781572][ T8727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.831633][ T8727] team0: Port device team_slave_0 added 12:17:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x4}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) [ 229.877692][ T2999] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.892597][ T2999] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.939898][ T8727] team0: Port device team_slave_1 added [ 230.005241][ T8732] chnl_net:caif_netlink_parms(): no params data found [ 230.025904][ T8724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.082087][ T8727] device hsr_slave_0 entered promiscuous mode [ 230.139318][ T8727] device hsr_slave_1 entered promiscuous mode [ 230.179234][ T8727] debugfs: Directory 'hsr0' with parent '/' already present! [ 230.187462][ T8729] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.194970][ T8729] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.203645][ T8729] device bridge_slave_0 entered promiscuous mode [ 230.228349][ T8740] IPVS: ftp: loaded support on port[0] = 21 [ 230.270291][ T8729] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.277532][ T8729] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.285540][ T8729] device bridge_slave_1 entered promiscuous mode [ 230.308745][ T8729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.320567][ T8729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.366234][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.375074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.385566][ T8735] chnl_net:caif_netlink_parms(): no params data found [ 230.402300][ T8724] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.424440][ T8732] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.432056][ T8732] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.440300][ T8732] device bridge_slave_0 entered promiscuous mode [ 230.454575][ T8729] team0: Port device team_slave_0 added [ 230.462255][ T8729] team0: Port device team_slave_1 added [ 230.473088][ T8732] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.480378][ T8732] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.488144][ T8732] device bridge_slave_1 entered promiscuous mode [ 230.539412][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.548347][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.557607][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.564949][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.593010][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.602423][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.611645][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.619139][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.690911][ T8729] device hsr_slave_0 entered promiscuous mode [ 230.739573][ T8729] device hsr_slave_1 entered promiscuous mode [ 230.779152][ T8729] debugfs: Directory 'hsr0' with parent '/' already present! [ 230.804594][ T8732] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.814302][ T8735] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.822430][ T8735] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.830653][ T8735] device bridge_slave_0 entered promiscuous mode [ 230.840918][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.852619][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.869582][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.878184][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.887449][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.896254][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.906255][ T8732] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.930178][ T8735] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.937260][ T8735] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.945054][ T8735] device bridge_slave_1 entered promiscuous mode [ 230.963359][ T8735] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.993479][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.011853][ T8732] team0: Port device team_slave_0 added [ 231.020794][ T8735] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.054632][ T8732] team0: Port device team_slave_1 added [ 231.067932][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.076951][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.088926][ T8735] team0: Port device team_slave_0 added [ 231.095856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.104704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.117849][ T8740] chnl_net:caif_netlink_parms(): no params data found [ 231.135278][ T8727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.146339][ T8735] team0: Port device team_slave_1 added [ 231.182625][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.211938][ T8740] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.220957][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.229221][ T8740] device bridge_slave_0 entered promiscuous mode [ 231.237289][ T8740] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.244499][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.252416][ T8740] device bridge_slave_1 entered promiscuous mode [ 231.276079][ T8727] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.321172][ T8732] device hsr_slave_0 entered promiscuous mode [ 231.349941][ T8732] device hsr_slave_1 entered promiscuous mode [ 231.409126][ T8732] debugfs: Directory 'hsr0' with parent '/' already present! [ 231.482271][ T8735] device hsr_slave_0 entered promiscuous mode [ 231.549517][ T8735] device hsr_slave_1 entered promiscuous mode [ 231.609143][ T8735] debugfs: Directory 'hsr0' with parent '/' already present! [ 231.622435][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.630573][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.646395][ T8724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.665020][ T8740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.681991][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.696883][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.705647][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.712794][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.736469][ T8740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.754718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.764741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.778568][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.788584][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.795723][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.804955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.813874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.845130][ T8740] team0: Port device team_slave_0 added [ 231.858545][ T8740] team0: Port device team_slave_1 added [ 231.875669][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.884755][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.906604][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.916418][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.925403][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.933887][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.943478][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.967077][ T8727] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.979155][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.000686][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.009296][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.101307][ T8727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.118156][ T8729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.152213][ T8740] device hsr_slave_0 entered promiscuous mode [ 232.189318][ T8740] device hsr_slave_1 entered promiscuous mode [ 232.239029][ T8740] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.265016][ T8735] 8021q: adding VLAN 0 to HW filter on device bond0 12:17:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/34, 0x22}], 0x1000000000000048) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcef, 0x0, 0x0, 0x800e00529) shutdown(r0, 0x0) setsockopt$inet_buf(r1, 0x0, 0x53, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x100000279, 0x0, 0x0, 0x800e0052d) shutdown(r1, 0x0) [ 232.293937][ T8732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.307540][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.323589][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.341681][ T8729] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.364689][ T8735] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.385412][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.400083][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.407955][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.416124][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.426520][ T8732] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.451317][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.460741][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.470015][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.477132][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.485605][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.494917][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.504187][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.511333][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.519904][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.528754][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.537939][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.545218][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.553812][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.562844][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.571507][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.578808][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state 12:17:13 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) [ 232.618968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.642146][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.678281][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.713035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.722356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.738127][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.760340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 12:17:13 executing program 1: r0 = shmget(0x1, 0x6000, 0x200, &(0x7f0000ff9000/0x6000)=nil) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") shmctl$IPC_RMID(r0, 0x0) [ 232.785220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.816385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.828212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.837514][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.846669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.856703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.872776][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 12:17:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 232.886504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.897515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.915707][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.922888][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.939532][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.947485][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.968270][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.997596][ T8735] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 233.009266][ T8735] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 233.037550][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 12:17:13 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) [ 233.054899][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.070754][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.080892][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.090563][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.099936][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.115566][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.122937][ T8738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.135674][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.150635][ T8740] 8021q: adding VLAN 0 to HW filter on device bond0 12:17:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001a80)=[{&(0x7f0000000000)=""/4, 0x4}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)=""/243, 0xf3}], 0x1}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000340), 0x8) shutdown(r4, 0x0) shutdown(r2, 0x0) [ 233.186435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.197312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.207506][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.216725][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.226171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.236230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.254426][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.287738][ T8732] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 233.300169][ T8732] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 233.313885][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.323766][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:17:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x80002, 0x0) socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0x7, &(0x7f0000000380)={0x9, 0xff}, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x40, 0x0) pipe(0x0) [ 233.332964][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.341589][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.349644][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.358340][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.366873][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.378134][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.387517][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.397298][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.408793][ T8735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.428262][ T8740] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.450211][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.464097][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.479226][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 233.485533][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 233.491534][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 233.497446][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:17:13 executing program 0: [ 233.530552][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.546867][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.558742][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.565993][ T8738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.575778][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.585164][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.593801][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.600936][ T8738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.626438][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.644560][ T8732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.657883][ T8729] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.678457][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.688404][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.736983][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.759680][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.777861][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.786920][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.795882][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.804325][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.812911][ T3468] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.824873][ T8740] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 233.838525][ T8740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.858129][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.870298][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.934177][ T8740] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.172855][ T8835] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 234.212402][ T8840] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 12:17:14 executing program 2: 12:17:14 executing program 0: 12:17:14 executing program 4: 12:17:14 executing program 5: 12:17:14 executing program 1: 12:17:14 executing program 3: 12:17:14 executing program 4: 12:17:14 executing program 1: 12:17:14 executing program 0: 12:17:14 executing program 2: 12:17:14 executing program 3: 12:17:14 executing program 5: 12:17:15 executing program 4: 12:17:15 executing program 1: 12:17:15 executing program 2: 12:17:15 executing program 0: 12:17:15 executing program 3: 12:17:15 executing program 5: 12:17:15 executing program 0: 12:17:15 executing program 1: 12:17:15 executing program 4: 12:17:15 executing program 2: 12:17:15 executing program 3: 12:17:15 executing program 5: 12:17:15 executing program 1: 12:17:15 executing program 0: 12:17:15 executing program 4: 12:17:15 executing program 2: 12:17:15 executing program 3: 12:17:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:15 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fce"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:15 executing program 2: syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 12:17:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 12:17:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="6f2edefd3659ea5b629ce2f255a86d47", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x225}}, 0x0) 12:17:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0) 12:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)=""/75, 0x4b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r2 = dup(r1) shutdown(r2, 0x0) 12:17:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="6f2edefd3659ea5b629ce2f255a86d47", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000007840)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000140)={0x10}, 