Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. 2019/08/16 06:29:50 fuzzer started 2019/08/16 06:29:53 dialing manager at 10.128.0.26:36439 2019/08/16 06:29:53 syscalls: 2487 2019/08/16 06:29:53 code coverage: enabled 2019/08/16 06:29:53 comparison tracing: enabled 2019/08/16 06:29:53 extra coverage: extra coverage is not supported by the kernel 2019/08/16 06:29:53 setuid sandbox: enabled 2019/08/16 06:29:53 namespace sandbox: enabled 2019/08/16 06:29:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/16 06:29:53 fault injection: enabled 2019/08/16 06:29:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/16 06:29:53 net packet injection: enabled 2019/08/16 06:29:53 net device setup: enabled 06:32:04 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x91f4a6) writev(r0, 0x0, 0x0) read(r0, 0x0, 0x0) 06:32:04 executing program 1: r0 = socket$inet(0x2, 0x3, 0x16) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syzkaller login: [ 219.095387][ T9432] IPVS: ftp: loaded support on port[0] = 21 [ 219.180664][ T9434] IPVS: ftp: loaded support on port[0] = 21 06:32:04 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0xa, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 219.324522][ T9432] chnl_net:caif_netlink_parms(): no params data found [ 219.474553][ T9432] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.488007][ T9432] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.508178][ T9432] device bridge_slave_0 entered promiscuous mode [ 219.529340][ T9434] chnl_net:caif_netlink_parms(): no params data found [ 219.539844][ T9432] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.548812][ T9432] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.557368][ T9432] device bridge_slave_1 entered promiscuous mode [ 219.595552][ T9439] IPVS: ftp: loaded support on port[0] = 21 [ 219.628289][ T9432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 06:32:05 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x125d, 0x0) [ 219.640530][ T9432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 219.730024][ T9434] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.738120][ T9434] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.749074][ T9434] device bridge_slave_0 entered promiscuous mode [ 219.779072][ T9432] team0: Port device team_slave_0 added [ 219.790765][ T9434] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.799445][ T9434] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.808017][ T9434] device bridge_slave_1 entered promiscuous mode [ 219.824066][ T9432] team0: Port device team_slave_1 added [ 219.859962][ T9441] IPVS: ftp: loaded support on port[0] = 21 [ 219.883031][ T9434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 06:32:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="108d9369ae9b32c471647ad81e653f35", 0x10) [ 219.979906][ T9432] device hsr_slave_0 entered promiscuous mode [ 220.029173][ T9432] device hsr_slave_1 entered promiscuous mode [ 220.071540][ T9434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.157355][ T9434] team0: Port device team_slave_0 added [ 220.181584][ T9434] team0: Port device team_slave_1 added [ 220.194954][ T9443] IPVS: ftp: loaded support on port[0] = 21 [ 220.233924][ T9432] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.241305][ T9432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.249799][ T9432] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.256980][ T9432] bridge0: port 1(bridge_slave_0) entered forwarding state 06:32:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020ae76, &(0x7f0000000040)={0x0, 0x0}) [ 220.330192][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.347791][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.439786][ T9434] device hsr_slave_0 entered promiscuous mode [ 220.497133][ T9434] device hsr_slave_1 entered promiscuous mode [ 220.566520][ T9434] debugfs: Directory 'hsr0' with parent '/' already present! [ 220.594580][ T9447] IPVS: ftp: loaded support on port[0] = 21 [ 220.627452][ T9439] chnl_net:caif_netlink_parms(): no params data found [ 220.723071][ T9439] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.731790][ T9439] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.740127][ T9439] device bridge_slave_0 entered promiscuous mode [ 220.763132][ T9439] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.771588][ T9439] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.780183][ T9439] device bridge_slave_1 entered promiscuous mode [ 220.805283][ T9439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.829376][ T9439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.910413][ T9441] chnl_net:caif_netlink_parms(): no params data found [ 220.942766][ T9439] team0: Port device team_slave_0 added [ 220.951562][ T9439] team0: Port device team_slave_1 added [ 220.993842][ T9441] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.001751][ T9441] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.010263][ T9441] device bridge_slave_0 entered promiscuous mode [ 221.020370][ T9441] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.027644][ T9441] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.035881][ T9441] device bridge_slave_1 entered promiscuous mode [ 221.104395][ T9432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.142937][ T9441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.162017][ T9443] chnl_net:caif_netlink_parms(): no params data found [ 221.209102][ T9439] device hsr_slave_0 entered promiscuous mode [ 221.267023][ T9439] device hsr_slave_1 entered promiscuous mode [ 221.316821][ T9439] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.352151][ T9441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.364342][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.374075][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.444004][ T9432] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.471800][ T9441] team0: Port device team_slave_0 added [ 221.479884][ T9447] chnl_net:caif_netlink_parms(): no params data found [ 221.515774][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.525262][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.537903][ T2992] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.544994][ T2992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.554693][ T9441] team0: Port device team_slave_1 added [ 221.569450][ T9443] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.577974][ T9443] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.585850][ T9443] device bridge_slave_0 entered promiscuous mode [ 221.595448][ T9443] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.603337][ T9443] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.612006][ T9443] device bridge_slave_1 entered promiscuous mode [ 221.625775][ T9434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.671588][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.684061][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.693456][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.700709][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.742606][ T9443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.757987][ T9443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.820268][ T9441] device hsr_slave_0 entered promiscuous mode [ 221.877091][ T9441] device hsr_slave_1 entered promiscuous mode [ 221.916621][ T9441] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.924475][ T9447] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.931844][ T9447] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.940300][ T9447] device bridge_slave_0 entered promiscuous mode [ 221.950769][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.961096][ T9447] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.969030][ T9447] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.977314][ T9447] device bridge_slave_1 entered promiscuous mode [ 222.017403][ T9447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.038749][ T9443] team0: Port device team_slave_0 added [ 222.048920][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.057510][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.083301][ T9434] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.093394][ T9447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.121412][ T9443] team0: Port device team_slave_1 added [ 222.128939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.138580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.150771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.159804][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.185299][ T9447] team0: Port device team_slave_0 added [ 222.194183][ T9447] team0: Port device team_slave_1 added [ 222.205784][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.215901][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.225068][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.235009][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.244025][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.251255][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.304188][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.312741][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.322840][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.331826][ T2992] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.338992][ T2992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.347757][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.357276][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.371010][ T9432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.428773][ T9447] device hsr_slave_0 entered promiscuous mode [ 222.477122][ T9447] device hsr_slave_1 entered promiscuous mode [ 222.516909][ T9447] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.533692][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.543123][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.599582][ T9443] device hsr_slave_0 entered promiscuous mode [ 222.647171][ T9443] device hsr_slave_1 entered promiscuous mode [ 222.706629][ T9443] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.715007][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.724613][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.752561][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.762564][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.771449][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.811846][ T9439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.828964][ T9432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.852616][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.864463][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.873950][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.883236][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.892440][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.901371][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.929538][ T9439] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.954051][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.963435][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.980824][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.990395][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.999178][ T2992] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.006647][ T2992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.017408][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.035586][ T9434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.049165][ T9441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.115833][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.131485][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.143725][ T9438] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.151162][ T9438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.160887][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.169928][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.179131][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.188328][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.197838][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.208434][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.217980][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.227082][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.236196][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.273489][ T9434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.303024][ T9441] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.339079][ T9439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 223.384659][ T9439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.395072][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.404705][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.413348][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.426174][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.462761][ T9447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.498137][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.511607][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.528350][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.535585][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.551114][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.564681][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.581329][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.588556][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.639182][ T9447] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.654681][ T9439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.670679][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.682953][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.708561][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.722585][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.749382][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.764508][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.775363][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.784745][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.793387][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.887728][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.923967][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 06:32:09 executing program 0: kexec_load(0x0, 0x1, &(0x7f0000000240)=[{0x0}], 0x0) [ 223.948109][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.965370][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.985834][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 06:32:09 executing program 0: [ 224.023315][ T9451] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.030815][ T9451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.039974][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.057026][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:32:09 executing program 0: [ 224.068643][ T9451] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.075803][ T9451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.098582][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.108858][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.118811][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.134415][ T9441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:32:09 executing program 0: [ 224.170593][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.188256][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 06:32:09 executing program 1: [ 224.272270][ T9443] 8021q: adding VLAN 0 to HW filter on device bond0 06:32:09 executing program 0: [ 224.327000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.357443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.366225][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 06:32:10 executing program 1: 06:32:10 executing program 0: [ 224.457908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.486945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.495650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.540000][ T9447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.554339][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.601170][ T9443] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.624628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.635859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.659808][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.683020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.693337][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.728883][ T9441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.765878][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 06:32:10 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x1050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f00000003c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) getsockopt$inet_int(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) [ 224.775423][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.798954][ T2992] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.806089][ T2992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.814596][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.823567][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.832702][ T2992] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.839997][ T2992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.857971][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.913735][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.923250][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.940308][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.984835][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.003349][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.019166][ T9447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.061787][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.082925][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.103611][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.112614][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.133202][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.143219][ T9438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 06:32:10 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000240)='./file2\x00', 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 225.187584][ T9443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.301710][ T9443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.559481][ T9546] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 225.659595][ C0] hrtimer: interrupt took 31997 ns 06:32:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="108d9369ae9b32c471647ad81e653f35", 0x10) 06:32:11 executing program 1: 06:32:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:32:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 06:32:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) 06:32:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)) 06:32:11 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x6488, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 06:32:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f000000a180)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="80de49c76187fbf101b7ef9f2727bef8dc1fe30e3d25a1773084f26647d99cd8f4eeac06ec8a3a525bb2b2b0a15e53a4b09c54e1a6f1fed5669975a11720d76c7b1c984f1b16c3eae07b701cfa7005da4351a0e3321658ec7607ed125cc46fdebdbed4934ccfa1cf74cd7ede9a01a9b25bcf65b685b56cda9bb884e88ed5c4d11fad07316f58a3db8b577b102360816a3073c3bcbb04be8d18b98f9e", 