[info] Using makefile-style concurrent boot in runlevel 2. [ 25.305538] audit: type=1800 audit(1541566341.286:21): pid=5525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. 2018/11/07 04:52:32 fuzzer started 2018/11/07 04:52:35 dialing manager at 10.128.0.26:33665 2018/11/07 04:52:35 syscalls: 1 2018/11/07 04:52:35 code coverage: enabled 2018/11/07 04:52:35 comparison tracing: enabled 2018/11/07 04:52:35 setuid sandbox: enabled 2018/11/07 04:52:35 namespace sandbox: enabled 2018/11/07 04:52:35 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/07 04:52:35 fault injection: enabled 2018/11/07 04:52:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/07 04:52:35 net packed injection: enabled 2018/11/07 04:52:35 net device setup: enabled 04:55:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000140)={@empty=[0x2b], @random="1b207f5c5eeb", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x8100}}}}}}, &(0x7f0000000000)={0x1, 0x1}) syzkaller login: [ 210.769203] IPVS: ftp: loaded support on port[0] = 21 04:55:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_dellink={0x28, 0x11, 0x3, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4}]}]}, 0x28}}, 0x0) [ 211.037736] IPVS: ftp: loaded support on port[0] = 21 04:55:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') [ 211.330361] IPVS: ftp: loaded support on port[0] = 21 04:55:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x4000009f, 0xffffffffffffffff, 0x4000009f]}) [ 211.965806] IPVS: ftp: loaded support on port[0] = 21 04:55:28 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x80dc5521, &(0x7f0000000040)) [ 212.232499] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.256183] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.266598] device bridge_slave_0 entered promiscuous mode [ 212.408213] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.415287] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.443457] device bridge_slave_1 entered promiscuous mode [ 212.485646] IPVS: ftp: loaded support on port[0] = 21 [ 212.612676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.784249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:55:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x5, &(0x7f0000000000)=@framed={{0x18, 0xffff8000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0xf4, &(0x7f0000000280)=""/244}, 0x15) [ 212.961058] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.986266] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.010042] device bridge_slave_0 entered promiscuous mode [ 213.120850] IPVS: ftp: loaded support on port[0] = 21 [ 213.135234] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.149128] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.157352] device bridge_slave_1 entered promiscuous mode [ 213.177998] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.266256] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.272727] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.287480] device bridge_slave_0 entered promiscuous mode [ 213.304269] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.321979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.461173] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.486166] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.513050] device bridge_slave_1 entered promiscuous mode [ 213.521551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.582408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.749369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.881949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.922165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.937098] team0: Port device team_slave_0 added [ 214.066730] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.083632] team0: Port device team_slave_1 added [ 214.115352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.180204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.198352] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.204861] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.227408] device bridge_slave_0 entered promiscuous mode [ 214.249194] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.263387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.277856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.305960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.333496] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.344040] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.366627] device bridge_slave_1 entered promiscuous mode [ 214.372967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.396826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.419186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.482378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.508112] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.522423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.542256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.578657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.679765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.707922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.720945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.904320] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.937160] team0: Port device team_slave_0 added [ 214.942304] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.957020] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.965391] device bridge_slave_0 entered promiscuous mode [ 215.028916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.063673] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.081734] team0: Port device team_slave_1 added [ 215.095251] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.102110] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.109918] device bridge_slave_1 entered promiscuous mode [ 215.146866] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.154212] team0: Port device team_slave_0 added [ 215.179442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.213042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.242770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.258377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.279674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.293412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.301010] team0: Port device team_slave_1 added [ 215.345208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.412915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.432091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.458047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.465371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.486937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.499136] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.505527] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.543194] device