0x10}, {&(0x7f0000001b00)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0xc, 0x0, @u64}]}, 0x1c}], 0x2}, 0x0) [ 235.653627][ C1] hrtimer: interrupt took 29073 ns 12:17:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/34, 0x22}], 0x1000000000000048) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcef, 0x0, 0x0, 0x800e00529) shutdown(r0, 0x0) semget$private(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x100000279, 0x0, 0x0, 0x800e0052d) shutdown(r1, 0x0) 12:17:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x400, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)) 12:17:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001840)=[{&(0x7f00000000c0)=""/252, 0xfc}, {0x0}], 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000040)=""/12, 0xc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r3, 0x0) r4 = dup(r1) shutdown(r4, 0x0) 12:17:16 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() pipe(0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000480), 0xfffffffffffffe54, 0x0, 0x0, 0x9a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000b80)=ANY=[@ANYBLOB="09000000000000003a0f208dff0f00007f0000001f00000000080000000000000200000007000000bee5000005000000010000000000000006000000ff07000005000000070100009772000000000000000000c0050000000b0000000800000009000000000000000100004028c20000e889e973a6680000ff0000000000000000000000ca000000ffffff7fff7f000000000000000000001900008001000000060000001b00000001800000000000000b000000fb9dab2e0bbe0000020000000000000000000000010000"]) [ 236.001779][ T8958] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 236.451212][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 236.451228][ T26] audit: type=1804 audit(1566908236.874:31): pid=8967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir107242473/syzkaller.MhjtJD/12/file0/file0" dev="sda1" ino=16536 res=1 12:17:16 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() pipe(0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000480), 0xfffffffffffffe54, 0x0, 0x0, 0x9a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='#md5sum\x00', 0xfffffffffffffffe) 12:17:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x66, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="6f2edefde2f255a86d47000000000000", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000140)="a7cde967f9897c13db0f1f5cb1a12a5925", 0x11}], 0x1}, 0x0) 12:17:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5785e0bcfe46bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="804000001009594b85c63c1cbd217c1befb0bb7a37993f6570e7e16ce3ec50bfc5ef8a02d2d09d533bdb902162bd8a34bd99f1433849e30002000015c7903df39c", 0x41}], 0x1}, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492191, 0x0) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 12:17:17 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000005e43ec20000000000c00000008000000e0000003000000000000"], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0xc) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f3050100080001", 0x17) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:17:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x6, 0x0) recvfrom$inet(r0, 0x0, 0x100000279, 0x0, 0x0, 0x800e0052d) shutdown(r0, 0x0) 12:17:17 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f00000002c0)="3f09d8081b39fb6d3a3421efba0875ba9d4495cec7a659eaee2cb2fec941d1ac33931c4afaecd3ad11101d67af30c6846396c5834351ee7873ae0ae4a4476fd6427ba9892469a74333fb22eecd0190169f47433a95ffb48141f73195b64a73e7d1235b913f59708b6b2df54de7539092e2653b8d29beb48a735297140fd98e2ff541c8bee915bac523c546e31deb4779cd94645ce75a9f518c1537c018ea9370cd590748010e41f775c654598740ced0686b0402f2ef3c0cb9f1eb6b4dfb22c6f64a60d1865d5aaf80d9713ac8c175d1218843a291350ffa9af144fccd3370a2bd288b775326a115e85fcb74559b41d7ccfca5ea82041ceb50f7af0a3bf2e1ec81b197c101d869ab91264766df2bbbd7e108ab58e12265fa3a20fa5549617ff64b95cac181ece85a4351bf3cd7454dc803d173480b22f3cb54237f9ba7f3d80f46d9899ca4c04d3e9f0dba9b9a886959037f6e2655f061df722417ab377e18ea8214a29588d730ed29940cc508c3322f7ac647fe1239767833d086b70b4d1a525faefb711389e87066fb2051137df26acb1ae7aa9e29ed203578ad4f51bbf91f9244cb707cb409c30101080cbd4239507ef9fbbc74d2e07f392cd1262d415a03049e4b69dd05df4847fc5a50ae1eb0c7fb0bf0fb0584fa2a92f5a3d29efd63e73dd7f0d44b8c5ac6778e4c1e919e12ec2778f7", 0x1f3, 0xd}]) 12:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "a5"}, 0x0) 12:17:17 executing program 0: [ 236.963626][ T9008] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 12:17:17 executing program 0: 12:17:17 executing program 3: [ 237.057642][ T9013] Dev loop5: unable to read RDB block 1 [ 237.113286][ T9013] loop5: unable to read partition table [ 237.163621][ T9013] loop5: partition table beyond EOD, truncated [ 237.204286][ T9013] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 237.222824][ T9012] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 237.254530][ T9012] FAT-fs (loop1): Filesystem has been set read-only [ 237.287237][ T9012] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 237.310082][ T9012] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 12:17:17 executing program 0: 12:17:17 executing program 3: [ 237.359472][ T9012] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 237.403257][ T9013] Dev loop5: unable to read RDB block 1 [ 237.422824][ T9036] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 237.424375][ T9013] loop5: unable to read partition table 12:17:17 executing program 2: [ 237.449686][ T9010] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 12:17:17 executing program 3: [ 237.527823][ T9013] loop5: partition table beyond EOD, truncated [ 237.580776][ T9013] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 12:17:18 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:18 executing program 4: 12:17:18 executing program 2: 12:17:18 executing program 0: 12:17:18 executing program 3: 12:17:18 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:18 executing program 2: 12:17:18 executing program 