0x9c}], 0x1}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000009780)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}}], 0x400000000000118, 0x0, 0x0) 06:32:11 executing program 3: 06:32:11 executing program 5: 06:32:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="108d9369ae9b32c471647ad81e653f35", 0x10) 06:32:11 executing program 1: 06:32:11 executing program 3: 06:32:11 executing program 5: 06:32:11 executing program 0: 06:32:12 executing program 1: 06:32:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="108d9369ae9b32c471647ad81e653f35", 0x10) 06:32:12 executing program 5: 06:32:12 executing program 3: 06:32:12 executing program 2: 06:32:12 executing program 0: 06:32:12 executing program 1: 06:32:12 executing program 3: 06:32:12 executing program 5: 06:32:12 executing program 4: 06:32:12 executing program 3: 06:32:12 executing program 1: 06:32:12 executing program 4: 06:32:12 executing program 0: 06:32:12 executing program 5: 06:32:12 executing program 2: 06:32:12 executing program 1: 06:32:12 executing program 4: 06:32:12 executing program 5: 06:32:12 executing program 3: 06:32:12 executing program 0: 06:32:13 executing program 1: 06:32:13 executing program 2: 06:32:13 executing program 4: 06:32:13 executing program 3: 06:32:13 executing program 5: 06:32:13 executing program 0: 06:32:13 executing program 5: 06:32:13 executing program 2: 06:32:13 executing program 1: 06:32:13 executing program 4: 06:32:13 executing program 3: 06:32:13 executing program 0: 06:32:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 06:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127c, 0x70e004) 06:32:13 executing program 2: r0 = getpgid(0x0) pipe(&(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000000003d) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x4}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x9, r1, 0x0, 0x0) 06:32:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$P9_RLCREATE(r2, &(0x7f0000000540)={0x18}, 0x18) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 06:32:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fdatasync(r2) 06:32:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/192, 0xc0}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000440)="0d945cfa2b6ac90a2518b7a94c2b2b46859a3852dd38bb27bcd8fa701ccc1d018bccdce70875d2656f4801ca9c26538ed788f6ca2e3070cc4050f86aa038bc1a54cf9a9e77e2515a3575b78b9d6d3ba608cd0ea83550f203a720a48c93214391577de7b932cafc61a05d454d3a2faad234c54fceb5d960e1d818e4dcf7eba6add2e0", 0x82, 0x0, 0x0, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x1, 0x0, 0x0) tkill(r1, 0x14) 06:32:13 executing program 1: unshare(0x40600) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 06:32:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/192, 0xc0}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000440)="0d945cfa2b6ac90a2518b7a94c2b2b46859a3852dd38bb27bcd8fa701ccc1d018bccdce70875d2656f4801ca9c26538ed788f6ca2e3070cc4050f86aa038bc1a54cf9a9e77e2515a3575b78b9d6d3ba608cd0ea83550f203a720a48c93214391577de7b932cafc61a05d454d3a2faad234c54fceb5d960e1d818e4dcf7eba6add2e0", 0x82, 0x0, 0x0, 0x0) r2 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x1, 0x0, 0x0) tkill(r2, 0x14) 06:32:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @local, @remote}, 0xc) 06:32:14 executing program 5: unshare(0x24020400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) flock(r0, 0x2) 06:32:14 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) dup2(r1, r0) 06:32:14 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfffffe8b) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:32:14 executing program 2: 06:32:14 executing program 5: 06:32:14 executing program 3: 06:32:14 executing program 2: 06:32:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 06:32:14 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.sta\x9f\xd4t/+\fJ{\t\xab\v\x02t\xe1\t\xa5\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\n/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\xa4\xeba\x1f\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x89\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\xb8\x9a\xc2\xf8\x11S\xf4\xa6$c\xdd\xd6\xb8#\xf1\x84X\xb1\xe5\x98\x14\x87\x99\x1c\x00,C\xb7c\x90v{\xf6\xcf\xe9\xd3N\t\xd3J\xa1tm\xee\x8eX\x8e\xfa\xf7\n\xb2\xb8\x9b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\xa3w\xbbP\x98\x01-39\x9d\x9ed\x97g\x00\x9f5\x15\xfa\xf7{\xf8\xf6]P\xff\x11\xad@\xc0\x05&\xbb\x03\xe73\xa1\xe7\x95\x88\x80H\x00'/256, 0x2761, 0x0) 06:32:14 executing program 2: 06:32:14 executing program 4: 06:32:14 executing program 3: 06:32:14 executing program 3: 06:32:14 executing program 2: [ 229.187089][ T9741] device nr0 entered promiscuous mode [ 229.743096][ T9741] device nr0 entered promiscuous mode 06:32:15 executing program 1: 06:32:15 executing program 0: 06:32:15 executing program 2: 06:32:15 executing program 4: 06:32:15 executing program 3: 06:32:15 executing program 5: 06:32:15 executing program 2: 06:32:15 executing program 3: 06:32:15 executing program 0: 06:32:15 executing program 4: 06:32:15 executing program 1: 06:32:15 executing program 4: 06:32:15 executing program 5: 06:32:15 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/186, 0x28a) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents(r0, &(0x7f0000000180)=""/223, 0xdf) 06:32:15 executing program 2: 06:32:15 executing program 3: 06:32:15 executing program 1: 06:32:16 executing program 4: 06:32:16 executing program 2: 06:32:16 executing program 3: 06:32:16 executing program 5: 06:32:16 executing program 1: 06:32:16 executing program 4: 06:32:16 executing program 2: 06:32:16 executing program 0: 06:32:16 executing program 3: 06:32:16 executing program 5: 06:32:16 executing program 4: 06:32:16 executing program 2: 06:32:16 executing program 1: 06:32:16 executing program 0: 06:32:16 executing program 5: 06:32:16 executing program 4: 06:32:16 executing program 2: 06:32:16 executing program 3: 06:32:16 executing program 1: 06:32:16 executing program 0: 06:32:16 executing program 5: 06:32:16 executing program 2: 06:32:17 executing program 1: 06:32:17 executing program 4: 06:32:17 executing program 3: 06:32:17 executing program 0: 06:32:17 executing program 4: 06:32:17 executing program 2: 06:32:17 executing program 5: 06:32:17 executing