bridge_slave_0 entered promiscuous mode [ 215.582139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.621096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.642447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.658424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.672365] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.691961] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.707285] device bridge_slave_1 entered promiscuous mode [ 215.719646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.746728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.757229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.860753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.870597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.888335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.895811] team0: Port device team_slave_0 added [ 215.906973] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.914587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.930995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.984925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.048801] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.070081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.080415] team0: Port device team_slave_1 added [ 216.189372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.198099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.209459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.227467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.234520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.266105] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.272603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.279734] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.286177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.310709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.334230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.371354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.382831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.402211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.496372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.503844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.517166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.556045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.698957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.716599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.733812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.760308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.769529] team0: Port device team_slave_0 added [ 216.776656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.818593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.825491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.947037] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.954455] team0: Port device team_slave_1 added [ 217.091059] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.113030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.129187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.150820] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.157259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.163941] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.170383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.185220] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.221694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.245409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.261282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.295591] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.304877] team0: Port device team_slave_0 added [ 217.323230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.347453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.377073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.413975] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.420420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.427166] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.433534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.452817] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.463340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.490747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.515447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.539693] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.563322] team0: Port device team_slave_1 added [ 217.689437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.786090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.793976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.840368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.866834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.883182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.010734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.026567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.036834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.160691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.181274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.197353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.315953] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.322356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.329089] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.335457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.385122] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.796347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.832800] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.839240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.845963] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.852345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.861624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.565563] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.572018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.578751] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.585118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.615433] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.834226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.843027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.522508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.017706] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.353241