[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 62.454278][ T27] audit: type=1800 audit(1576102510.255:25): pid=8843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 62.490424][ T27] audit: type=1800 audit(1576102510.255:26): pid=8843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 62.520589][ T27] audit: type=1800 audit(1576102510.265:27): pid=8843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.21' (ECDSA) to the list of known hosts. 2019/12/11 22:15:22 fuzzer started 2019/12/11 22:15:25 dialing manager at 10.128.0.26:33577 2019/12/11 22:15:25 syscalls: 2701 2019/12/11 22:15:25 code coverage: enabled 2019/12/11 22:15:25 comparison tracing: enabled 2019/12/11 22:15:25 extra coverage: enabled 2019/12/11 22:15:25 setuid sandbox: enabled 2019/12/11 22:15:25 namespace sandbox: enabled 2019/12/11 22:15:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 22:15:25 fault injection: enabled 2019/12/11 22:15:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 22:15:25 net packet injection: enabled 2019/12/11 22:15:25 net device setup: enabled 2019/12/11 22:15:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 22:15:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:17:02 executing program 0: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:17:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syzkaller login: [ 174.373331][ T9010] IPVS: ftp: loaded support on port[0] = 21 [ 174.565702][ T9010] chnl_net:caif_netlink_parms(): no params data found 22:17:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000ac1414aa00000012a199f8a888a92bf46e20a9b78003d91876c932b5895c305382e6bd5ef923a781b16392dd240ffb4b0a5961332a4569740308b3daf955906d6c220f70e197d806a8914ec6756451974dbca80cdffe2bbd5e435106414f9d0f140a0e15ec35ebf1292b450d49ce2e4190c5cf13096a3c4cd7d0eda4000000460c61d23827b25271251748a1365e2cdf2131074890fb19b349f2c66e22a09ebefefee499464445201ca7f810f64e21fcaecbb80fe28396ffff000072bcd814"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x65) [ 174.638941][ T9010] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.670470][ T9010] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.692014][ T9010] device bridge_slave_0 entered promiscuous mode [ 174.723292][ T9010] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.731876][ T9013] IPVS: ftp: loaded support on port[0] = 21 [ 174.750606][ T9010] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.761369][ T9010] device bridge_slave_1 entered promiscuous mode [ 174.818515][ T9010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.840249][ T9010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:17:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x1}) [ 174.927748][ T9010] team0: Port device team_slave_0 added [ 174.962172][ T9017] IPVS: ftp: loaded support on port[0] = 21 [ 174.976863][ T9010] team0: Port device team_slave_1 added [ 175.016255][ T9013] chnl_net:caif_netlink_parms(): no params data found [ 175.114523][ T9010] device hsr_slave_0 entered promiscuous mode 22:17:03 executing program 4: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00', {0x7fff}}) fstat(0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') read$FUSE(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x5b11, 0x4) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 175.210920][ T9010] device hsr_slave_1 entered promiscuous mode [ 175.280055][ T9019] IPVS: ftp: loaded support on port[0] = 21 [ 175.395696][ T9013] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.412656][ T9013] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.430820][ T9013] device bridge_slave_0 entered promiscuous mode [ 175.452969][ T9010] netdevsim netdevsim0 netdevsim0: renamed from eth0 22:17:03 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) [ 175.537540][ T9013] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.546355][ T9013] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.556373][ T9013] device bridge_slave_1 entered promiscuous mode [ 175.584595][ T9010] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 175.598976][ T9021] IPVS: ftp: loaded support on port[0] = 21 [ 175.645421][ T9010] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 175.710212][ T9013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.731308][ T9024] IPVS: ftp: loaded support on port[0] = 21 [ 175.741631][ T9010] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 175.804191][ T9013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.890603][ T9013] team0: Port device team_slave_0 added [ 175.901864][ T9013] team0: Port device team_slave_1 added [ 175.907675][ T9017] chnl_net:caif_netlink_parms(): no params data found [ 175.930728][ T9019] chnl_net:caif_netlink_parms(): no params data found [ 176.043130][ T9013] device hsr_slave_0 entered promiscuous mode [ 176.081752][ T9013] device hsr_slave_1 entered promiscuous mode [ 176.140519][ T9013] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.173942][ T9017] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.181189][ T9017] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.188890][ T9017] device bridge_slave_0 entered promiscuous mode [ 176.208883][ T9019] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.216273][ T9019] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.226248][ T9019] device bridge_slave_0 entered promiscuous mode [ 176.239028][ T9017] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.246838][ T9017] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.254881][ T9017] device bridge_slave_1 entered promiscuous mode [ 176.279402][ T9019] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.288483][ T9019] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.296450][ T9019] device bridge_slave_1 entered promiscuous mode [ 176.348895][ T9013] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 176.407867][ T9013] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 176.463959][ T9017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.489564][ T9019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.498905][ T9013] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 176.554069][ T9017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.563378][ T9021] chnl_net:caif_netlink_parms(): no params data found [ 176.600929][ T9019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.610090][ T9013] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 176.715023][ T9017] team0: Port device