[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.896713] kauditd_printk_skb: 8 callbacks suppressed [ 28.896733] audit: type=1800 audit(1545522982.524:29): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.930903] audit: type=1800 audit(1545522982.534:30): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.65' (ECDSA) to the list of known hosts. 2018/12/22 23:56:33 fuzzer started 2018/12/22 23:56:35 dialing manager at 10.128.0.26:33943 2018/12/22 23:56:35 syscalls: 1 2018/12/22 23:56:35 code coverage: enabled 2018/12/22 23:56:35 comparison tracing: enabled 2018/12/22 23:56:35 setuid sandbox: enabled 2018/12/22 23:56:35 namespace sandbox: enabled 2018/12/22 23:56:35 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/22 23:56:35 fault injection: enabled 2018/12/22 23:56:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/22 23:56:35 net packet injection: enabled 2018/12/22 23:56:35 net device setup: enabled 23:58:52 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='children\x00') ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00']) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x400, 0x0) sched_yield() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000000c0)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) syzkaller login: [ 178.550698] IPVS: ftp: loaded support on port[0] = 21 23:58:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x2, @u32}]}, 0x1c}}, 0x0) [ 178.829851] IPVS: ftp: loaded support on port[0] = 21 23:58:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 179.161560] IPVS: ftp: loaded support on port[0] = 21 23:58:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xd93d19d76d5eecd7, 0x0, 0x0, 0xfffffffffffffe13) [ 179.672623] IPVS: ftp: loaded support on port[0] = 21 23:58:53 executing program 4: ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)={0x1, 0x1f}) clock_gettime(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) pipe(0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) flock(0xffffffffffffffff, 0x2) getrandom(&(0x7f0000000000)=""/71, 0x3d5, 0x0) syz_execute_func(&(0x7f0000000080)="3666440f9bf56664400f9f3241c3c4e2c93e5842c4c27d794e003e0f11581010196f04cd0f2902") add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000540)='blacklist\x00', 0x0, &(0x7f00000005c0), 0x0, 0xfffffffffffffffa) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x180) add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) [ 179.956732] IPVS: ftp: loaded support on port[0] = 21 23:58:54 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x1) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000680)="18ed44e1d3c4747deb21d2901f1bc8649b6b7c3850ba9966d907b22868f855cad47a469eb73875c660efda5922a0d627f095f3", 0x33}], 0x1) [ 180.346458] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.389961] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.402942] device bridge_slave_0 entered promiscuous mode [ 180.557744] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.564240] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.588076] device bridge_slave_1 entered promiscuous mode [ 180.653930] IPVS: ftp: loaded support on port[0] = 21 [ 180.765758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 180.844697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 181.050782] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.058109] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.066566] device bridge_slave_0 entered promiscuous mode [ 181.210158] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.216734] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.227395] device bridge_slave_1 entered promiscuous mode [ 181.282910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.335953] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.397892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.518788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 181.719402] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.725847] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.758041] device bridge_slave_0 entered promiscuous mode [ 181.876224] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.905362] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.913429] device bridge_slave_1 entered promiscuous mode [ 181.942615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.056981] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.064662] team0: Port device team_slave_0 added [ 182.077933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.117380] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.175206] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.205714] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.213897] device bridge_slave_0 entered promiscuous mode [ 182.222667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.279834] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.286238] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.300445] device bridge_slave_0 entered promiscuous mode [ 182.310312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.327347] team0: Port device team_slave_1 added [ 182.336224] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.346929] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.363124] device bridge_slave_1 entered promiscuous mode [ 182.439383] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.445788] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.480354] device bridge_slave_1 entered promiscuous mode [ 182.507538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.570936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.642021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.658111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.709290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.736303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.783179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.812821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.839791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.859532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.876282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.931933] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.943351] team0: Port device team_slave_0 added [ 182.949458] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.955832] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.978096] device bridge_slave_0 entered promiscuous mode [ 182.991594] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.018067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.037028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.051186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.073855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.091828] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.099529] team0: Port device team_slave_1 added [ 183.122707] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.136981] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.144561] device bridge_slave_1 entered promiscuous mode [ 183.176566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.194254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.218048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.237591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.254050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.281482] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.305308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.332129] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.380831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.416643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.431329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.457360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.465391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.499301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.548376] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.598764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.613577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.638163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.651273] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.659266] team0: Port device team_slave_0 added [ 183.693067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.717243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.808306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.815897] team0: Port device team_slave_1 added [ 183.824205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.836994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.943381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.952307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.968483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.050487] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.062520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.087482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.097688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.111866] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.119461] team0: Port device team_slave_0 added [ 184.181639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.189794] team0: Port device team_slave_1 added [ 184.238965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.247645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.255648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.288904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.309637] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.327827] team0: Port device team_slave_0 added [ 184.340659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.388015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.395122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.407458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.417935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.424925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.445686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.477382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.507198] team0: Port device team_slave_1 added [ 184.581137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.599974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.648349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.656636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.704320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.714030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.751996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.787594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.808054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.816211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.828598] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.835100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.842261] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.848683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.856166] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.868672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.895475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.927750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.964224] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.990414] team0: Port device team_slave_0 added [ 185.027013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.035204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.058192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.121325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.137850] team0: Port device team_slave_1 added [ 