[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.780876][ T26] audit: type=1800 audit(1576064112.118:25): pid=8890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 66.802157][ T26] audit: type=1800 audit(1576064112.118:26): pid=8890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 66.847761][ T26] audit: type=1800 audit(1576064112.118:27): pid=8890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.0' (ECDSA) to the list of known hosts. 2019/12/11 11:35:22 fuzzer started 2019/12/11 11:35:24 dialing manager at 10.128.0.26:36101 2019/12/11 11:35:24 syscalls: 2696 2019/12/11 11:35:24 code coverage: enabled 2019/12/11 11:35:24 comparison tracing: enabled 2019/12/11 11:35:24 extra coverage: enabled 2019/12/11 11:35:24 setuid sandbox: enabled 2019/12/11 11:35:24 namespace sandbox: enabled 2019/12/11 11:35:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 11:35:24 fault injection: enabled 2019/12/11 11:35:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 11:35:24 net packet injection: enabled 2019/12/11 11:35:24 net device setup: enabled 2019/12/11 11:35:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 11:35:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 11:38:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000002c0)=""/169, 0xa9}, {0x0}], 0x2}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x800e00897) r7 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r7, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/11, 0xffffff7d}, {0x0}], 0x10000000000001da) shutdown(r4, 0x0) shutdown(r1, 0x0) 11:38:01 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001580)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0bc5351, &(0x7f0000000080)) syzkaller login: [ 236.685312][ T9055] IPVS: ftp: loaded support on port[0] = 21 [ 236.812357][ T9057] IPVS: ftp: loaded support on port[0] = 21 11:38:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_buf(r1, 0x0, 0x46, &(0x7f0000000040)="213a586076fd1f4b20fe1d8e", 0xc) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00459) [ 236.916867][ T9055] chnl_net:caif_netlink_parms(): no params data found [ 237.092686][ T9055] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.117791][ T9055] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.125625][ T9055] device bridge_slave_0 entered promiscuous mode [ 237.143621][ T9055] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.152720][ T9055] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.161254][ T9055] device bridge_slave_1 entered promiscuous mode [ 237.185729][ T9061] IPVS: ftp: loaded support on port[0] = 21 [ 237.194522][ T9057] chnl_net:caif_netlink_parms(): no params data found [ 237.212427][ T9055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.227403][ T9055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.266611][ T9055] team0: Port device team_slave_0 added [ 237.291747][ T9055] team0: Port device team_slave_1 added [ 237.310509][ T9057] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.318202][ T9057] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.326800][ T9057] device bridge_slave_0 entered promiscuous mode 11:38:02 executing program 3: poll(&(0x7f0000000040), 0x20000000000000fe, 0x50) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e00410) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r0, 0x0) [ 237.358529][ T9057] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.369004][ T9057] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.377105][ T9057] device bridge_slave_1 entered promiscuous mode [ 237.449665][ T9057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.511249][ T9055] device hsr_slave_0 entered promiscuous mode [ 237.568265][ T9055] device hsr_slave_1 entered promiscuous mode [ 237.622230][ T9057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:38:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x131) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)='q', 0x1) [ 237.675889][ T9063] IPVS: ftp: loaded support on port[0] = 21 [ 237.837029][ T9057] team0: Port device team_slave_0 added [ 237.874196][ T9057] team0: Port device team_slave_1 added [ 237.883838][ T9055] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 237.944640][ T9055] netdevsim netdevsim0 netdevsim1: renamed from eth1 11:38:03 executing program 5: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) [ 238.022665][ T9055] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 238.071320][ T9061] chnl_net:caif_netlink_parms(): no params data found [ 238.112331][ T9055] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 238.242003][ T9057] device hsr_slave_0 entered promiscuous mode [ 238.308219][ T9057] device hsr_slave_1 entered promiscuous mode [ 238.388057][ T9057] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.405299][ T9066] IPVS: ftp: loaded support on port[0] = 21 [ 238.461904][ T9068] IPVS: ftp: loaded support on port[0] = 21 [ 238.484599][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.491982][ T9061] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.500516][ T9061] device bridge_slave_0 entered promiscuous mode [ 238.512103][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.519667][ T9061] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.527519][ T9061] device bridge_slave_1 entered promiscuous mode [ 238.614503][ T9061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.639733][ T9061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.660448][ T9057] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 238.731275][ T9057] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 238.791436][ T9057] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 238.855096][ T9057] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 238.953378][ T9061] team0: Port device team_slave_0 added [ 238.962787][ T9061] team0: Port device team_slave_1 added [ 239.022260][ T9061] device hsr_slave_0 entered promiscuous mode [ 239.058145][ T9061] device hsr_slave_1 entered promiscuous mode [ 239.137849][ T9061] debugfs: Directory 'hsr0' with parent '/' already present! [ 239.190688][ T9063] chnl_net:caif_netlink_parms(): no params data found [ 239.279302][ T9063] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.286544][ T9063] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.294921][ T9063] device bridge_slave_0 entered promiscuous mode [ 239.302974][ T9063] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.310137][ T9063] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.318819][ T9063] device bridge_slave_1 entered promiscuous mode [ 239.343023][ T9066] chnl_net:caif_netlink_parms(): no params data found [ 239.351755][ T9061] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 239.422502][ T9061] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 239.504243][ T9061] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 239.549678][ T9061] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 239.657585][ T9063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.700402][ T9055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.711330][ T9063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.724747][ T9066] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.734481][ T9066] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.743322][ T9066] device bridge_slave_0 entered promiscuous mode [ 239.784025][ T9066] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.791822][ T9066] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.800176][ T9066] device bridge_slave_1 entered promiscuous mode [ 239.812686][ T9068] chnl_net:caif_netlink_parms(): no params data found [ 239.833973][ T9063] team0: Port device team_slave_0 added [ 239.865563][ T9063] team0: Port device team_slave_1 added [ 239.875056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.883740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.902944][ T9055] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.920391][ T9066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.949022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.957955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.966369][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.973685][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.982868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.995564][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.005457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.014099][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.021230][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.033323][ T9066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.058434][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.065619][ T9068] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.075267][ T9068] device bridge_slave_0 entered promiscuous mode [ 240.085772][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.092974][ T9068] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.100897][ T9068] device bridge_slave_1 entered promiscuous mode [ 240.160977][ T9063] device hsr_slave_0 entered promiscuous mode [ 240.201709][ T9063] device hsr_slave_1 entered promiscuous mode [ 240.257966][ T9063] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.288876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.297575][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.321787][ T9068] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.340979][ T9057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.349817][ T9066] team0: Port device team_slave_0 added [ 240.369155][ T9068] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.381924][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.390930][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.400377][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.420853][ T9066] team0: Port device team_slave_1 added [ 240.453931][ T9057] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.460952][ T9055] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 240.473128][ T9055] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.485785][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.494562][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.503618][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.512142][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.521337][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.530184][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.539085][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.546778][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.554831][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.575969][ T9061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.603315][ T9063] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 240.620960][ T9063] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 240.691271][ T9068] team0: Port device team_slave_0 added [ 240.698031][ T9063] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 240.741781][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.750791][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.760109][ T2966] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.767183][ T2966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.841077][ T9066] device hsr_slave_0 entered promiscuous mode [ 240.890228][ T9066] device hsr_slave_1 entered promiscuous mode [ 240.948295][ T9066] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.959863][ T9068] team0: Port device team_slave_1 added [ 240.967269][ T9063] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 241.009790][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.059603][ T9061] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.072917][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.083611][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.092555][ T9072] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.099862][ T9072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.107562][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.116319][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.124971][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.132780][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.140864][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.149835][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.159417][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.167118][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.175034][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.183847][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.192473][ T9072] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.199755][ T9072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.227073][ T9055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.250353][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.258774][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.266908][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.279743][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.295999][ T9057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 241.307195][ T9057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 241.370403][ T9068] device hsr_slave_0 entered promiscuous mode [ 241.418243][ T9068] device hsr_slave_1 entered promiscuous mode [ 241.447820][ T9068] debugfs: Directory 'hsr0' with parent '/' already present! [ 241.477532][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.491914][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.501225][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.510569][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.519460][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.531353][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.540278][ T9072] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.547336][ T9072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.555087][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.563901][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.574039][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.598266][ T9066] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 241.641047][ T9066] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 241.700079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.710337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.719369][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.729263][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.738922][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.755546][ T9066] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 241.837479][ T9057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.855451][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.865343][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.874100][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.883598][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.892301][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.900987][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.913834][ T9066] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 241.952192][ T9061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.980643][ T9063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.017552][ T9068] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 242.060748][ T9068] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 242.127602][ T9063] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.148722][ T9061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.162592][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.172334][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:38:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0xa) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 242.180912][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.192307][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.214595][ T9068] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 242.271878][ T9068] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 242.354965][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.365549][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.376191][ T9072] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.383802][ T9072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.393651][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.403096][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.412623][ T9072] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.419771][ T9072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.463438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.473713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.484778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.495147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 11:38:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0xa) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 242.513590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.555224][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.564178][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.575620][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.592533][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 11:38:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000001640)=0xc80, 0x4) [ 242.608556][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.653695][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.695209][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:38:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) [ 242.762720][ T9063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.922063][ T9066] 8021q: adding VLAN 0 to HW filter on device bond0 11:38:08 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) write(r0, 0x0, 0x0) [ 242.982350][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.001301][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.024490][ T9063] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.046982][ T9066] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.086212][ T9068] 8021q: adding VLAN 0 to HW filter on device bond0 11:38:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000280)=""/186) [ 243.115798][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.129533][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.180335][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.197589][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.206468][ T9069] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.213670][ T9069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.232561][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.243567][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.281022][ T9068] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.301441][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.310643][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.319865][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.336302][ T9080] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.343504][ T9080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.352559][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.361701][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.370746][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.381153][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.390107][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.400196][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:38:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180), 0x0, r0) r1 = add_key(0x0, &(0x7f0000000080)={'\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) r3 = openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000cab000)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ece5361470bf3ea669ad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1cfa600a8713bc8380001459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffafbc90f59e51f3c97a8728bf67e946ec1000037e907d4ee63c55916768d72a67fb888108744339e535a893509d12bacd34b8a9e2af58c0000"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) [ 243.428468][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.438332][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.447057][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.456587][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.465608][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.496365][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.515956][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.536543][ T9080] bridge0: port 1(bridge_slave_0) entered blocking state 11:38:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000f61000), 0x3ffffffffffff07, 0x2040, 0x0) [ 243.543848][ T9080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.560151][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.569309][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.580141][ T9080] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.588464][ T9080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.599751][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.627651][ C1] hrtimer: interrupt took 61549 ns [ 243.682292][ T9134] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.710970][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.721202][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.774146][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.792985][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.805787][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.823571][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.836205][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.856239][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.877230][ T9068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 243.900703][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:38:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)) 11:38:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000f61000), 0x3ffffffffffff07, 0x2040, 0x0) [ 243.945386][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.992199][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.030796][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.064522][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.092790][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.151433][ T9066] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.204894][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.225701][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.277082][ T9068] 8021q: adding VLAN 0 to HW filter on device batadv0 11:38:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) read(r0, &(0x7f00000001c0)=""/39, 0x27) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 11:38:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180), 0x0, r0) r1 = add_key(0x0, &(0x7f0000000080)={'\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) r3 = openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000cab000)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ece5361470bf3ea669ad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1cfa600a8713bc8380001459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffafbc90f59e51f3c97a8728bf67e946ec1000037e907d4ee63c55916768d72a67fb888108744339e535a893509d12bacd34b8a9e2af58c0000"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 11:38:09 executing program 0: ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) open$dir(0x0, 0x8000000000006000, 0x0) dup(0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x299000000, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000500)) read$usbmon(0xffffffffffffffff, &(0x7f0000000d40)=""/133, 0x85) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x182) sendfile(r1, r1, 0x0, 0x24000000) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000300)="6a3518b0aeba5d9f23921f4868c88c2051a5153e57d911e667182d7bf5036eaf63b6f35f02579b4a84ddbd7b93b1633886190efb994bc6c028d28dcc26f65ae799da605b16ffe600a8e7ffbd33d776f18c39a36bd133c4e76f0fa54fa1c778842dfff6f7feb2bdfcb910", 0x6a, 0x100}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f0000000400)="b0ce7e95a03813c3a103144918271e4263ac1fe8dd3dff74cdd53a39e86aa2f8dfd18e76ff921b0a063f337aeeee6c60f2d94f1314197c45879b22a81236ec77958175476f6a212930ef3c0f60713c18e751aa93d461e980b15c225bee2880ef54b716bcc39bce10491626b321c87e464c73ff7c0fa5649a90a885f47070c0b6dc336503ffd0a0d9aff79fa1ecab478fb3e86238a1b3c18418379a710f336c7d3344778e48065e3f08272b65822076fc0e39c4e1bfba9c25dd6c86037c96bdd435343a9cca", 0xc5, 0x1}, {&(0x7f0000000540), 0x0, 0xeb0}, {&(0x7f0000000640)="e97dcf101d7250fd5c243d5a069af8eb6e4218c1cad0f27c5bff8826edf083d754c33f521c26cee15122b7cf8b24c3170bb2d4c4d879480e41496336df81f62bd1fafd62c9144d12a2265d4949e8d4ffedbba77a2d3448c9289c833f9b507f1dd8852c9e2f57a59d63afea20b042d0b2e1a029c4461930dc9230d6434ef0259e86e5eb96463540ee2503cb014081c0f785716d3d92149079ba161b26b1f0769040baa8a6f5770648215749e7a547469a72ef296439e962aeda2f6a94e02f7d488656d4a3", 