0: 12:17:18 executing program 3: 12:17:18 executing program 2: 12:17:18 executing program 4: 12:17:18 executing program 3: 12:17:19 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:19 executing program 2: 12:17:19 executing program 0: 12:17:19 executing program 4: 12:17:19 executing program 3: 12:17:19 executing program 5: 12:17:19 executing program 2: 12:17:19 executing program 0: 12:17:19 executing program 5: 12:17:19 executing program 3: 12:17:19 executing program 4: 12:17:19 executing program 2: 12:17:19 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:19 executing program 3: 12:17:19 executing program 0: 12:17:19 executing program 4: 12:17:19 executing program 5: 12:17:19 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 12:17:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") 12:17:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x2}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x78a3}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 12:17:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 12:17:19 executing program 5: 12:17:19 executing program 2: 12:17:20 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 239.646119][ T9122] input: syz1 as /devices/virtual/input/input5 [ 239.872835][ T9148] input: syz1 as /devices/virtual/input/input7 [ 240.092208][ T9132] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 240.107575][ T9132] FAT-fs (loop1): Filesystem has been set read-only [ 240.120873][ T9132] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 240.131299][ T9132] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 240.141223][ T9132] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 12:17:20 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) 12:17:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) 12:17:20 executing program 0: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004240)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="ce3834a9c06d2c2b257a4447b335c1a8"}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)='i', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004340)=ANY=[@ANYBLOB="140000000000000084000000000000"], 0x18}}], 0x2, 0x0) 12:17:20 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="804000001009594b85c63c1cbd217c1befb0bb7a37993f6570e7e16ce3ec50bfc5ef8a02d2d09d533bdb902162bd8a34bd99f1433849e30002000015c7903df39cd3cec7fd016a7d19f90d050474571be52defa8b3180d89ea2486a44400000000000000000000000000b60ceceb46f90c68c46c5ad8340b1ce369fbab834d586f066b3038584fbf07", 0x89}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 12:17:20 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x143042, 0x0) write$P9_RLERRORu(r0, 0x0, 0xfd0f) r1 = gettid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x1000000000016) 12:17:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)='/#mR\xdeL!/\xb8V\x9ad', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000003c0)='net/stat\x00') [ 240.309322][ T9131] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 12:17:20 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x143042, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xfd0f) gettid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 12:17:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 12:17:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7) 12:17:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x75, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff99707637fcca0c8d8f08c3306f8a2b908e860a2f99910"], 0x70) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:21 executing program 0: poll(&(0x7f0000000100)=[{}, {}, {}], 0x1bf, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6008fdfa26bc9e03, 0x0, 0x0, 0x800e00519) poll(0x0, 0x0, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00a4f) poll(&(0x7f0000000180)=[{r1, 0x40}], 0x1, 0x1ff) shutdown(r0, 0x0) [ 240.875323][ T9194] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 240.893663][ T9194] FAT-fs (loop5): Filesystem has been set read-only [ 240.905710][ T9194] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 12:17:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:17:21 executing program 3: setresuid(0x0, 0xfffe, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') quotactl(0x0, 0x0, 0x0, 0x0) 12:17:21 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) 12:17:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff99707637fcca0c8d8f08c3306f8a2b908e860a2f99910"], 0x70) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)=""/75, 0x4b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r2 = dup(r1) shutdown(r2, 0x0) [ 241.469480][ T9212] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:17:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7) [ 241.609032][ T9212] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:17:22 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) 12:17:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000640)=""/253, 0xfd}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)=""/243, 0xf3}], 0x1}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 12:17:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x7c, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:22 executing program 2: 12:17:22 executing program 2: 12:17:22 executing program 2: 12:17:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff99707637fcca0c8d8f08c3306f8a2b908e860a2f99910"], 0x70) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:22 executing program 2: 12:17:22 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) 12:17:22 executing program 3: 12:17:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7) 12:17:22 executing program 3: 12:17:23 executing program 2: 12:17:23 executing program 0: 12:17:23 executing program 3: 12:17:23 executing program 0: 12:17:23 executing program 2: 12:17:23 executing program 3: 12:17:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f15a9d4b6e6d3e996e89d73dd4d973a05ef09fbdd43cd799146c1311faff99707637fcca0c8d8f08c3306f8a2b908e860a2f99910"], 0x70) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:23 