program 1: 06:32:17 executing program 0: 06:32:17 executing program 3: 06:32:17 executing program 4: 06:32:17 executing program 2: 06:32:17 executing program 1: 06:32:17 executing program 5: 06:32:17 executing program 4: 06:32:17 executing program 3: 06:32:17 executing program 0: 06:32:17 executing program 5: 06:32:17 executing program 2: 06:32:17 executing program 1: 06:32:17 executing program 4: 06:32:18 executing program 3: 06:32:18 executing program 5: 06:32:18 executing program 0: 06:32:18 executing program 2: 06:32:18 executing program 4: 06:32:18 executing program 1: 06:32:18 executing program 5: 06:32:18 executing program 3: 06:32:18 executing program 0: 06:32:18 executing program 4: 06:32:18 executing program 1: 06:32:18 executing program 5: 06:32:18 executing program 2: 06:32:18 executing program 3: 06:32:18 executing program 4: 06:32:18 executing program 1: 06:32:18 executing program 0: 06:32:18 executing program 3: 06:32:18 executing program 5: 06:32:18 executing program 1: 06:32:18 executing program 2: 06:32:18 executing program 4: 06:32:18 executing program 0: 06:32:18 executing program 3: 06:32:19 executing program 5: 06:32:19 executing program 1: 06:32:19 executing program 4: 06:32:19 executing program 2: 06:32:19 executing program 0: 06:32:19 executing program 5: 06:32:19 executing program 3: 06:32:19 executing program 1: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xa0000002}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 06:32:19 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fff}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 06:32:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 06:32:19 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x323) creat(&(0x7f0000000380)='./bus\x00', 0x0) r3 = getpid() syz_genetlink_get_family_id$tipc(0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) dup(r4) r5 = socket(0x10, 0x80002, 0x0) bind$netlink(r5, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r5, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) recvfrom(r4, &(0x7f00000003c0)=""/167, 0xa7, 0x20, &(0x7f00000005c0)=@in6={0xa, 0x4e20, 0x4, @mcast1, 0x6}, 0x80) connect$netlink(r5, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) unlinkat(r2, 0x0, 0x0) connect$netlink(r0, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x40004000}, 0xc) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000b4bffc)=0x2, 0xfffffffffffffe91) sendto(r5, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) recvfrom(r0, &(0x7f00000004c0)=""/219, 0xdb, 0x10040, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="0077836931d2d12e8028dffb3ecd3c2b2e9dcc28f50edd2a05580000000000fb795f41319c00000000000000"], 0x7) sync_file_range(r5, 0xfffffffffffffff9, 0x8, 0x6) sendfile(r2, r4, &(0x7f0000000140), 0x8fff) syz_open_procfs(0x0, 0x0) 06:32:19 executing program 5: unshare(0x20600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) 06:32:19 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0046d00, &(0x7f0000000000)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 06:32:19 executing program 4: r0 = syz_open_dev$sndpcmp(0x0, 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x8}) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x02', 0x1ff) unshare(0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) [ 234.112020][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:32:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000001340)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x5) setresuid(0x0, 0xee01, 0x0) keyctl$setperm(0x5, r0, 0x4) keyctl$setperm(0x3, r0, 0x0) [ 234.179853][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:32:19 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x800000007}, 0x10) write(r0, &(0x7f00000000c0)="240000001a005f0214f9f4070009040011000000ff00000d0000000004000f0003000000", 0x24) [ 234.287331][ T9946] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 06:32:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') read$FUSE(r0, 0x0, 0x0) [ 234.478772][ T9943] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:32:20 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 234.556538][ T9943] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 234.587545][ T9974] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 06:32:20 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 234.656932][ T9978] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 06:32:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x6, 0x0, [], {0x872bcb4b13dda7aa, @reserved}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpeername$unix(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 06:32:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0}], 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)}, 0x4008000) [ 235.236054][ T9984] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 235.387029][ T9984] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 06:32:23 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x100000001, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 06:32:23 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:23 executing program 4: r0 = syz_open_dev$sndpcmp(0x0, 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x8}) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x02', 0x1ff) unshare(0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) 06:32:23 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc08c5102, 0x0) 06:32:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x800000007}, 0x10) write(r0, &(0x7f00000000c0)="240000001a005f0214f9f4070009040011000000ff00000d000a000008000f0003000000", 0x24) 06:32:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x6, 0x0, [], {0x872bcb4b13dda7aa, @reserved}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpeername$unix(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 06:32:23 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64, @ANYPTR]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x3c0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @dev}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10240}, 0xc, &(0x7f0000000280)={0x0}}, 0x40000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r5 = syz_open_pts(r2, 0x440500) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000300)={'team0\x00', r3}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000001740)=""/187) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) fcntl$lock(r0, 0x26, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r6, &(0x7f00000004c0)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0) 06:32:23 executing program 2: [ 238.216795][ C0] [ 238.219189][ C0] ======================================================== [ 238.226380][ C0] WARNING: possible irq lock inversion dependency detected [ 238.233614][ C0] 5.3.0-rc4-next-20190814 #66 Not tainted [ 238.239338][ C0] -------------------------------------------------------- [ 238.246542][ C0] ksoftirqd/0/9 just changed the state of lock: [ 238.252784][ C0] ffff8880622edb58 (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 [ 238.262357][ C0] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 238.269899][ C0] (&fiq->waitq){+.