team_slave_0 added [ 176.728517][ T9017] team0: Port device team_slave_1 added [ 176.747141][ T9021] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.755605][ T9021] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.763564][ T9021] device bridge_slave_0 entered promiscuous mode [ 176.787308][ T9019] team0: Port device team_slave_0 added [ 176.797880][ T9019] team0: Port device team_slave_1 added [ 176.805056][ T9021] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.812366][ T9021] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.820049][ T9021] device bridge_slave_1 entered promiscuous mode [ 176.843869][ T9024] chnl_net:caif_netlink_parms(): no params data found [ 176.880970][ T9024] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.888145][ T9024] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.896073][ T9024] device bridge_slave_0 entered promiscuous mode [ 176.952323][ T9017] device hsr_slave_0 entered promiscuous mode [ 177.000792][ T9017] device hsr_slave_1 entered promiscuous mode [ 177.060950][ T9017] debugfs: Directory 'hsr0' with parent '/' already present! [ 177.070014][ T9021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.086816][ T9021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.098498][ T9010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.106489][ T9024] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.113749][ T9024] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.122000][ T9024] device bridge_slave_1 entered promiscuous mode [ 177.171736][ T9024] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.183563][ T9021] team0: Port device team_slave_0 added [ 177.190985][ T9024] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.272323][ T9019] device hsr_slave_0 entered promiscuous mode [ 177.310953][ T9019] device hsr_slave_1 entered promiscuous mode [ 177.380479][ T9019] debugfs: Directory 'hsr0' with parent '/' already present! [ 177.400035][ T9010] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.414195][ T9021] team0: Port device team_slave_1 added [ 177.431441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.439954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.522839][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.533519][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.542493][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.549776][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.558401][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.576199][ T9017] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 177.644724][ T9024] team0: Port device team_slave_0 added [ 177.655331][ T9024] team0: Port device team_slave_1 added [ 177.702692][ T9021] device hsr_slave_0 entered promiscuous mode [ 177.750790][ T9021] device hsr_slave_1 entered promiscuous mode [ 177.800444][ T9021] debugfs: Directory 'hsr0' with parent '/' already present! [ 177.821732][ T9017] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 177.873989][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.883240][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.891863][ T9015] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.898974][ T9015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.906764][ T9019] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 177.963098][ T9019] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 178.006868][ T9019] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 178.053185][ T9019] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 178.094271][ T9013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.109744][ T9017] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 178.246142][ T9024] device hsr_slave_0 entered promiscuous mode [ 178.291860][ T9024] device hsr_slave_1 entered promiscuous mode [ 178.340531][ T9024] debugfs: Directory 'hsr0' with parent '/' already present! [ 178.348233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.364383][ T9017] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 178.441634][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.449458][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.457578][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.468123][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.477035][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.488865][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.500848][ T9013] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.536502][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.546139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.555633][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.564387][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.594474][ T9021] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 178.634047][ T9021] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 178.702451][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.711311][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.719635][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.726730][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.734553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.743707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.752143][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.760939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.769292][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.776380][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.784703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.794249][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.813436][ T9024] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 178.858427][ T9024] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 178.903119][ T9021] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 178.942738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.951918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.981950][ T9024] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 179.012595][ T9021] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 179.062536][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.071566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.079854][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.088863][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.097438][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.106113][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.114493][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.133204][ T9013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.145625][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.155020][ T9024] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 179.252718][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.261890][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.301098][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.308553][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.322612][ T9010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.357176][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.366282][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.387510][ T9013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.486981][ T9019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.539199][ T9017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.606536][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.618184][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:17:07 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$unix(0x1, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) close(r0) [ 179.646744][ T9019] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.663521][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.681614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.715437][ T9017] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.743917][ T9021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.753480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 22:17:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000001c0)=[{}, {}, {r0}], 0x3, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1000006a1, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000001700)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) shutdown(r1, 0x0) [ 179.771633][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.780070][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.787218][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.803533][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.829566][ T9021] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.859958][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:17:07 executing program 0: poll(&(0x7f0000000000), 0x2000000000000035, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd3c, 0x0, 0x0, 0x800e0076e) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) [ 179.876734][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.887506][ T3216] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.894670][ T3216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.909595][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.918609][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.927566][ T3216] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.934905][ T3216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.943681][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.958158][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.966743][ T3216] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.974263][ T3216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.986148][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.995518][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.007139][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.017276][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.034989][ T9024] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.053851][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.063634][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.074881][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.084178][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.125940][ T9024] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.133777][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.142463][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.151721][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.160045][ T3216] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.167179][ T3216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.175341][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.184372][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.192911][ T3216] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.199958][ T3216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.207686][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.216464][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.225390][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.233875][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.242832][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.251206][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.258916][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.267846][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.276360][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.285172][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.293909][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.303351][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.311890][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.340924][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.353068][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.365580][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.374611][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.383578][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.392557][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.401805][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.410107][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.418943][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.440575][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.449711][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.458902][ T9015] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.466236][ T9015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.474114][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.483183][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.491889][ T9015] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.499009][ T9015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.506886][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.519186][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.532556][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.541051][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.551283][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.559565][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.576399][ T9021] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.592403][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.602789][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.614880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.623667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 22:17:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000001c0)=[{}, {}, {}, {r0}], 0x4, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1000006a1, 0x0, 0x0, 0x800e00515) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000001700)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) shutdown(r1, 0x0) [ 180.636005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.644916][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.654776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.719758][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.729201][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.738774][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.756446][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.766785][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.775871][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.784452][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.793351][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.801936][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:17:08 executing program 0: poll(&(0x7f0000000000), 0x2000000000000035, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd3c, 0x0, 0x0, 0x800e0076e) ppoll(0x0, 0x0, &(0x7f0000000c40)={0x79fa}, 0x0, 0x0) shutdown(r0, 0x0) [ 180.814346][ T9024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.829550][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.848426][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.872373][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.890998][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.911247][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.928711][ T9021] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.938516][ T9019] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.990970][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.001311][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.013113][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.022656][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.035631][ T9017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.058214][ T9024] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.270303][ C0] hrtimer: interrupt took 40850 ns 22:17:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/217, 0xd9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r1, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) 22:17:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x1}) 22:17:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000001c0)=[{}, {}, {}, {r0}], 0x4, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1000006a1, 0x0, 0x0, 0x800e00515) dup(0xffffffffffffffff) recvfrom$inet(0xffffffffffffffff, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000140)=""/222, 0xde}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)=""/169, 0xa9}], 0x100000000000011a}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r6, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000001700)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) shutdown(r5, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x0) writev(r7, &(0x7f0000000340)=[{&(0x7f0000000000)="44afd0edcb9190f69a475dd7ba2de92a0ed6846c9ca9dcc8ff2c3a10aa81ad48aa4926cf4236d3675441f00a2b963dfcce935829a806262cab2b54fa51e2d2306572af71c422624172cf62ea51ddd96ac104074e4ab744f20c30ad6670f67ffec94763de543fbca542ae0f7d23b56383e9d4799a5ff3e9d5d664b5e5274afe17c1275ad69a1d4e8f32d94657418d62efda2d557f617e538d7b370c784c10", 0x800e2}], 0x7) shutdown(r1, 0x0) 22:17:09 executing program 2: poll(&(0x7f0000000000), 0x2000000000000035, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd3c, 0x0, 0x0, 0x800e0076e) poll(&(0x7f0000000100)=[{r0, 0x40}], 0x1, 0x0) ppoll(&(0x7f0000000c00)=[{r0}, {}, {r0, 0x22}], 0x3, &(0x7f0000000c40)={0x79fa}, 0x0, 0x0) shutdown(r0, 0x0) close(r0) 22:17:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000200)=""/126, 0x7e}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001840)=[{&(0x7f0000000100)=""/101, 0x65}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0cff, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001a00)=""/4096, 0x1000}], 0x1}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r7, &(0x7f0000000680)=[{&(0x7f0000000180)=""/214, 0xd6}], 0x1) shutdown(r6, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 181.679478][ T9097] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:17:09 executing program 4: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00', {0x7fff}}) fstat(0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') read$FUSE(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x5b11, 0x4) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) 22:17:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/217, 0xd9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) 22:17:09 executing program 5: poll(&(0x7f0000000100)=[{}], 0x2075, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffe, 0x0, 0x0, 0x800e00510) shutdown(r0, 0x0) 22:17:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f0000000140)=""/223, 0xdf}, {0x0}, {&(0x7f0000001280)=""/214, 0xd6}, {0x0}], 0x4) recvfrom$inet(r0, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00840) dup(0xffffffffffffffff) shutdown(r0, 0x0) 22:17:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/124, 0x7c}, {0x0}, {0x0}, {0x0}], 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff81, 0x0, 0x0, 0x800e007bd) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000280)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) shutdown(r2, 0x0) 22:17:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x9, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$inet6(r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0), 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x9, &(0x7f0000000300)=[{0x7, 0xff, 0x0, 0x8001}, {0x7, 0x0, 0xff, 0x4}, {0x1, 0x7, 0x4, 0x6}, {0x8, 0x0, 0x1, 0x8000}, {0x0, 