executing program 0: 12:17:23 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:23 executing program 3: 12:17:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7) 12:17:23 executing program 2: 12:17:23 executing program 0: 12:17:24 executing program 3: 12:17:24 executing program 0: 12:17:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x247ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') exit(0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) getdents(r0, 0x0, 0x0) 12:17:24 executing program 3: r0 = socket(0x100004400000010, 0x2, 0x0) write(r0, &(0x7f0000000480)="2400000052001f0014f9f407010904000a00071004000100f6ffffff0801000000010000", 0x24) 12:17:24 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0x2, "562d3e66741d2140228989a0dcf820331a12bb3fb4017157b861678d39885b7f"}) 12:17:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x3, 0x16}, 0x20) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 12:17:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='#md5sum\x00', 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 12:17:24 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) 12:17:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') sendfile(r0, r1, 0x0, 0x7) 12:17:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="113ecd1e2529dbc7f66ada41516b9862e1", 0x11) 12:17:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') sendfile(r0, r1, 0x0, 0x7) 12:17:25 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) syz_genetlink_get_family_id$ipvs(0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa778257"], 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:25 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x202, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) [ 244.745074][ T9372] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 244.807336][ T9372] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 12:17:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 12:17:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') sendfile(r0, r1, 0x0, 0x7) 12:17:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue1\x00'}) 12:17:25 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chmod(&(0x7f0000000040)='./file0\x00', 0x0) 12:17:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) exit(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7) [ 245.586570][ T9386] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 245.600616][ T9386] FAT-fs (loop1): Filesystem has been set read-only 12:17:26 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) 12:17:26 executing program 5: poll(&(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6008fdfa26bc9e03, 0x0, 0x0, 0x800e00519) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/44, 0x2c}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) shutdown(r0, 0x0) 12:17:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') 12:17:26 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={@local}) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 12:17:26 executing program 2: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$sock(r0, &(0x7f0000001a00)={&(0x7f0000000440)=@un=@abs, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)="f79c75f7bd7207e28f4615d2b9de61e4eed8b896e83ba0e2023c293ddfeb71f3ffc270083723d631", 0x28}], 0x1, &(0x7f00000004c0)=[@timestamping={{0x14, 0x1, 0x25, 0x100}}], 0x18}, 0x0) [ 245.873076][ T9416] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 245.905975][ T9416] FAT-fs (loop0): Filesystem has been set read-only [ 245.975045][ T9434] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 245.986642][ T9424] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 245.996882][ T9434] FAT-fs (loop1): Filesystem has been set read-only [ 246.015257][ T9434] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 12:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @mcast1}]}}}]}, 0x48}}, 0x0) 12:17:26 executing program 2: 12:17:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) 12:17:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) exit(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7) [ 246.024015][ T9424] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 246.059784][ T9424] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 246.118682][ T9424] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:17:26 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa7782577fcebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a"], 0x39) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) request_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='vfat\x00', 0xffffffffffffffff) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) [ 246.175623][ T9424] [ 246.178220][ T9424] ============================= [ 246.187564][ T9424] WARNING: suspicious RCU usage [ 246.193863][ T9424] 5.3.0-rc6-next-20190826 #73 Not tainted [ 246.200119][ T9424] ----------------------------- [ 246.205121][ T9424] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 246.231061][ T9424] [ 246.231061][ T9424] other info that might help us debug this: [ 246.231061][ T9424] [ 246.251953][ T9424] [ 246.251953][ T9424] rcu_scheduler_active = 2, debug_locks = 1 [ 246.260925][ T9424] 1 lock held by syz-executor.3/9424: [ 246.266509][ T9424] #0: ffff88805cd3c418 (&type->s_umount_key#32){++++}, at: deactivate_super+0x1aa/0x1d0 12:17:26 executing program 2: [ 246.284688][ T9424] [ 246.284688][ T9424] stack backtrace: [ 246.316354][ T9424] CPU: 1 PID: 9424 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190826 #73 [ 246.325543][ T9424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.335864][ T9424] Call Trace: [ 246.339249][ T9424] dump_stack+0x172/0x1f0 [ 246.343611][ T9424] lockdep_rcu_suspicious+0x153/0x15d [ 246.349004][ T9424] ext4_release_system_zone+0x166/0x1a0 [ 246.354559][ T9424] ext4_put_super+0x954/0xd70 [ 246.359336][ T9424] ? ext4_quota_write+0x5a0/0x5a0 [ 246.359364][ T9424] generic_shutdown_super+0x14c/0x370 [ 246.359380][ T9424] kill_block_super+0xa0/0x100 [ 246.359395][ T9424] deactivate_locked_super+0x95/0x100 [ 246.359409][ T9424] deactivate_super+0x1b2/0x1d0 [ 246.359427][ T9424] ? mount_bdev+0x3c0/0x3c0 [ 246.389547][ T9424] ? dput+0x38/0xe10 [ 246.393552][ T9424] ? dput+0x1f2/0xe10 [ 246.397544][ T9424] ? mnt_get_writers.isra.0+0xf9/0x150 [ 246.403020][ T9424] cleanup_mnt+0x351/0x4c0 [ 246.407533][ T9424] ? trace_hardirqs_on+0x67/0x240 [ 246.412754][ T9424] ? __kasan_check_read+0x11/0x20 [ 246.417833][ T9424] __cleanup_mnt+0x16/0x20 [ 246.422259][ T9424] task_work_run+0x145/0x1c0 [ 246.427016][ T9424] exit_to_usermode_loop+0x316/0x380 [ 246.432407][ T9424] do_syscall_64+0x65f/0x760 [ 246.437095][ T9424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.442996][ T9424] RIP: 0033:0x45c2ca [ 246.446900][ T9424] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 246.467135][ T9424] RSP: 002b:00007fe39731ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 246.475823][ T9424] RAX: ffffffffffffffea RBX: 00007fe39731bb40 RCX: 000000000045c2ca 12:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='syz', 0xfffffffffffffffe) 12:17:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mlockall(0x5) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() lseek(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[0x0, &(0x7f0000000100)='\x00', &(0x7f0000000180)='/dev/hwrng\x00'], 0x0, 0x400) [ 246.483980][ T9424] RDX: 00007fe39731bae0 RSI: 0000000020000000 RDI: 00007fe39731bb00 [ 246.493167][ T9424] RBP: 0000000000001000 R08: 00007fe39731bb40 R09: 00007fe39731bae0 [ 246.501327][ T9424] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 246.509454][ T9424] R13: 00000000004c89d6 R14: 00000000004df8f8 R15: 00000000ffffffff 12:17:27 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000540)=[{&(0x7f00000001c0)='m', 0x1}], 0x1, &(0x7f00000005c0)=[@dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30}], 0x1, 0x0) [ 246.797232][ T9424] ------------[ cut here ]------------ [ 246.803006][ T9424] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 246.812089][ T9424] WARNING: CPU: 0 PID: 9424 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 246.821552][ T9424] Kernel panic - not syncing: panic_on_warn set ... [ 246.828152][ T9424] CPU: 0 PID: 9424 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190826 #73 [ 246.830459][ T3891] kobject: 'loop2' (00000000ffdff99e): kobject_uevent_env [ 246.837172][ T9424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.837179][ T9424] Call Trace: [ 246.837200][ T9424] dump_stack+0x172/0x1f0 [ 246.837222][ T9424] ? debug_print_object+0x90/0x250 [ 246.867260][ T9424] panic+0x2dc/0x755 [ 246.871289][ T9424] ? add_taint.cold+0x16/0x16 [ 246.876076][ T9424] ? __kasan_check_write+0x14/0x20 [ 246.877053][ T3891] kobject: 'loop2' (00000000ffdff99e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 246.881272][ T9424] ? __warn.cold+0x14/0x3c 12:17:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') [ 246.881294][ T9424] ? debug_print_object+0x168/0x250 [ 246.881307][ T9424] __warn.cold+0x2f/0x3c [ 246.881321][ T9424] ? debug_print_object+0x168/0x250 [ 246.881336][ T9424] report_bug+0x289/0x300 [ 246.881356][ T9424] do_error_trap+0x11b/0x200 [ 246.881372][ T9424] do_invalid_op+0x37/0x50 [ 246.924057][ T9424] ? debug_print_object+0x168/0x250 [ 246.929266][ T9424] invalid_op+0x23/0x30 [ 246.933600][ T9424] RIP: 0010:debug_print_object+0x168/0x250 [ 246.939415][ T9424] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 246.959200][ T9424] RSP: 0018:ffff88805d5ffb80 EFLAGS: 00010086 [ 246.965463][ T9424] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 246.973460][ T9424] RDX: 0000000000040000 RSI: ffffffff815bd606 RDI: ffffed100babff62 [ 246.979008][ T3891] kobject: 'loop4' (00000000fce3217d): kobject_uevent_env [ 246.981445][ T9424] RBP: ffff88805d5ffbc0 R08: ffff8880968c4600 R09: ffffed1015d04109 [ 246.992122][ T3891] kobject: 'loop4' (00000000fce3217d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.996644][ T9424] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 246.996653][ T9424] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff888094769540 [ 246.996684][ T9424] ? vprintk_func+0x86/0x189 [ 246.996710][ T9424] debug_check_no_obj_freed+0x2d4/0x43f [ 247.033182][ T9424] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 247.038750][ T9424] kfree+0xf8/0x2c0 [ 247.042578][ T9424] ext4_put_super+0x8e0/0xd70 [ 247.047281][ T9424] ? ext4_quota_write+0x5a0/0x5a0 [ 247.052321][ T9424] generic_shutdown_super+0x14c/0x370 [ 247.057962][ T9424] kill_block_super+0xa0/0x100 [ 247.063096][ T9424] deactivate_locked_super+0x95/0x100 [ 247.068467][ T9424] deactivate_super+0x1b2/0x1d0 [ 247.073320][ T9424] ? mount_bdev+0x3c0/0x3c0 [ 247.077940][ T9424] ? dput+0x38/0xe10 [ 247.081819][ T9424] ? dput+0x1f2/0xe10 [ 247.085790][ T9424] ? mnt_get_writers.isra.0+0xf9/0x150 [ 247.091375][ T9424] cleanup_mnt+0x351/0x4c0 [ 247.095817][ T9424] ? trace_hardirqs_on+0x67/0x240 [ 247.100932][ T9424] ? __kasan_check_read+0x11/0x20 [ 247.106110][ T9424] __cleanup_mnt+0x16/0x20 [ 247.110538][ T9424] task_work_run+0x145/0x1c0 [ 247.115138][ T9424] exit_to_usermode_loop+0x316/0x380 [ 247.120542][ T9424] do_syscall_64+0x65f/0x760 [ 247.125154][ T9424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.131238][ T9424] RIP: 0033:0x45c2ca [ 247.135221][ T9424] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 247.154814][ T9424] RSP: 002b:00007fe39731ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 247.163221][ T9424] RAX: ffffffffffffffea RBX: 00007fe39731bb40 RCX: 000000000045c2ca [ 247.171524][ T9424] RDX: 00007fe39731bae0 RSI: 0000000020000000 RDI: 00007fe39731bb00 [ 247.179485][ T9424] RBP: 0000000000001000 R08: 00007fe39731bb40 R09: 00007fe39731bae0 [ 247.187560][ T9424] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 247.195527][ T9424] R13: 00000000004c89d6 R14: 00000000004df8f8 R15: 00000000ffffffff [ 247.205843][ T9424] Kernel Offset: disabled [ 247.210249][ T9424] Rebooting in 86400 seconds..