185.274366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.357517] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.363951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.370719] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.377192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.405705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.437229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.539496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.546712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.563990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.708097] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.715737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.738039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.745334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.769414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.884645] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.891142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.897886] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.904265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.927630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.388060] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.394469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.401234] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.407723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.430688] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.512136] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.518615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.525275] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.531745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.551262] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.798450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.805806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.844831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.118135] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.124631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.131375] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.137790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.156475] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.827364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.628218] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.686302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.064099] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.110275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.408351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.509169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.535392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.567670] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.573831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.607454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.631335] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.638492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.647432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.937514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.007571] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.047719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.065145] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.182508] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.390859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.408093] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.417899] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.430399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.458037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.465160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.494947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.656718] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.662937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.677503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.813234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.851729] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.962210] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.189332] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.360031] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.392701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.403582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.917354] 8021q: adding VLAN 0 to HW filter on device team0 23:59:08 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x4000020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f00000002c0)='syz', 0xffffffffffffffff) 23:59:08 executing program 1: 23:59:08 executing program 1: [ 195.349624] hrtimer: interrupt took 37276 ns 23:59:09 executing program 1: 23:59:09 executing program 0: 23:59:09 executing program 1: 23:59:09 executing program 0: 23:59:09 executing program 1: [ 195.981142] FAT-fs (loop2): bogus number of reserved sectors [ 195.988144] FAT-fs (loop2): Can't find a valid FAT filesystem [ 196.054283] FAT-fs (loop2): bogus number of reserved sectors [ 196.069966] FAT-fs (loop2): Can't find a valid FAT filesystem 23:59:09 executing program 2: 23:59:09 executing program 3: 23:59:10 executing program 4: ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)={0x1, 0x1f}) clock_gettime(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) pipe(0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) flock(0xffffffffffffffff, 0x2) getrandom(&(0x7f0000000000)=""/71, 0x3d5, 0x0) syz_execute_func(&(0x7f0000000080)="3666440f9bf56664400f9f3241c3c4e2c93e5842c4c27d794e003e0f11581010196f04cd0f2902") add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000540)='blacklist\x00', 0x0, &(0x7f00000005c0), 0x0, 0xfffffffffffffffa) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x180) add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) 23:59:10 executing program 0: 23:59:10 executing program 1: 23:59:10 executing program 2: 23:59:10 executing program 3: 23:59:10 executing program 5: 23:59:10 executing program 1: 23:59:10 executing program 0: 23:59:10 executing program 5: 23:59:10 executing program 3: 23:59:10 executing program 2: 23:59:10 executing program 3: 23:59:11 executing program 5: 23:59:11 executing program 4: 23:59:11 executing program 3: 23:59:11 executing program 2: 23:59:11 executing program 0: 23:59:11 executing program 1: 23:59:11 executing program 5: 23:59:11 executing program 3: 23:59:11 executing program 2: 23:59:11 executing program 0: 23:59:11 executing program 1: r0 = inotify_init1(0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect(0xffffffffffffffff, 0x0, 0x37d) read(r0, 0x0, 0x0) 23:59:11 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 