0x1f, 0x1, 0xfd1}, {0x401, 0x20, 0xff, 0x3}, {0x0, 0x2, 0x0, 0x9}, {0x6, 0x3, 0x2, 0x4}, {0x7, 0x4, 0x1, 0x80}]}, 0x10) setsockopt(r0, 0x2c, 0x8, &(0x7f00000000c0)="53954fb34776adf0bbf65c64838d8e0d111a4cbebc1a59d871808dd008444066d02d93b61da45f6646a5f3e9a58c5f18f580d452276854d35f0673", 0x3b) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sync() openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x600, 0x110) syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite\x00') perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r4, &(0x7f00000017c0), 0x1b4, 0x500000000000000) r5 = open(0x0, 0x100, 0xc1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, @ipx={0x4, 0x8000, 0x9, "031553c49416"}, @rc={0x1f, {0x0, 0x1, 0x1, 0xff, 0x0, 0x1}, 0x1}, @llc={0x1a, 0x104, 0x8, 0x4, 0xf8, 0xff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14, 0x0, 0x0, 0x0, 0x1fe, &(0x7f0000000100)='veth0_to_bond\x00', 0x7, 0x9, 0x1}) 22:17:10 executing program 1: socket(0x0, 0x0, 0x0) poll(0x0, 0xfffffffffffffede, 0x0) r0 = gettid() chown(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x1ff, 0x1000}, {0x1, 0x3}], 0x2) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) tkill(r0, 0x1000000000016) 22:17:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/223, 0xdf}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r1, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00840) shutdown(r0, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000340)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r1, 0x0) 22:17:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000200)=""/126, 0x7e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001a00)=""/4096, 0x1000}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000680)=[{&(0x7f0000000180)=""/214, 0xd6}, {0x0}], 0x100000000000000c) shutdown(r3, 0x0) shutdown(r1, 0x0) 22:17:10 executing program 3: poll(0x0, 0x0, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffe, 0x0, 0x0, 0x800e00510) shutdown(r0, 0x0) 22:17:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000200)=""/126, 0x7e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001840)=[{&(0x7f0000000100)=""/101, 0x65}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0cff, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000680)=[{&(0x7f0000000180)=""/214, 0xd6}, {0x0}], 0x100000000000000c) shutdown(r4, 0x0) shutdown(r1, 0x0) 22:17:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000280)='id_r[solver\x00', &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={'crc32c-generic\x00'}}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000300)=0x9, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) 22:17:10 executing program 2: unshare(0x20600) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fchown(r0, 0x0, 0x0) 22:17:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 22:17:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r2, 0x1, 0x5, &(0x7f0000000000), 0x4) 22:17:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000280)='id_r[solver\x00', &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={'crc32c-generic\x00'}}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000300)=0x9, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) [ 183.182496][ T9214] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:17:11 executing program 0: socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, 0x0}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)="53954fb34776adf0bbf65c64838d8e0d111a4cbebc1a59d871808dd0084440", 0x1f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) sync() sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8081}, 0x2000800) syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite\x00') perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x500000000000000) open(&(0x7f0000000000)='./file0\x00', 0x100, 0xc1) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 22:17:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000280)='id_r[solver\x00', &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={'crc32c-generic\x00'}}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000300)=0x9, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) 22:17:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000280)='id_r[solver\x00', &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={'crc32c-generic\x00'}}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000300)=0x9, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) 22:17:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x5, &(0x7f0000000000)=0x1, 0x4) 22:17:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x40000000010) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x28, r1, 0xc01, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 22:17:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000e40), 0x4) [ 183.705322][ T9245] tipc: Enabling of bearer rejected, failed to enable media [ 183.723104][ T9248] tipc: Enabling of bearer rejected, failed to enable media 22:17:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x11) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) 22:17:11 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 22:17:11 executing program 0: socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, 0x0}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)="53954fb34776adf0bbf65c64838d8e0d111a4cbebc1a59d871808dd0084440", 0x1f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) sync() sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8081}, 0x2000800) syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite\x00') perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x500000000000000) open(&(0x7f0000000000)='./file0\x00', 0x100, 0xc1) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 22:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = open(0x0, 0x80040, 0x0) fcntl$getflags(r2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, 0x0, &(0x7f00000007c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, 0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, r0, 0x1, 0x0, 0x0, {0x17}}, 0x14}}, 0x0) 22:17:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000e40), 0x4) 22:17:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x11) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) 22:17:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)={r1, 0x0, 0x10}, &(0x7f0000000040)=0x18) 22:17:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000e40), 