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.567104] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.573295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.582338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.605498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.834356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.066985] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.112835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.226083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.327271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.333454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.354649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.592583] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.611734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.629480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.662127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.803650] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.027386] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.152766] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.159768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.175089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.218718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.605599] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.657639] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.861817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.165266] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.172495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.183630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.313438] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.706104] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.791073] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.805000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.819527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.316277] 8021q: adding VLAN 0 to HW filter on device team0 04:55:42 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) geteuid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000200)) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r4, &(0x7f0000011fd2), 0xffffffee) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) [ 226.476272] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:55:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) [ 226.599335] hrtimer: interrupt took 30988 ns 04:55:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) [ 226.817366] overlayfs: filesystem on './file0' not supported as upperdir 04:55:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) 04:55:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) 04:55:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 04:55:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) geteuid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000200)) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r4, &(0x7f0000011fd2), 0xffffffee) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) 04:55:44 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x40840, 0x0) setns(0xffffffffffffffff, 0x0) 04:55:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x80dc5521, &(0x7f0000000040)) 04:55:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532302c74696d656f75743d3078303030303030303030303030303166662c76657273696f6e3d3970323030302e4c2c72717b6e7c6d3030303030303030303030303030372c72713d3078303030303030303204303030304f66662c76657273696f6e3d3970323030302c00086b03dd5b33bf1ef222ee1cf875e1ec972b37db44bd4a4da57d192b734f6e4ed16d052372fe11b69dc02bed0eb30959e1b2005d69b3fc3ac1048124b84f7783ef892f1867aac9590b22ae66ecf2e68484aaf74bf0049049edc33ca0bc7e9c7763ad8aaf642c0093a8dae082704fe7739ac1c44650a18e6f84047edd577c04d6b8b62ab8fb235685aa31afad597cfbba7bc25a480ab8cdfa8a0b1d6d2ee17669376e2ac785ca0a287150506e73106d35d99a9481679a4845e1496da1e82cc7d8860219212d7573ae3c541424b2dee7e88e4cb18f9d42349e1ef6bad3e456e1bc51160ff6c9d7aa7185d23ced6aa294d8a56e110caa61544d6ad743dfe9b02e0ee28b611aafa5d04db98e48e89d7dbfb67bcd055479d31c46559317e6e54f"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 04:55:44 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000080), 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) unlink(&(0x7f0000000140)='./file1\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000180)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 04:55:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000200)='./file1\x00') unlink(&(0x7f0000000080)='./file1\x00') 04:55:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x80dc5521, &(0x7f0000000040)) 04:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138}, 0x28) 04:55:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x80dc5521, &(0x7f0000000040)) 04:55:44 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000080), 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) unlink(&(0x7f0000000140)='./file1\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000180)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 04:55:44 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700030000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101400, 0x0) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000002c0)=0x2000, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) dup2(r3, r5) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0xb}, 'port0\x00', 0x5c, 0xa0040, 0x0, 0x2, 0x7f, 0x0, 0x8001}) 04:55:45 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) geteuid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000200)) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r4, &(0x7f0000011fd2), 0xffffffee) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) 04:55:45 executing program 4: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/4096}, 0x1008, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x1000000080081) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x30, {0x2, 0x4e22, @multicast2=0xe0000003}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @loopback}, 0x9f783104a14e79fd, 0x0, 0x9, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}) geteuid() mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='bpf\x00', 0x1000000, &(0x7f0000001280)=ANY=[@ANYBLOB=',smackfsroot=,seclabel,obj_role=,permit_directio,\x00']) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000680), &(0x7f0000001540)=0x4) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x0, {0xa, 0x4e23, 0x2, @local, 0x6}, r3}}, 0x38) getsockopt$inet_dccp_buf(r2, 0x21, 0x8f, &(0x7f0000001140)=""/212, &(0x7f0000001240)=0xd4) flock(r0, 0x6) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000440)={0x36, 