23:59:11 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r2 = dup3(r0, r1, 0x0) modify_ldt$write(0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080), 0x4) 23:59:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000), 0x4) 23:59:11 executing program 2: 23:59:11 executing program 0: 23:59:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 23:59:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0xfffffffffffffbff}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f00000000c0)) 23:59:11 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="5017c253478d2547d4994eba08980000c463d92600"], 0x0) 23:59:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 23:59:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 23:59:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 23:59:11 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x80, 0x4a00) gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f00000002c0)=0x8, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xb, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 23:59:12 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 198.332215] [drm:drm_calc_timestamping_constants] *ERROR* crtc 31: Can't calculate constants, dotclock = 0! 23:59:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00@\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 23:59:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x7, &(0x7f000046eff0)) socket$alg(0x26, 0x5, 0x0) 23:59:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 198.695055] [ 198.696731] ====================================================== [ 198.703045] WARNING: possible circular locking dependency detected [ 198.709383] 4.20.0-rc6-next-20181217+ #172 Not tainted [ 198.714828] ------------------------------------------------------ [ 198.721144] syz-executor5/7843 is trying to acquire lock: [ 198.726684] 000000005738742e (&tbl->lock){+.-.}, at: neigh_change_state+0x1dc/0x7a0 [ 198.733168] PM: Basic memory bitmaps freed [ 198.734505] [ 198.734505] but task is already holding lock: [ 198.734511] 000000007be2f658 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 198.734548] [ 198.734548] which lock already depends on the new lock. [ 198.734548] [ 198.760331] [ 198.760331] the existing dependency chain (in reverse order) is: [ 198.767947] [ 198.767947] -> #1 (&n->lock){++--}: [ 198.773081] _raw_write_lock+0x2d/0x40 [ 198.777499] neigh_periodic_work+0x3c0/0xc30 [ 198.781856] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 198.782435] process_one_work+0xc90/0x1c40 [ 198.782448] worker_thread+0x17f/0x1390 [ 198.782466] kthread+0x35a/0x440 [ 198.789458] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 198.793617] ret_from_fork+0x3a/0x50 [ 198.793622] [ 198.793622] -> #0 (&tbl->lock){+.-.}: [ 198.793645] lock_acquire+0x1ed/0x520 [ 198.793658] _raw_write_lock_bh+0x31/0x40 [ 198.793673] neigh_change_state+0x1dc/0x7a0 [ 198.793693] __neigh_update+0x478/0x1eb0 [ 198.800168] kobject: 'loop0' (000000001694c32f): kobject_uevent_env [ 198.802047] neigh_update+0x37/0x50 [ 198.802063] arp_req_set+0x54c/0xaa0 [ 198.802080] arp_ioctl+0x48b/0xae0 [ 198.802092] inet_ioctl+0x237/0x360 [ 198.802105] sock_do_ioctl+0xeb/0x420 [ 198.802122] sock_ioctl+0x313/0x690 [ 198.812080] kobject: 'loop0' (000000001694c32f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 198.815790] do_vfs_ioctl+0x1de/0x1790 [ 198.815803] ksys_ioctl+0xa9/0xd0 [ 198.815816] __x64_sys_ioctl+0x73/0xb0 [ 198.815831] do_syscall_64+0x1b9/0x820 [ 198.815847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.815862] [ 198.815862] other info that might help us debug this: [ 198.815862] [ 198.911318] Possible unsafe locking scenario: [ 198.911318] [ 198.917387] CPU0 CPU1 [ 198.922047] ---- ---- [ 198.926711] lock(&n->lock); [ 198.929816] lock(&tbl->lock); [ 198.935604] lock(&n->lock); [ 198.941221] lock(&tbl->lock); [ 198.944495] [ 198.944495] *** DEADLOCK *** [ 198.944495] [ 198.950569] 2 locks held by syz-executor5/7843: [ 198.955226] #0: 000000000a816ee5 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 198.962527] #1: 000000007be2f658 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 198.970291] [ 198.970291] stack backtrace: [ 198.974794] CPU: 1 PID: 7843 Comm: syz-executor5 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 198.983279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.992626] Call Trace: [ 198.995207] dump_stack+0x244/0x39d [ 198.998837] ? dump_stack_print_info.cold.1+0x20/0x20 [ 199.004031] ? vprintk_func+0x85/0x181 [ 199.007929] print_circular_bug.isra.36.cold.58+0x1bd/0x27d [ 199.013658] ? save_trace+0xe0/0x290 [ 199.017377] __lock_acquire+0x3399/0x4c20 [ 199.021537] ? mark_held_locks+0x130/0x130 [ 199.025782] ? kasan_check_read+0x11/0x20 [ 199.029931] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 199.035208] ? arp_constructor+0x3a5/0xd80 [ 199.039456] ? lock_downgrade+0x900/0x900 [ 199.043605] ? check_preemption_disabled+0x48/0x280 [ 199.048629] ? mark_held_locks+0x130/0x130 [ 199.052861] ? mark_held_locks+0xc7/0x130 [ 199.057013] ? __local_bh_enable_ip+0x160/0x260 [ 199.061678] ? __local_bh_enable_ip+0x160/0x260 [ 199.066357] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 199.070940] ? trace_hardirqs_on+0xbd/0x310 [ 199.075268] ? _raw_write_unlock_bh+0x30/0x40 [ 199.079766] ? trace_hardirqs_off_caller+0x310/0x310 [ 199.084877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.090414] ? ___neigh_create+0x1704/0x2630 [ 199.094819] ? ___neigh_create+0x1704/0x2630 [ 199.099226] lock_acquire+0x1ed/0x520 [ 199.103030] ? neigh_change_state+0x1dc/0x7a0 [ 199.107533] ? lock_release+0xa00/0xa00 [ 199.111524] _raw_write_lock_bh+0x31/0x40 [ 199.115676] ? neigh_change_state+0x1dc/0x7a0 [ 199.120175] neigh_change_state+0x1dc/0x7a0 [ 199.124498] ? neigh_parms_alloc+0x6d0/0x6d0 [ 199.128909] ? mark_held_locks+0xc7/0x130 [ 199.133060] ? kasan_check_write+0x14/0x20 [ 199.137303] ? do_raw_write_lock+0x14f/0x310 [ 199.141710] ? do_raw_read_unlock+0x70/0x70 [ 199.146030] ? neigh_lookup+0x586/0x7c0 [ 199.150011] ? trace_hardirqs_off_caller+0x310/0x310 [ 199.155116] __neigh_update+0x478/0x1eb0 [ 199.159180] ? __local_bh_enable_ip+0x160/0x260 [ 199.163856] ? arp_key_eq+0x10/0xa0 [ 199.167489] ? __neigh_notify+0x160/0x160 [ 199.171643] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 199.177184] ? find_held_lock+0x36/0x1c0 [ 199.181248] neigh_update+0x37/0x50 [ 199.184883] arp_req_set+0x54c/0xaa0 [ 199.188608] ? arp_req_delete+0x870/0x870 [ 199.192756] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 199.197515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.203060] arp_ioctl+0x48b/0xae0 [ 199.206605] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 199.211797] ? arp_constructor+0xd80/0xd80 [ 199.216032] ? futex_wake+0x304/0x760 [ 199.219846] inet_ioctl+0x237/0x360 [ 199.223475] ? inet_stream_connect+0xa0/0xa0 [ 199.227883] ? mark_held_locks+0x130/0x130 [ 199.232116] ? graph_lock+0x270/0x270 [ 199.235918] ? do_futex+0x249/0x26d0 [ 199.239637] ? kmem_cache_alloc_trace+0x356/0x740 [ 199.244479] ? lockdep_init_map+0x105/0x590 [ 199.248804] ? lockdep_init_map+0x105/0x590 [ 199.253131] ? find_held_lock+0x36/0x1c0 [ 199.257215] sock_do_ioctl+0xeb/0x420 [ 199.261018] ? compat_ifr_data_ioctl+0x170/0x170 [ 199.265771] ? check_preemption_disabled+0x48/0x280 [ 199.270788] ? kasan_check_read+0x11/0x20 [ 199.274935] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 199.280211] ? rcu_read_unlock_special+0x370/0x370 [ 199.285175] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 199.290363] sock_ioctl+0x313/0x690 [ 199.293991] ? dlci_ioctl_set+0x40/0x40 [ 199.297969] ? ksys_dup3+0x680/0x680 [ 199.301686] ? __might_fault+0x12b/0x1e0 [ 199.305770] ? lock_downgrade+0x900/0x900 [ 199.309924] ? lock_release+0xa00/0xa00 [ 199.313902] ? perf_trace_sched_process_exec+0x860/0x860 [ 199.319350] ? dlci_ioctl_set+0x40/0x40 [ 199.323324] do_vfs_ioctl+0x1de/0x1790 [ 199.327216] ? ioctl_preallocate+0x300/0x300 [ 199.331628] ? __fget_light+0x2e9/0x430 [ 199.335601] ? fget_raw+0x20/0x20 [ 199.339057] ? _copy_to_user+0xc8/0x110 [ 199.343037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.348587] ? put_timespec64+0x10f/0x1b0 [ 199.352742] ? nsecs_to_jiffies+0x30/0x30 [ 199.356899] ? do_syscall_64+0x9a/0x820 [ 199.360877] ? do_syscall_64+0x9a/0x820 [ 199.364850] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 199.369432] ? security_file_ioctl+0x94/0xc0 [ 199.373842] ksys_ioctl+0xa9/0xd0 [ 199.377298] __x64_sys_ioctl+0x73/0xb0 [ 199.381187] do_syscall_64+0x1b9/0x820 [ 199.385081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 199.390445] ? syscall_return_slowpath+0x5e0/0x5e0 [ 199.395377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.400226] ? trace_hardirqs_on_caller+0x310/0x310 [ 199.405242] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 199.410297] ? prepare_exit_to_usermode+0x291/0x3b0 [ 199.415315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.420164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.425382] RIP: 0033:0x457669 [ 199.428582] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.447483] RSP: 002b:00007f8cf17a2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.455188] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 199.462456] RDX: 0000000020000000 RSI: 0000000000008955 RDI: 0000000000000005 [ 199.469722] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 199.476989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8cf17a36d4 [ 199.484255] R13: 00000000004c2747 R14: 00000000004d46f8 R15: 00000000ffffffff 23:59:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 23:59:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) 23:59:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) 23:59:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 23:59:13 executing program 2: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x80, 0x4a00) gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) close(r0) 23:59:13 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) [ 199.550508] kobject: 'loop1' (00000000a126ed72): kobject_uevent_env [ 199.572974] kobject: 'loop1' (00000000a126ed72): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 199.596263] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 199.643146] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 199.648251] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 199.680842] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] 23:59:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 199.695365] kobject: 'loop4' (000000002c05b978): kobject_uevent_env [ 199.722069] kobject: 'loop4' (000000002c05b978): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 199.731513] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 23:59:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 199.768482] kobject: 'loop2' (0000000033c0c715): kobject_uevent_env [ 199.807271] kobject: 'loop2' (0000000033c0c715): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:59:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 199.871889] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 199.911081] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:59:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) 23:59:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 199.973804] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 199.984596] PM: Basic memory bitmaps created [ 200.003378] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:59:13 executing program 2: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x80, 0x4a00) gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) close(r0) [ 200.048328] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 200.072937] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 200.091881] PM: Basic memory bitmaps freed [ 200.153359] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 200.168868] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 200.187915] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.206194] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 200.233086] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 200.247698] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 200.276680] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 