+.} [ 238.269912][ C0] [ 238.269912][ C0] [ 238.269912][ C0] and interrupts could create inverse lock ordering between them. [ 238.269912][ C0] [ 238.288296][ C0] [ 238.288296][ C0] other info that might help us debug this: [ 238.296367][ C0] Possible interrupt unsafe locking scenario: [ 238.296367][ C0] [ 238.304700][ C0] CPU0 CPU1 [ 238.310075][ C0] ---- ---- [ 238.315449][ C0] lock(&fiq->waitq); [ 238.319530][ C0] local_irq_disable(); [ 238.326290][ C0] lock(&(&ctx->ctx_lock)->rlock); [ 238.334036][ C0] lock(&fiq->waitq); [ 238.340634][ C0] [ 238.344102][ C0] lock(&(&ctx->ctx_lock)->rlock); [ 238.349480][ C0] [ 238.349480][ C0] *** DEADLOCK *** [ 238.349480][ C0] [ 238.357647][ C0] 2 locks held by ksoftirqd/0/9: [ 238.362583][ C0] #0: ffffffff88fa99c0 (rcu_callback){....}, at: rcu_core+0x60e/0x1560 [ 238.370981][ C0] #1: ffffffff88fa9a00 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x20e/0x570 [ 238.381893][ C0] [ 238.381893][ C0] the shortest dependencies between 2nd lock and 1st lock: [ 238.391304][ C0] -> (&fiq->waitq){+.+.} { [ 238.395818][ C0] HARDIRQ-ON-W at: [ 238.399905][ C0] lock_acquire+0x190/0x410 [ 238.406455][ C0] _raw_spin_lock+0x2f/0x40 [ 238.412818][ C0] flush_bg_queue+0x1f3/0x3c0 [ 238.419340][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 238.427161][ C0] fuse_request_send_background+0x58/0x110 [ 238.434822][ C0] cuse_channel_open+0x5ba/0x830 [ 238.441639][ C0] misc_open+0x395/0x4c0 [ 238.447836][ C0] chrdev_open+0x245/0x6b0 [ 238.454188][ C0] do_dentry_open+0x4df/0x1250 [ 238.460792][ C0] vfs_open+0xa0/0xd0 [ 238.466632][ C0] path_openat+0x10e9/0x4630 [ 238.473160][ C0] do_filp_open+0x1a1/0x280 [ 238.479508][ C0] do_sys_open+0x3fe/0x5d0 [ 238.485850][ C0] __x64_sys_openat+0x9d/0x100 [ 238.492562][ C0] do_syscall_64+0xfa/0x760 [ 238.498910][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.506626][ C0] SOFTIRQ-ON-W at: [ 238.510763][ C0] lock_acquire+0x190/0x410 [ 238.517109][ C0] _raw_spin_lock+0x2f/0x40 [ 238.523456][ C0] flush_bg_queue+0x1f3/0x3c0 [ 238.529992][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 238.537899][ C0] fuse_request_send_background+0x58/0x110 [ 238.545546][ C0] cuse_channel_open+0x5ba/0x830 [ 238.552320][ C0] misc_open+0x395/0x4c0 [ 238.558411][ C0] chrdev_open+0x245/0x6b0 [ 238.564699][ C0] do_dentry_open+0x4df/0x1250 [ 238.571301][ C0] vfs_open+0xa0/0xd0 [ 238.577123][ C0] path_openat+0x10e9/0x4630 [ 238.583555][ C0] do_filp_open+0x1a1/0x280 [ 238.589900][ C0] do_sys_open+0x3fe/0x5d0 [ 238.596161][ C0] __x64_sys_openat+0x9d/0x100 [ 238.602795][ C0] do_syscall_64+0xfa/0x760 [ 238.609151][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.617217][ C0] INITIAL USE at: [ 238.621224][ C0] lock_acquire+0x190/0x410 [ 238.627472][ C0] _raw_spin_lock+0x2f/0x40 [ 238.633734][ C0] flush_bg_queue+0x1f3/0x3c0 [ 238.640166][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 238.647918][ C0] fuse_request_send_background+0x58/0x110 [ 238.655478][ C0] cuse_channel_open+0x5ba/0x830 [ 238.662166][ C0] misc_open+0x395/0x4c0 [ 238.668158][ C0] chrdev_open+0x245/0x6b0 [ 238.674329][ C0] do_dentry_open+0x4df/0x1250 [ 238.680847][ C0] vfs_open+0xa0/0xd0 [ 238.686583][ C0] path_openat+0x10e9/0x4630 [ 238.692931][ C0] do_filp_open+0x1a1/0x280 [ 238.699275][ C0] do_sys_open+0x3fe/0x5d0 [ 238.705468][ C0] __x64_sys_openat+0x9d/0x100 [ 238.711988][ C0] do_syscall_64+0xfa/0x760 [ 238.718245][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.725871][ C0] } [ 238.728509][ C0] ... key at: [] __key.45697+0x0/0x40 [ 238.736049][ C0] ... acquired at: [ 238.739961][ C0] _raw_spin_lock+0x2f/0x40 [ 238.744654][ C0] io_submit_one+0xefa/0x2ef0 [ 238.749514][ C0] __x64_sys_io_submit+0x1bd/0x570 [ 238.754806][ C0] do_syscall_64+0xfa/0x760 [ 238.759492][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.765551][ C0] [ 238.767899][ C0] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 238.773447][ C0] IN-SOFTIRQ-W at: [ 238.777444][ C0] lock_acquire+0x190/0x410 [ 238.783610][ C0] _raw_spin_lock_irq+0x60/0x80 [ 238.790991][ C0] free_ioctx_users+0x2d/0x490 [ 238.797417][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 238.805322][ C0] rcu_core+0x581/0x1560 [ 238.811230][ C0] rcu_core_si+0x9/0x10 [ 238.817053][ C0] __do_softirq+0x262/0x98c [ 238.823237][ C0] run_ksoftirqd+0x8e/0x110 [ 238.829407][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 238.836008][ C0] kthread+0x361/0x430 [ 238.841741][ C0] ret_from_fork+0x24/0x30 [ 238.847803][ C0] INITIAL USE at: [ 238.851708][ C0] lock_acquire+0x190/0x410 [ 238.857776][ C0] _raw_spin_lock_irq+0x60/0x80 [ 238.864197][ C0] io_submit_one+0xeb5/0x2ef0 [ 238.870448][ C0] __x64_sys_io_submit+0x1bd/0x570 [ 238.877133][ C0] do_syscall_64+0xfa/0x760 [ 238.883209][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.890666][ C0] } [ 238.893196][ C0] ... key at: [] __key.54228+0x0/0x40 [ 238.900652][ C0] ... acquired at: [ 238.904469][ C0] mark_lock+0x517/0x1220 [ 238.908978][ C0] __lock_acquire+0x1eaf/0x4e70 [ 238.914019][ C0] lock_acquire+0x190/0x410 [ 238.918704][ C0] _raw_spin_lock_irq+0x60/0x80 [ 238.923732][ C0] free_ioctx_users+0x2d/0x490 [ 238.928683][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 238.935017][ C0] rcu_core+0x581/0x1560 [ 238.939434][ C0] rcu_core_si+0x9/0x10 [ 238.943791][ C0] __do_softirq+0x262/0x98c [ 238.948488][ C0] run_ksoftirqd+0x8e/0x110 [ 238.953167][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 238.958274][ C0] kthread+0x361/0x430 [ 238.962516][ C0] ret_from_fork+0x24/0x30 [ 238.967091][ C0] [ 238.969583][ C0] [ 238.969583][ C0] stack backtrace: [ 238.975483][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0-rc4-next-20190814 #66 [ 238.983983][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.994058][ C0] Call Trace: [ 238.997383][ C0] dump_stack+0x172/0x1f0 [ 239.009378][ C0] print_irq_inversion_bug.part.0+0x2e4/0x2f1 [ 239.016999][ C0] check_usage_forwards.cold+0x20/0x29 [ 239.022476][ C0] ? check_usage_backwards+0x330/0x330 [ 239.027958][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 239.033789][ C0] mark_lock+0x517/0x1220 [ 239.038145][ C0] ? check_usage_backwards+0x330/0x330 [ 239.043609][ C0] __lock_acquire+0x1eaf/0x4e70 [ 239.048466][ C0] ? debug_smp_processor_id+0x3c/0x214 [ 239.053935][ C0] ? perf_trace_lock_acquire+0xf5/0x530 [ 239.059497][ C0] ? mark_held_locks+0xf0/0xf0 [ 239.064266][ C0] ? perf_trace_lock_acquire+0xf5/0x530 [ 239.069823][ C0] lock_acquire+0x190/0x410 [ 239.074338][ C0] ? free_ioctx_users+0x2d/0x490 [ 239.079290][ C0] _raw_spin_lock_irq+0x60/0x80 [ 239.084246][ C0] ? free_ioctx_users+0x2d/0x490 [ 239.089202][ C0] free_ioctx_users+0x2d/0x490 [ 239.093988][ C0] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 239.107117][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 239.113285][ C0] ? percpu_ref_exit+0xd0/0xd0 [ 239.118051][ C0] rcu_core+0x581/0x1560 [ 239.122307][ C0] ? __rcu_read_unlock+0x6b0/0x6b0 [ 239.127427][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 239.132988][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 239.139006][ C0] rcu_core_si+0x9/0x10 [ 239.143170][ C0] __do_softirq+0x262/0x98c [ 239.147699][ C0] ? takeover_tasklets+0x820/0x820 [ 239.152833][ C0] run_ksoftirqd+0x8e/0x110 [ 239.157370][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 239.162361][ C0] ? smpboot_register_percpu_thread+0x390/0x390 [ 239.168655][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.174924][ C0] ? __kthread_parkme+0x108/0x1c0 [ 239.179973][ C0] ? __kasan_check_read+0x11/0x20 [ 239.185023][ C0] kthread+0x361/0x430 [ 239.189120][ C0] ? smpboot_register_percpu_thread+0x390/0x390 [ 239.195374][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 239.201637][ C0] ret_from_fork+0x24/0x30 [ 239.214871][ T3895] kobject: 'loop3' (0000000034e48e33): kobject_uevent_env 06:32:24 executing program 2: [ 239.250030][ T3895] kobject: 'loop3' (0000000034e48e33): fill_kobj_path: path = '/devices/virtual/block/loop3' 06:32:24 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:24 executing program 4: r0 = syz_open_dev$sndpcmp(0x0, 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x8}) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x02', 0x1ff) unshare(0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) [ 239.311169][ T3895] kobject: 'loop2' (00000000c9fc068f): kobject_uevent_env [ 239.345648][ T3895] kobject: 'loop2' (00000000c9fc068f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 239.374718][ T3895] kobject: 'loop1' (0000000087cd6a7f): kobject_uevent_env [ 239.384458][ T3895] kobject: 'loop1' (0000000087cd6a7f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 239.412811][ T3895] kobject: 'loop4' (0000000099e53da7): kobject_uevent_env [ 239.440479][ T3895] kobject: 'loop4' (0000000099e53da7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 239.488794][ T3895] kobject: 'loop2' (00000000c9fc068f): kobject_uevent_env [ 239.504978][ T3895] kobject: 'loop2' (00000000c9fc068f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 239.535928][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 239.541799][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 239.557820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 239.563667][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:32:25 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x100000001, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 06:32:25 executing program 2: 06:32:25 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 239.598187][T10015] kobject: 'loop5' (00000000e0142827): kobject_uevent_env [ 239.623502][T10015] kobject: 'loop5' (00000000e0142827): fill_kobj_path: path = '/devices/virtual/block/loop5' 06:32:25 executing program 2: [ 239.667829][ T3895] kobject: 'loop0' (00000000bc72edb1): kobject_uevent_env [ 239.675201][ T3895] kobject: 'loop0' (00000000bc72edb1): fill_kobj_path: path = '/devices/virtual/block/loop0' 06:32:25 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x6, 0x0, [], {0x872bcb4b13dda7aa, @reserved}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpeername$unix(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 06:32:25 executing program 4: r0 = syz_open_dev$sndpcmp(0x0, 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x8}) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x02', 0x1ff) unshare(0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) [ 239.756056][ T3895] kobject: 'loop2' (00000000c9fc068f): kobject_uevent_env [ 239.773206][ T3895] kobject: 'loop2' (00000000c9fc068f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 239.801085][ T3895] kobject: 'loop1' (0000000087cd6a7f): kobject_uevent_env 06:32:25 executing program 2: unshare(0x20600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000680)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18, 0x4800000000000000}}], 0x1, 0x0) 06:32:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64, @ANYPTR]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x3c0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @dev}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10240}, 0xc, &(0x7f0000000280)={0x0}}, 0x40000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r5 = syz_open_pts(r2, 0x440500) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000300)={'team0\x00', r3}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000001740)=""/187) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) fcntl$lock(r0, 0x26, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r6, &(0x7f00000004c0)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0) 06:32:25 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x100000001, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 239.835478][ T3895] kobject: 'loop1' (0000000087cd6a7f): fill_kobj_path: path = '/devices/virtual/block/loop1' 06:32:25 executing program 1: bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 239.884014][ T3895] kobject: 'loop5' (00000000e0142827): kobject_uevent_env [ 239.897509][T10061] kobject: 'loop5' (00000000e0142827): kobject_uevent_env [ 239.904115][ T3895] kobject: 'loop5' (00000000e0142827): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 239.905325][T10061] kobject: 'loop5' (00000000e0142827): fill_kobj_path: path = '/devices/virtual/block/loop5' 06:32:25 executing program 2: unshare(0x20600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000680)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18, 0x4800000000000000}}], 0x1, 0x0) [ 239.953496][ T3895] kobject: 'loop4' (0000000099e53da7): kobject_uevent_env [ 239.962678][ T9438] rxrpc: Assertion failed [ 239.964346][ T3895] kobject: 'loop4' (0000000099e53da7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 239.967983][ T9438] ------------[ cut here ]------------ [ 239.982789][ T9438] kernel BUG at net/rxrpc/local_object.c:432! [ 240.041373][ T3895] kobject: 'loop3' (0000000034e48e33): kobject_uevent_env [ 240.068027][ T9438] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 240.074168][ T9438] CPU: 1 PID: 9438 Comm: kworker/1:2 Not tainted 5.3.0-rc4-next-20190814 #66 06:32:25 executing program 4: unshare(0x20600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000680)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18, 0x4800000000000000}}], 0x1, 0x0) [ 240.082939][ T9438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.083602][ T3895] kobject: 'loop3' (0000000034e48e33): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 240.093067][ T9438] Workqueue: krxrpcd rxrpc_local_processor [ 240.093092][ T9438] RIP: 0010:rxrpc_local_processor.cold+0x24/0x29 [ 240.093106][ T9438] Code: 5f 55 bd fa 0f 0b e8 44 df d3 fa 48 c7 c7 00 0f 5b 88 e8 4c 55 bd fa 0f 0b e8 31 df d3 fa 48 c7 c7 00 0f 5b 88 e8 39 55 bd fa <0f> 0b 90 90 90 55 48 89 e5 41 57 49 89 ff 41 56 41 55 41 54 53 48 [ 240.093123][ T9438] RSP: 0018:ffff8880962dfce8 EFLAGS: 00010282 [ 240.141106][ T9438] RAX: 0000000000000017 RBX: ffff8880a5aa4078 RCX: 0000000000000000 [ 240.142790][ T3895] kobject: 'loop0' (00000000bc72edb1): kobject_uevent_env [ 240.151605][ T9438] RDX: 0000000000000000 RSI: ffffffff815bb8d6 RDI: ffffed1012c5bf8f [ 240.151614][ T9438] RBP: ffff8880962dfd30 R08: 0000000000000017 R09: fffffbfff138c811 [ 240.151621][ T9438] R10: fffffbfff138c810 R11: ffffffff89c64087 R12: ffff8880a5a50648 [ 240.151628][ T9438] R13: ffff88808d090748 R14: ffff8880a5aa4040 R15: ffff8880862cb540 [ 240.151637][ T9438] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 240.151644][ T9438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.151651][ T9438] CR2: 0000001b31c24000 CR3: 00000000a7be0000 CR4: 00000000001406e0 [ 240.151662][ T9438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.151669][ T9438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.151675][ T9438] Call Trace: [ 240.151709][ T9438] process_one_work+0x9af/0x1740 [ 240.151753][ T9438] ? __schedule+0x776/0x17d0 [ 240.168961][ T3895] kobject: 'loop0' (00000000bc72edb1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 240.174828][ T9438] ? pwq_dec_nr_in_flight+0x320/0x320 [ 240.174845][ T9438] ? lock_acquire+0x190/0x410 [ 240.174866][ T9438] worker_thread+0x98/0xe40 [ 240.195836][ T3895] kobject: 'loop2' (00000000c9fc068f): kobject_uevent_env [ 240.199877][ T9438] ? trace_hardirqs_on+0x67/0x240 [ 240.199900][ T9438] kthread+0x361/0x430 [ 240.199915][ T9438] ? process_one_work+0x1740/0x1740 06:32:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x6, 0x0, [], {0x872bcb4b13dda7aa, @reserved}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpeername$unix(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) [ 240.199936][ T9438] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 240.215550][ T3895] kobject: 'loop2' (00000000c9fc068f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 240.222547][ T9438] ret_from_fork+0x24/0x30 [ 240.222563][ T9438] Modules linked in: 06:32:25 executing program 1: bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) 06:32:26 executing program 1: bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 240.464387][ T3895] kobject: 'loop1' (0000000087cd6a7f): kobject_uevent_env [ 240.513615][ T3895] kobject: 'loop1' (0000000087cd6a7f): fill_kobj_path: path = '/devices/virtual/block/loop1' 06:32:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x6, 0x0, [], {0x872bcb4b13dda7aa, @reserved}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpeername$unix(r0, 0x0, 0x0) [ 240.580893][ T3895] kobject: 'loop1' (0000000087cd6a7f): kobject_uevent_env [ 240.588213][ T9438] ---[ end trace a2c2f6666510b648 ]--- [ 240.611540][ T9438] RIP: 0010:rxrpc_local_processor.cold+0x24/0x29 06:32:26 executing program 1: r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 240.625185][ T3895] kobject: 'loop1' (0000000087cd6a7f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 240.646985][ T9438] Code: 5f 55 bd fa 0f 0b e8 44 df d3 fa 48 c7 c7 00 0f 5b 88 e8 4c 55 bd fa 0f 0b e8 31 df d3 fa 48 c7 c7 00 0f 5b 88 e8 39 55 bd fa <0f> 0b 90 90 90 55 48 89 e5 41 57 49 89 ff 41 56 41 55 41 54 53 48 [ 240.714853][ T3895] kobject: 'loop5' (00000000e0142827): kobject_uevent_env [ 240.727650][ T9438] RSP: 0018:ffff8880962dfce8 EFLAGS: 00010282 [ 240.746276][ T3895] kobject: 'loop5' (00000000e0142827): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 240.756387][ T9438] RAX: 0000000000000017 RBX: ffff8880a5aa4078 RCX: 0000000000000000 06:32:26 executing program 1: r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 240.788693][ T9438] RDX: 0000000000000000 RSI: ffffffff815bb8d6 RDI: ffffed1012c5bf8f [ 240.799720][ T3895] kobject: 'loop1' (0000000087cd6a7f): kobject_uevent_env [ 240.815696][ T3895] kobject: 'loop1' (0000000087cd6a7f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 240.823222][ T9438] RBP: ffff8880962dfd30 R08: 0000000000000017 R09: fffffbfff138c811 [ 240.841987][ T9438] R10: fffffbfff138c810 R11: ffffffff89c64087 R12: ffff8880a5a50648 [ 240.855716][ T9438] R13: ffff88808d090748 R14: ffff8880a5aa4040 R15: ffff8880862cb540 [ 240.867309][ T9438] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 240.896012][ T9438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.917263][ T9438] CR2: 0000001b31c46000 CR3: 00000000a53c7000 CR4: 00000000001406e0 06:32:26 executing program 1: r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) bind$tipc(r0, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xeb01f62d1cc5f690}, 0x10) [ 240.942091][ T9438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.951528][ T9438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.959751][ T9438] Kernel panic - not syncing: Fatal exception [ 240.967195][ T9438] Kernel Offset: disabled [ 240.982848][ T9438] Rebooting in 86400 seconds..