0x6, 0x0, {0x0, 0x3, 0xd, 0x0, '/dev/usbmon#\x00'}}, 0x36) sendto$inet(r0, &(0x7f0000001480)="6f255b6fb6fdf214bfc28e01138727e0c27d695cf5b04434f33f0642444d18db5d57eb71c155694a1b37a867f70ec81c2abe84068c0ff2b2d594bb953460db80b291d0c9ba3c2b9b5c6e017ae731ef0c44ccd3ce1e9a79d449fa837b9a65ca948df6bd47d2b036f98cf228378faa116885dfa01823f32b586919f0a24dd3af40dd38166176491aa6527c4b58f676f82b68041ea2a465b3b7e9018a78406d96f3ff5951bcd8d88b", 0xa7, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) ioprio_get$uid(0x3, r4) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0xf5, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001080)='/dev/dsp\x00', 0x40000, 0x0) fsetxattr$security_ima(r5, &(0x7f00000010c0)='security.ima\x00', &(0x7f0000001100)=@md5={0x1, "acb65d0f3f9f3186daa96f868a2170cb"}, 0x11, 0x3) syz_open_dev$audion(&(0x7f0000001040)='/dev/audio#\x00', 0x285, 0x4200) 04:55:45 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa283000c200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 04:55:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) [ 229.073734] netlink: 'syz-executor1': attribute type 1 has an invalid length. 04:55:45 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000080), 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) unlink(&(0x7f0000000140)='./file1\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000180)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 229.189837] kasan: CONFIG_KASAN_INLINE enabled 04:55:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000240)=@ethtool_rxnfc={0x9, 0x0, 0x0, {0x0, @esp_ip4_spec={@loopback, @broadcast}, {"2c1a", @remote}, @sctp_ip6_spec={@ipv4={[], [], @multicast2}, @ipv4={[], [], @local}}, {'Pg', @dev}}}}) [ 229.218664] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 229.258874] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 229.265167] CPU: 1 PID: 7334 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181107+ #107 [ 229.273656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.283030] RIP: 0010:locks_remove_flock+0x216/0x350 [ 229.288138] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 229.294343] kobject: 'vetÿÿÿÃ' (0000000097af7790): kobject_add_internal: parent: 'net', set: 'devices' [ 229.307052] RSP: 0018:ffff88018b0cf880 EFLAGS: 00010202 [ 229.307064] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 229.307073] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 229.307082] RBP: ffff88018b0cfa60 R08: ffff88018b07c240 R09: ffffed003b5e5b67 [ 229.307090] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c41bed00 [ 229.307099] R13: ffff88018b0cf8f8 R14: 1ffff10031619f13 R15: dffffc0000000000 [ 229.307111] FS: 0000000000efa940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 229.307120] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 229.307128] CR2: 0000000000a40021 CR3: 00000001d95f6000 CR4: 00000000001426e0 [ 229.307150] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 229.307169] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 229.345473] kobject: 'vetÿÿÿÃ' (0000000097af7790): kobject_uevent_env [ 229.350984] Call Trace: [ 229.351008] ? flock_lock_inode+0x11c0/0x11c0 [ 229.351026] ? mark_held_locks+0x130/0x130 [ 229.351044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.351056] ? __call_rcu.constprop.55+0x3ea/0x950 [ 229.351074] ? __call_rcu.constprop.55+0x3ea/0x950 [ 229.359023] kobject: 'vetÿÿÿÃ' (0000000097af7790): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ' [ 229.366557] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 229.366574] ? trace_hardirqs_on+0xbd/0x310 [ 229.366586] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 229.366597] ? call_rcu+0xb/0x10 [ 229.366613] ? trace_hardirqs_off_caller+0x300/0x300 [ 229.366638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.374894] kobject: 'queues' (0000000040c0fcbe): kobject_add_internal: parent: 'vetÿÿÿÃ', set: '' [ 229.379766] ? locks_remove_posix+0x486/0x850 [ 229.379783] ? check_preemption_disabled+0x48/0x280 [ 229.379797] ? vfs_lock_file+0xe0/0xe0 [ 229.379815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.379832] locks_remove_file+0x148/0x5c0 [ 229.379851] ? fcntl_setlk+0xfc0/0xfc0 [ 229.388250] kobject: 'queues' (0000000040c0fcbe): kobject_uevent_env [ 229.394382] ? fsnotify_first_mark+0x350/0x350 [ 229.394397] ? __fsnotify_parent+0xcc/0x420 [ 229.394412] ? perf_trace_sched_process_exec+0x860/0x860 [ 229.394426] ? fsnotify+0xf20/0xf20 [ 229.394447] ? __might_sleep+0x95/0x190 [ 229.401474] kobject: 'queues' (0000000040c0fcbe): kobject_uevent_env: filter function caused the event to drop! [ 229.403601] __fput+0x2f0/0xa70 [ 229.403621] ? get_max_files+0x20/0x20 [ 229.403636] ? trace_hardirqs_on+0xbd/0x310 [ 229.403651] ? kasan_check_read+0x11/0x20 [ 229.403667] ? task_work_run+0x1af/0x2a0 [ 229.403686] ? trace_hardirqs_off_caller+0x300/0x300 [ 229.409113] kobject: 'rx-0' (00000000e242f1b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 229.412430] ? filp_close+0x1cd/0x250 [ 229.412449] ____fput+0x15/0x20 [ 229.412464] task_work_run+0x1e8/0x2a0 [ 229.412480] ? task_work_cancel+0x240/0x240 [ 229.412496] ? copy_fd_bitmaps+0x210/0x210 [ 229.412516] ? do_syscall_64+0x9a/0x820 [ 229.419678] kobject: 'rx-0' (00000000e242f1b3): kobject_uevent_env [ 229.422965] exit_to_usermode_loop+0x318/0x380 [ 229.422982] ? __bpf_trace_sys_exit+0x30/0x30 [ 229.423002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.423019] do_syscall_64+0x6be/0x820 [ 229.423040] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 229.428860] kobject: 'rx-0' (00000000e242f1b3): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ/queues/rx-0' [ 229.437559] ? syscall_return_slowpath+0x5e0/0x5e0 [ 229.437574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.437591] ? trace_hardirqs_on_caller+0x310/0x310 [ 229.437607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 229.437622] ? prepare_exit_to_usermode+0x291/0x3b0 [ 229.437641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.437663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.444064] kobject: 'tx-0' (000000007481663a): kobject_add_internal: parent: 'queues', set: 'queues' [ 229.446536] RIP: 0033:0x411021 [ 229.446552] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 229.446560] RSP: 002b:00007fffea1724f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 229.446573] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411021 [ 229.446581] RDX: 0000000000000000 RSI: 0000000000732a20 RDI: 0000000000000004 [ 229.446588] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 229.446608] R10: 00007fffea172410 R11: 0000000000000293 R12: 0000000000000000 [ 229.457548] kobject: 'tx-0' (000000007481663a): kobject_uevent_env [ 229.460314] R13: 0000000000000001 R14: 0000000000000004 R15: 0000000000000004 [ 229.460328] Modules linked in: [ 229.488179] ---[ end trace 8618092e0867bded ]--- 04:55:45 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700030000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101400, 0x0) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000002c0)=0x2000, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) dup2(r3, r5) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0xb}, 'port0\x00', 0x5c, 0xa0040, 0x0, 0x2, 0x7f, 0x0, 0x8001}) [ 229.490455] kobject: 'tx-0' (000000007481663a): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ/queues/tx-0' [ 229.531915] RIP: 0010:locks_remove_flock+0x216/0x350 [ 229.786589] kobject: 'loop5' (00000000bd502189): kobject_uevent_env [ 229.795767] kobject: 'loop5' (00000000bd502189): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:55:45 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000080), 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) unlink(&(0x7f0000000140)='./file1\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000180)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 04:55:45 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700030000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101400, 0x0) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000002c0)=0x2000, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) dup2(r3, r5) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0xb}, 'port0\x00', 0x5c, 0xa0040, 0x0, 0x2, 0x7f, 0x0, 0x8001}) [ 229.815180] kobject: 'rx-0' (00000000e242f1b3): kobject_cleanup, parent 0000000040c0fcbe [ 229.832056] kobject: 'loop2' (0000000032932654): kobject_uevent_env [ 229.844996] kobject: 'rx-0' (00000000e242f1b3): auto cleanup 'remove' event [ 229.851163] kobject: 'loop2' (0000000032932654): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 229.868265] kobject: 'rx-0' (00000000e242f1b3): kobject_uevent_env [ 229.890439] kobject: 'rx-0' (00000000e242f1b3): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ/queues/rx-0' [ 229.913070] kobject: 'rx-0' (00000000e242f1b3): auto cleanup kobject_del [ 229.921001] kobject: 'rx-0' (00000000e242f1b3): calling ktype release [ 229.928277] kobject: 'rx-0': free name [ 229.933299] kobject: 'tx-0' (000000007481663a): kobject_cleanup, parent 0000000040c0fcbe [ 229.942269] kobject: 'tx-0' (000000007481663a): auto cleanup 'remove' event [ 229.950080] kobject: 'tx-0' (000000007481663a): kobject_uevent_env [ 229.961071] kobject: 'tx-0' (000000007481663a): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ/queues/tx-0' [ 229.976124] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 230.000755] kobject: 'tx-0' (000000007481663a): auto cleanup kobject_del [ 230.012333] kobject: 'loop2' (0000000032932654): kobject_uevent_env 04:55:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700030000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101400, 0x0) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000002c0)=0x2000, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) dup2(r3, r5) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0xb}, 'port0\x00', 0x5c, 0xa0040, 0x0, 0x2, 0x7f, 0x0, 0x8001}) 04:55:46 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700030000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101400, 0x0) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000002c0)=0x2000, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) dup2(r3, r5) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0xb}, 'port0\x00', 0x5c, 0xa0040, 0x0, 0x2, 0x7f, 0x0, 0x8001}) [ 230.020788] kobject: 'loop2' (0000000032932654): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.027042] RSP: 0018:ffff88018b0cf880 EFLAGS: 00010202 [ 230.048552] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 230.061116] kobject: 'tx-0' (000000007481663a): calling ktype release [ 230.074178] kobject: 'loop5' (00000000bd502189): kobject_uevent_env [ 230.083453] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 230.099345] kobject: 'tx-0': free name [ 230.106129] kobject: 'loop5' (00000000bd502189): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.120270] kobject: 'queues' (0000000040c0fcbe): kobject_cleanup, parent (null) [ 230.130187] RBP: ffff88018b0cfa60 R08: ffff88018b07c240 R09: ffffed003b5e5b67 [ 230.138321] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c41bed00 [ 230.150086] kobject: 'queues' (0000000040c0fcbe): calling ktype release [ 230.151279] kobject: 'kvm' (000000009cfef55e): kobject_uevent_env [ 230.157109] kobject: 'queues' (0000000040c0fcbe): kset_release [ 230.169557] R13: ffff88018b0cf8f8 R14: 1ffff10031619f13 R15: dffffc0000000000 [ 230.177120] kobject: 'queues': free name [ 230.181896] kobject: 'vetÿÿÿÃ' (0000000097af7790): kobject_uevent_env [ 230.188817] FS: 0000000000efa940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 230.192013] kobject: 'kvm' (000000009cfef55e): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.197732] kobject: 'vetÿÿÿÃ' (0000000097af7790): fill_kobj_path: path = '/devices/virtual/net/vetÿÿÿÃ' [ 230.216350] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 04:55:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000240)=@ethtool_rxnfc={0x9, 0x0, 0x0, {0x0, @esp_ip4_spec={@loopback, @broadcast}, {"2c1a", @remote}, @sctp_ip6_spec={@ipv4={[], [], @multicast2}, @ipv4={[], [], @local}}, {'Pg', @dev}}}}) [ 230.222610] CR2: 0000001b30c2a000 CR3: 00000001d95f6000 CR4: 00000000001426f0 [ 230.232244] kobject: 'loop1' (00000000e1db488c): kobject_uevent_env [ 230.241253] kobject: 'loop1' (00000000e1db488c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.254774] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 230.262510] kobject: 'vetÿÿÿÃ' (0000000097af7790): kobject_cleanup, parent (null) 04:55:46 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) geteuid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000200)) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r4, &(0x7f0000011fd2), 0xffffffee) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) [ 230.275645] kobject: 'vetÿÿÿÃ' (0000000097af7790): calling ktype release [ 230.285766] kobject: 'loop2' (0000000032932654): kobject_uevent_env [ 230.293079] kobject: 'vetÿÿÿÃ': free name [ 230.300556] kobject: 'loop2' (0000000032932654): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.302367] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 230.319629] Kernel panic - not syncing: Fatal exception [ 230.325932] Kernel Offset: disabled [ 230.329556] Rebooting in 86400 seconds..