0x4) 22:17:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0x807, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000040)={'\x00', 0x2}, 0x0, 0xfffffffffffffffd) r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x11) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) 22:17:12 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f00000002c0)) 22:17:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4874, &(0x7f0000000040)) io_setup(0x9, &(0x7f00000002c0)) io_setup(0x800, &(0x7f0000000280)) io_setup(0x24, &(0x7f0000000000)) io_setup(0x8ce, &(0x7f0000000300)) 22:17:12 executing program 0: socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, 0x0}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)="53954fb34776adf0bbf65c64838d8e0d111a4cbebc1a59d871808dd0084440", 0x1f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) sync() sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8081}, 0x2000800) syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite\x00') perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x500000000000000) open(&(0x7f0000000000)='./file0\x00', 0x100, 0xc1) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 184.278626][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 184.278639][ T27] audit: type=1800 audit(1576102632.075:31): pid=9292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16544 res=0 [ 184.394144][ T27] audit: type=1804 audit(1576102632.115:32): pid=9292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir290909655/syzkaller.sl9kyq/5/file0" dev="sda1" ino=16544 res=1 22:17:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000e40), 0x4) 22:17:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x4}]}]}}, &(0x7f00000000c0)=""/207, 0x32, 0xcf, 0x8}, 0x20) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 184.589642][ T27] audit: type=1800 audit(1576102632.115:33): pid=9292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16544 res=0 [ 184.628535][ T9309] BPF: (anon) type_id=0 bits_offset=4 [ 184.650704][ T9309] BPF: [ 184.666913][ T9309] BPF:Invalid type_id [ 184.684711][ T9309] BPF: [ 184.684711][ T9309] [ 184.712698][ T9312] BPF: (anon) type_id=0 bits_offset=4 22:17:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) 22:17:12 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0xffff, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000340)="31d5238527441f72c0074788fef2e3a0c6cb9fd4a2d5e567049d35f894e6ea00d824fafd3848b852b9e2383b834c04b42a9076f5a4e1111df909b3eecb39caa11944eaec2c5ea84bfba23aca86c7d72edd430b25bd3c779a11d269b60eec8db47202843482c65e33c27119fef2955dcdebe15df57db6d4b3aac3a191b1d5b4058c8d846118f48bdf2724af9d37b41da78ee0a10b4b13da412edcee18c8e9db066def193770b3715e", 0xa8, 0xf7f1}, {&(0x7f00000004c0)="0d29a5a71ad472580a0c46ede968ffd8c6eb2589333f227db0852e2fc922b284898bafde3b35805fd9259aa5fed20486ae3ca13ca4d0e28986effa19f1dbb197c354b2156e10141f78ef1002e1313a22b1a20beccae3f23a901dd1ac6a09a86e0ef80eee1f0bebd81ab3791267d3af55bc2fcec0be7957d90ca20e8c67397eeb1726dad8cc47d1", 0x87, 0x3}, {&(0x7f0000000580)="182b3f69adbd640f78536e95028f2adc312dcfccda5cbe3e57f6a08c2abf7c177eef64d7b25d", 0x26, 0x1}], 0x1040031, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x7, 0x8002) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') 22:17:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000000c0)=""/207, 0x32, 0xcf, 0x8}, 0x20) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) [ 184.753624][ T9312] BPF: [ 184.759532][ T9312] BPF:Invalid type_id [ 184.763748][ T9312] BPF: [ 184.763748][ T9312] [ 184.884529][ T9323] BPF: (anon) type_id=3 bits_offset=0 [ 184.935586][ T9323] BPF: 22:17:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)={r1, 0x0, 0x10}, &(0x7f0000000040)=0x18) [ 184.957714][ T9323] BPF:Invalid member 22:17:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) creat(&(0x7f0000000500)='./file0\x00', 0x124) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') syz_open_procfs(0x0, &(0x7f0000000280)='comm\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = socket(0x4000000000010, 0x0, 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r7 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r7, r6) getsockopt$inet6_buf(r7, 0x29, 0x23, &(0x7f0000000200)=""/126, &(0x7f00000002c0)=0x7e) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a54f) r8 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet6(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="f06740f95b7a6aef0142b5398674e1859270c2ac174bd7eda6339484bc98304dbb1295ec7ce8dffa43145c053435b84f5790fb313b71", 0x36}, {&(0x7f0000000100)="3ae02fc16458ad2c1edbbb4a01e759e003f4c82434bef34e174b7d879f12bf34665d0d45228f6c0a7e2654dc68ef4f6beb3c162a0d3082f3ec4150cd7e721e3fac9c9b5061c44057cea11daf5268ba0061d946332a360bc929ecab909cfb6d54693601943a930caa82027287e5aa42bd525588090ce867d0036b2f035b9197952bcbaa7ea5b84200b18d68ba2a9873a77f26051580d56f1ef14ae049b02970d656fcb236a01187d22d35be92be7cbc3a1098c30d7604c14f1484605f37e2047b9095e4a5172d6926a8bbbadca03a1e474313be5ed7fe17e49a32ce912c68a8793dbf353aaf6f62888a8ef6dc9ac1d2e683", 0xf1}, {&(0x7f0000000200)="5a05dbae0196d8312f26571257cfdaed4f592195bd6cfa81ec709b16f5f8c3ac35967699e278ed8e115e72880f4f70325c96d57c0287145b693989e96ced92b04f7c9f7744fe21cee861b0dc0ce87cd5c11246154c15dac3d5283078327df2a4bc9b1d3397245875d38a095cbf72a6b27262813bbeb28aa506cc741e16574ee4e92dfd134faa457369b710524e3ebc6ca09f8a7f1c78ed86ed55f081291a9b4c76b329aa28bd24633ec8e8dded1ef6f126c07d721bc30d43f4ae42f88e8f45cf988ffe3c1598eab9365a8cfe5d7be1b9fdfd1fda50ffc8dd95d3eaa243c6c085d1164c1f830b10dddd0aeadf9c1be0bb6ddaa86b40ec8ac86992a4b38f39", 0xfe}, {&(0x7f0000000340)="9ed7a0e59d1e1bc3fdb6c1387fcda890d1010fd08588c1d12aaa8379591773173b037f", 0x23}, {&(0x7f0000000380)="1248daca1dfd859697a96c87ded9dcd468f80060b53e48d5e513e128463eae9e5f3356dfbd7df1aab53c9f46dabce8520aaee3a40952111db18d1169d7107e504cd531196a58613f57fc69c83b0e526f5a5c2d6b0d518897da7066b098873c3a2ab8c600db7b249c707455377c3aa386ae63b922fc8e6469c99d239377c06d466cf80b949c1ec46bfd10b60b", 0x8c}], 0x5, &(0x7f00000009c0)=[@hopopts_2292={{0x108, 0x29, 0x36, {0x2, 0x1d, [], [@generic={0x7, 0x6, "b13782204434"}, @ra={0x5, 0x2, 0x1}, @pad1, @generic={0x7f, 0xcc, "fa85f615c3ee56f2756da434fc41b9155984f140120e51ff7b102200ffcb083b4ce615be3e62a0f76f9b99531fde15c7ce9b8d56aa840f71add2ec5bf15ac8d1c00d4a9c2bd18bbc45836ecb2313c76725fa46ca3731c555f5cef1faa5aa739fba0fc75e686455a26abb5d714cab2a57d51fc4585916b24a806f53ffa7cfe12586db2e79b43eacd562121c5964d60c8a4606696f600a7e99b59f4b00aa7a89b9025455a2d513281c2d7d48c362791f580f37ba8760bd3a6efa05f5bebc668b1d379d87bb6f6d8132002fb838"}, @jumbo, @calipso={0x7, 