200.318985] kobject: 'loop1' (00000000a126ed72): kobject_uevent_env [ 200.325439] kobject: 'loop1' (00000000a126ed72): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.350934] PM: Basic memory bitmaps created [ 200.446657] PM: Basic memory bitmaps freed 23:59:14 executing program 4: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) 23:59:14 executing program 3: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 200.508987] kobject: 'loop2' (0000000033c0c715): kobject_uevent_env [ 200.515540] kobject: 'loop2' (0000000033c0c715): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.537641] kobject: 'loop4' (000000002c05b978): kobject_uevent_env [ 200.550867] kobject: 'loop4' (000000002c05b978): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 200.581018] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 200.588699] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 200.608271] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 200.627955] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 200.634317] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 200.636263] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 200.649556] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.691640] PM: Basic memory bitmaps created [ 200.710823] PM: Basic memory bitmaps freed [ 200.782182] kobject: 'loop4' (000000002c05b978): kobject_uevent_env [ 200.788748] kobject: 'loop4' (000000002c05b978): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:59:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 23:59:16 executing program 2: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) 23:59:16 executing program 3: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) 23:59:16 executing program 4: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:16 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) [ 202.623769] kobject: 'loop0' (000000001694c32f): kobject_uevent_env [ 202.647115] kobject: 'loop0' (000000001694c32f): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:59:16 executing program 3: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) 23:59:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 202.668229] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 202.674616] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 202.686487] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 202.707576] kobject: 'loop3' (00000000322887bf): kobject_uevent_env 23:59:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 202.727866] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:59:16 executing program 3: r0 = syz_open_dev$usb(0x0, 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 202.794414] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 202.817693] PM: Basic memory bitmaps created 23:59:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 202.837838] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 202.858111] kobject: 'loop0' (000000001694c32f): kobject_uevent_env [ 202.867613] kobject: 'loop0' (000000001694c32f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.881585] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env 23:59:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 202.923407] PM: Basic memory bitmaps freed [ 202.929365] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 202.962384] kobject: 'loop3' (00000000322887bf): kobject_uevent_env 23:59:16 executing program 2: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:16 executing program 3: r0 = syz_open_dev$usb(0x0, 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) 23:59:16 executing program 4: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) 23:59:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) [ 202.986401] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:59:16 executing program 3: r0 = syz_open_dev$usb(0x0, 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) 23:59:16 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x400, 0x400810) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x4a00) gettid() memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) setsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r0}}, 0x18) close(r0) [ 203.043647] kobject: 'loop4' (000000002c05b978): kobject_uevent_env [ 203.048858] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 203.051100] kobject: 'loop4' (000000002c05b978): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 203.056458] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 203.056488] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 203.068295] kobject: 'loop2' (0000000033c0c715): kobject_uevent_env 23:59:16 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, '\x00\x00\x00\x80\x00\x00\x01\x00\x00\x00\x00p\x00'}) 23:59:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0xc000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000380)=ANY=[@ANYBLOB="a303c2c9c03a23090229d4f3638d7ad2be60627d8a0f50"]) [ 203.117542] kobject: 'loop2' (0000000033c0c715): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 203.169052] kobject: 'loop1' (00000000a126ed72): kobject_uevent_env [ 203.174311] PM: Basic memory bitmaps created [ 203.196206] kobject: 'loop1' (00000000a126ed72): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 203.242838] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 203.260175] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 203.262007] PM: Basic memory bitmaps freed [ 203.274765] kobject: 'loop3' (00000000322887bf): kobject_uevent_env [ 203.282668] kobject: 'loop3' (00000000322887bf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 203.306437] kobject: 'loop5' (0000000084cd17d6): kobject_uevent_env [ 203.314211] kobject: 'loop5' (0000000084cd17d6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 203.330622] kobject: 'loop1' (00000000a126ed72): kobject_uevent_env [ 203.337224] kobject: 'loop1' (00000000a126ed72): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 203.347805] kobject: 'loop2' (0000000033c0c715): kobject_uevent_env [ 203.354243] kobject: 'loop2' (0000000033c0c715): fill_kobj_path: path = '/devices/virtual/block/loop2'