0x8, {0x4ea9, 0x0, 0x5, 0x9b}}]}}}], 0x108}, 0x40) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) [ 185.033490][ T9323] BPF: [ 185.033490][ T9323] [ 185.078922][ T27] audit: type=1804 audit(1576102632.875:34): pid=9298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir290909655/syzkaller.sl9kyq/5/file0" dev="sda1" ino=16544 res=1 [ 185.119487][ T9323] BPF: (anon) type_id=3 bits_offset=0 22:17:12 executing program 4: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) exit(0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00') recvmmsg(r0, &(0x7f00000048c0)=[{{&(0x7f0000001a00)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001a80)=""/167, 0xa7}, {&(0x7f0000001b40)=""/229, 0xe5}], 0x2, &(0x7f0000001c40)=""/93, 0x5d}, 0x5}, {{&(0x7f0000001cc0)=@isdn, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000000200)=""/32, 0x20}, {&(0x7f0000001480)=""/51, 0x33}, {&(0x7f0000002dc0)=""/96, 0x60}, {&(0x7f0000002e40)=""/252, 0xfc}, {&(0x7f0000002f40)=""/108, 0x6c}], 0x6, &(0x7f0000003040)=""/84, 0x54}}, {{&(0x7f00000030c0)=@rc, 0x80, &(0x7f0000003140), 0x0, &(0x7f0000003180)=""/188, 0xbc}}, {{&(0x7f0000003240)=@alg, 0x80, 0x0, 0x0, &(0x7f0000003380)=""/184, 0xb8}, 0x1}, {{&(0x7f0000003440)=@alg, 0x80, &(0x7f00000047c0)=[{0x0}, {&(0x7f0000003580)=""/190, 0xbe}, {&(0x7f0000003640)=""/51, 0x33}, {&(0x7f0000003680)=""/40, 0x28}, {&(0x7f00000036c0)=""/4096, 0x1000}, {0x0}], 0x6, &(0x7f0000004840)=""/102, 0x66}}], 0x5, 0x40000002, &(0x7f0000004a00)={0x0, 0x1c9c380}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$netlink(0x10, 0x3, 0x0) [ 185.153962][ T27] audit: type=1800 audit(1576102632.915:35): pid=9298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16544 res=0 [ 185.174884][ T9323] BPF: [ 185.185796][ T9323] BPF:Invalid member [ 185.199366][ T9323] BPF: [ 185.199366][ T9323] [ 185.312144][ T9329] IPVS: ftp: loaded support on port[0] = 21 [ 185.326505][ T9349] devpts: called with bogus options 22:17:13 executing program 1: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) exit(0x3f) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) link(&(0x7f0000000100)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f00000048c0)=[{{&(0x7f0000001a00)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001a80)=""/167, 0xa7}, {&(0x7f0000001b40)=""/229, 0xe5}], 0x2, &(0x7f0000001c40)=""/93, 0x5d}, 0x5}, {{&(0x7f0000001cc0)=@isdn, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000000200)=""/32, 0x20}, {&(0x7f0000001480)=""/51, 0x33}, {0x0}, {&(0x7f0000002dc0)=""/96, 0x60}, {&(0x7f0000002e40)=""/252, 0xfc}, {&(0x7f0000002f40)=""/108, 0x6c}], 0x7, &(0x7f0000003040)=""/84, 0x54}}, {{&(0x7f00000030c0)=@rc, 0x80, &(0x7f0000003140), 0x0, &(0x7f0000003180)=""/188, 0xbc}, 0x8459}, {{&(0x7f0000003440)=@alg, 0x80, &(0x7f00000047c0)=[{0x0}, {&(0x7f0000003580)=""/190, 0xbe}, {&(0x7f0000003640)=""/51, 0x33}, {&(0x7f0000003680)=""/40, 0x28}, {0x0}], 0x5, &(0x7f0000004840)=""/102, 0x66}}], 0x4, 0x40000002, &(0x7f0000004a00)={0x0, 0x1c9c380}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 185.370913][ T9015] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 185.399261][ T9015] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 185.450577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 185.456698][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 185.481210][ T9360] devpts: called with bogus options [ 185.488947][ T9362] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 22:17:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xffffff24}, 0x136) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x2, 0x0, 0x0) [ 185.833828][ T9332] IPVS: ftp: loaded support on port[0] = 21 [ 185.860352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 185.866279][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:17:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)={r1, 0x0, 0x10}, &(0x7f0000000040)=0x18) 22:17:13 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0xffff, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000340)="31d5238527441f72c0074788fef2e3a0c6cb9fd4a2d5e567049d35f894e6ea00d824fafd3848b852b9e2383b834c04b42a9076f5a4e1111df909b3eecb39caa11944eaec2c5ea84bfba23aca86c7d72edd430b25bd3c779a11d269b60eec8db47202843482c65e33c27119fef2955dcdebe15df57db6d4b3aac3a191b1d5b4058c8d846118f48bdf2724af9d37b41da78ee0a10b4b13da412edcee18c8e9db066def193770b3715e", 0xa8, 0xf7f1}, {&(0x7f00000004c0)="0d29a5a71ad472580a0c46ede968ffd8c6eb2589333f227db0852e2fc922b284898bafde3b35805fd9259aa5fed20486ae3ca13ca4d0e28986effa19f1dbb197c354b2156e10141f78ef1002e1313a22b1a20beccae3f23a901dd1ac6a09a86e0ef80eee1f0bebd81ab3791267d3af55bc2fcec0be7957d90ca20e8c67397eeb1726dad8cc47d1", 0x87, 0x3}, {&(0x7f0000000580)="182b3f69adbd640f78536e95028f2adc312dcfccda5cbe3e57f6a08c2abf7c177eef64d7b25d", 0x26, 0x1}], 0x1040031, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x7, 0x8002) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') [ 186.026717][ T9342] list_del corruption. prev->next should be ffff88808ffd50f0, but was ffff88808ffd5520 [ 186.037245][ T9342] ------------[ cut here ]------------ [ 186.042719][ T9342] kernel BUG at lib/list_debug.c:51! [ 186.048182][ T9342] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 186.054252][ T9342] CPU: 1 PID: 9342 Comm: syz-executor.3 Not tainted 5.5.0-rc1-next-20191211-syzkaller #0 [ 186.064048][ T9342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.072494][ T9345] kobject: 'kvm' (000000007c2cb009): kobject_uevent_env [ 186.074121][ T9342] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 186.081082][ T9345] kobject: 'kvm' (000000007c2cb009): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 186.087336][ T9342] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 186.098059][ T9345] list_del corruption. prev->next should be ffff8880961223f0, but was ffff88821b84ad50 [ 186.116611][ T9342] RSP: 0018:ffffc90004cf7c08 EFLAGS: 00010286 [ 186.116622][ T9342] RAX: 0000000000000054 RBX: ffff88808ffd5420 RCX: 0000000000000000 [ 186.116628][ T9342] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff5200099ef73 [ 186.116634][ T9342] RBP: ffffc90004cf7c20 R08: 0000000000000054 R09: fffffbfff165a7a6 [ 186.116640][ T9342] R10: fffffbfff165a7a5 R11: ffffffff8b2d3d2f R12: ffff88808ffd22d0 [ 186.116646][ T9342] R13: ffff88808ffd5520 R14: ffff88808ffd50f0 R15: ffff88808ffd50f0 [ 186.116656][ T9342] FS: 0000000001af2940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 186.116662][ T9342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 186.116668][ T9342] CR2: 0000000000625208 CR3: 000000009b2b8000 CR4: 00000000001426e0 [ 186.116683][ T9342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 186.126599][ T9345] ------------[ cut here ]------------ [ 186.132344][ T9342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 186.140294][ T9345] kernel BUG at lib/list_debug.c:51! [ 186.148240][ T9342] Call Trace: [ 186.225342][ T9342] __dentry_kill+0x1fd/0x600 [ 186.229914][ T9342] ? dput+0x38/0xe10 [ 186.233785][ T9342] ? dput+0x38/0xe10 [ 186.237657][ T9342] dput+0x62f/0xe10 [ 186.241444][ T9342] simple_recursive_removal+0x5bc/0x6d0 [ 186.246966][ T9342] ? debugfs_rename+0x7f0/0x7f0 [ 186.251831][ T9342] ? mntput+0x74/0xa0 [ 186.255790][ T9342] debugfs_remove+0x5e/0x80 [ 186.260270][ T9342] hid_debug_unregister+0x80/0x100 [ 186.265355][ T9342] hid_destroy_device+0xf2/0x150 [ 186.270266][ T9342] uhid_dev_destroy+0xaa/0x110 [ 186.275004][ T9342] uhid_char_release+0x54/0xc0 [ 186.279742][ T9342] __fput+0x2ff/0x890 [ 186.283699][ T9342] ? uhid_dev_destroy+0x110/0x110 [ 186.288696][ T9342] ____fput+0x16/0x20 [ 186.292655][ T9342] task_work_run+0x145/0x1c0 [ 186.297222][ T9342] exit_to_usermode_loop+0x316/0x380 [ 186.302483][ T9342] do_syscall_64+0x676/0x790 [ 186.307051][ T9342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.312934][ T9342] RIP: 0033:0x4143e1 [ 186.316808][ T9342] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 186.336390][ T9342] RSP: 002b:00007ffebf432c20 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 186.344793][ T9342] RAX: 0000000000000000 RBX: 000000000000000d RCX: 00000000004143e1 [ 186.352749][ T9342] RDX: 0000000000000000 RSI: 000000000000123a RDI: 000000000000000c [ 186.360743][ T9342] RBP: 0000000000000001 R08: 00000000a272d23a R09: 00000000a272d23e [ 186.368692][ T9342] R10: 00007ffebf432d00 R11: 0000000000000293 R12: 000000000075c9a0 [ 186.376641][ T9342] R13: 000000000075c9a0 R14: 0000000000762d70 R15: 000000000075c07c [ 186.384593][ T9342] Modules linked in: [ 186.388516][ T9345] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 186.390148][ T9342] ---[ end trace 14ac0f1003a20340 ]--- [ 186.394599][ T9345] CPU: 0 PID: 9345 Comm: syz-executor.4 Tainted: G D 5.5.0-rc1-next-20191211-syzkaller #0 [ 186.394605][ T9345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.394624][ T9345] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 186.394641][ T9345] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 186.400089][ T9342] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 186.411253][ T9345] RSP: 0018:ffffc90004d17c00 EFLAGS: 00010282 [ 186.411263][ T9345] RAX: 0000000000000054 RBX: ffff88821b847580 RCX: 0000000000000000 [ 186.411269][ T9345] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520009a2f72 [ 186.411277][ T9345] RBP: ffffc90004d17c18 R08: 0000000000000054 R09: fffffbfff1502171 [ 186.411289][ T9345] R10: fffffbfff1502170 R11: ffffffff8a810b87 R12: ffff8880963526b0 [ 186.421338][ T9342] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 186.427630][ T9345] R13: ffff88821b84ad50 R14: ffff8880961223f0 R15: ffff8880961223f0 [ 186.447228][ T9342] RSP: 0018:ffffc90004cf7c08 EFLAGS: 00010286 [ 186.453514][ T9345] FS: 0000000001aad940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 186.453522][ T9345] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 186.453533][ T9345] CR2: 0000001b2f82b000 CR3: 000000009c490000 CR4: 00000000001426f0 [ 186.459571][ T9342] RAX: 0000000000000054 RBX: ffff88808ffd5420 RCX: 0000000000000000 [ 186.467529][ T9345] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 186.467536][ T9345] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 186.467541][ T9345] Call Trace: [ 186.467566][ T9345] __dentry_kill+0x1fd/0x600 [ 186.475520][ T9342] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff5200099ef73 [ 186.483461][ T9345] ? dput+0x38/0xe10 [ 186.483479][ T9345] ? dput+0x38/0xe10 [ 186.491448][ T9342] RBP: ffffc90004cf7c20 R08: 0000000000000054 R09: fffffbfff165a7a6 [ 186.511057][ T9345] dput+0x62f/0xe10 [ 186.511075][ T9345] simple_recursive_removal+0x5bc/0x6d0 [ 186.511088][ T9345] ? debugfs_rename+0x7f0/0x7f0 [ 186.511109][ T9345] debugfs_remove+0x5e/0x80 [ 186.519070][ T9342] R10: fffffbfff165a7a5 R11: ffffffff8b2d3d2f R12: ffff88808ffd22d0 [ 186.525127][ T9345] kvm_put_kvm+0x136/0xcc0 [ 186.525142][ T9345] ? kvm_irqfd_release+0xe2/0x120 [ 186.525159][ T9345] ? kvm_irqfd_release+0xe2/0x120 [ 186.534075][ T9342] R13: ffff88808ffd5520 R14: ffff88808ffd50f0 R15: ffff88808ffd50f0 [ 186.540624][ T9345] kvm_vm_release+0x44/0x60 [ 186.540641][ T9345] __fput+0x2ff/0x890 [ 186.548601][ T9342] FS: 0000000001af2940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 186.556550][ T9345] ? kvm_dev_ioctl+0x17d0/0x17d0 [ 186.556562][ T9345] ____fput+0x16/0x20 [ 186.556580][ T9345] task_work_run+0x145/0x1c0 [ 186.564553][ T9342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 186.572497][ T9345] exit_to_usermode_loop+0x316/0x380 [ 186.572514][ T9345] do_syscall_64+0x676/0x790 [ 186.575769][ T9342] CR2: 0000000000625208 CR3: 000000009b2b8000 CR4: 00000000001426e0 [ 186.580352][ T9345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.580365][ T9345] RIP: 0033:0x4143e1 [ 186.588313][ T9342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 186.592181][ T9345] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 186.592188][ T9345] RSP: 002b:00007ffda50c7950 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 186.596066][ T9342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 186.604010][ T9345] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004143e1 [ 186.604017][ T9345] RDX: 0000000000000000 RSI: 000000000000123a RDI: 0000000000000008 [ 186.604024][ T9345] RBP: 0000000000000001 R08: 00000000a272d23a R09: 00000000a272d23e [ 186.604030][ T9345] R10: 00007ffda50c7a30 R11: 0000000000000293 R12: 000000000075c9a0 [ 186.604041][ T9345] R13: 000000000075c9a0 R14: 0000000000761a10 R15: 000000000075c07c [ 186.607822][ T9342] Kernel panic - not syncing: Fatal exception [ 186.613338][ T9345] Modules linked in: [ 186.812676][ T9342] Kernel Offset: disabled [ 186.817023][ T9342] Rebooting in 86400 seconds..