0xc4, 0x1000}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB='rodir,shortname=mixed(uni_xlate=0,shortnam', @ANYBLOB="0c00ebc30791520f15baa0886bf3423b5c38fcc23f7f65f3beac1334dd82c1641b8d552e46506f4ec04e900c58764fe4cfbeeae86d1447a842e91b3fb261fbbe4854ed91bfc91e67d955cb7e86c5089fc9fa5b0eb7f3ec247b58eeb1d500000000000000000000000000000000fa7c325effa374cea52089d4ebe28d30fcb4c7f46977bf9af907f63903b68fec8349045211d22c0a92dc9aa346ed28fc5cc6a4437c254ceebaaac5339a1fc9b37b2d30c2c4f25fe8e492f9c16dbcba09b6310ff44f96c465e2ffa382edef78da0a4db0460bc1462d"]) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000740)=[{&(0x7f00000003c0)}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000500)="5fc050c1dda003e704ff0f2d802436199d6e61a6d0510b86ea33c2c956", 0x1d, 0x9}, {&(0x7f0000000540), 0x0, 0xeb0}, {&(0x7f0000000640)="e97dcf101d7250fd5c243d5a069af8eb6e4218c1cad0f27c5bff8826edf083d754c33f521c26cee15122b7cf8b24c3170bb2d4c4d879480e41496336df81f62bd1fafd62c9144d12a2265d4949e8d4ffedbba77a2d3448c9289c833f9b507f1dd8852c9e2f57a59d63afea20b042d0b2e1a029c4461930dc9230d6434ef0259e86e5eb96463540ee2503cb014081c0f785716d3d92149079ba161b26b1f0769040baa8a6f5770648215749e7a547469a72ef296439e962aeda2f6a94e02f7d488656d4a30c6321", 0xc7, 0x1000}], 0x40002, &(0x7f00000008c0)=ANY=[@ANYBLOB="726f6400000080000000006e616d653d6d4a78656428756e695f786c6174653d302c73686f72746e61543de9c3222312622c6e6f6e7d61026c3d302cc801000000000000653d6c6f7765722c657569643ecf46b8368272648fc12a6aae1afa2473526f5117d6b9f6b63faae22f3a19fb13952207d173354238ee49f29fc5f14551c4bb8bc69630c076b08e5c824d43efd8d58e879762dce61e263e363602f867ddf871631d2caea265196b9747729d49f05c4098e698b0c85bfbc381c809a6dcb9247d63", @ANYRESDEC, @ANYBLOB="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"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) [ 244.808702][ T9171] FAT-fs (loop0): Unrecognized mount option "shortname=mixed(uni_xlate=0" or missing value [ 244.919737][ T9179] FAT-fs (loop0): Unrecognized mount option "shortname=mixed(uni_xlate=0" or missing value 11:38:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0xa) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:38:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(r0, 0x0, 0x0, 0x0) 11:38:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) 11:38:10 executing program 2: pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_procfs(0x0, &(0x7f0000272000)) 11:38:10 executing program 0: ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) open$dir(0x0, 0x8000000000006000, 0x0) dup(0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x299000000, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000500)) read$usbmon(0xffffffffffffffff, &(0x7f0000000d40)=""/133, 0x85) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x182) sendfile(r1, r1, 0x0, 0x24000000) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000300)="6a3518b0aeba5d9f23921f4868c88c2051a5153e57d911e667182d7bf5036eaf63b6f35f02579b4a84ddbd7b93b1633886190efb994bc6c028d28dcc26f65ae799da605b16ffe600a8e7ffbd33d776f18c39a36bd133c4e76f0fa54fa1c778842dfff6f7feb2bdfcb910", 0x6a, 0x100}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f0000000400)="b0ce7e95a03813c3a103144918271e4263ac1fe8dd3dff74cdd53a39e86aa2f8dfd18e76ff921b0a063f337aeeee6c60f2d94f1314197c45879b22a81236ec77958175476f6a212930ef3c0f60713c18e751aa93d461e980b15c225bee2880ef54b716bcc39bce10491626b321c87e464c73ff7c0fa5649a90a885f47070c0b6dc336503ffd0a0d9aff79fa1ecab478fb3e86238a1b3c18418379a710f336c7d3344778e48065e3f08272b65822076fc0e39c4e1bfba9c25dd6c86037c96bdd435343a9cca", 0xc5, 0x1}, {&(0x7f0000000540), 0x0, 0xeb0}, {&(0x7f0000000640)="e97dcf101d7250fd5c243d5a069af8eb6e4218c1cad0f27c5bff8826edf083d754c33f521c26cee15122b7cf8b24c3170bb2d4c4d879480e41496336df81f62bd1fafd62c9144d12a2265d4949e8d4ffedbba77a2d3448c9289c833f9b507f1dd8852c9e2f57a59d63afea20b042d0b2e1a029c4461930dc9230d6434ef0259e86e5eb96463540ee2503cb014081c0f785716d3d92149079ba161b26b1f0769040baa8a6f5770648215749e7a547469a72ef296439e962aeda2f6a94e02f7d488656d4a3", 0xc4, 0x1000}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB='rodir,shortname=mixed(uni_xlate=0,shortnam', @ANYBLOB="0c00ebc30791520f15baa0886bf3423b5c38fcc23f7f65f3beac1334dd82c1641b8d552e46506f4ec04e900c58764fe4cfbeeae86d1447a842e91b3fb261fbbe4854ed91bfc91e67d955cb7e86c5089fc9fa5b0eb7f3ec247b58eeb1d500000000000000000000000000000000fa7c325effa374cea52089d4ebe28d30fcb4c7f46977bf9af907f63903b68fec8349045211d22c0a92dc9aa346ed28fc5cc6a4437c254ceebaaac5339a1fc9b37b2d30c2c4f25fe8e492f9c16dbcba09b6310ff44f96c465e2ffa382edef78da0a4db0460bc1462d"]) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000740)=[{&(0x7f00000003c0)}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000500)="5fc050c1dda003e704ff0f2d802436199d6e61a6d0510b86ea33c2c956", 0x1d, 0x9}, {&(0x7f0000000540), 0x0, 0xeb0}, {&(0x7f0000000640)="e97dcf101d7250fd5c243d5a069af8eb6e4218c1cad0f27c5bff8826edf083d754c33f521c26cee15122b7cf8b24c3170bb2d4c4d879480e41496336df81f62bd1fafd62c9144d12a2265d4949e8d4ffedbba77a2d3448c9289c833f9b507f1dd8852c9e2f57a59d63afea20b042d0b2e1a029c4461930dc9230d6434ef0259e86e5eb96463540ee2503cb014081c0f785716d3d92149079ba161b26b1f0769040baa8a6f5770648215749e7a547469a72ef296439e962aeda2f6a94e02f7d488656d4a30c6321", 0xc7, 0x1000}], 0x40002, &(0x7f00000008c0)=ANY=[@ANYBLOB="726f6400000080000000006e616d653d6d4a78656428756e695f786c6174653d302c73686f72746e61543de9c3222312622c6e6f6e7d61026c3d302cc801000000000000653d6c6f7765722c657569643ecf46b8368272648fc12a6aae1afa2473526f5117d6b9f6b63faae22f3a19fb13952207d173354238ee49f29fc5f14551c4bb8bc69630c076b08e5c824d43efd8d58e879762dce61e263e363602f867ddf871631d2caea265196b9747729d49f05c4098e698b0c85bfbc381c809a6dcb9247d63", @ANYRESDEC, @ANYBLOB="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"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) 11:38:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) read(r0, &(0x7f00000001c0)=""/39, 0x27) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 11:38:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) [ 245.789145][ T9194] FAT-fs (loop0): Unrecognized mount option "shortname=mixed(uni_xlate=0" or missing value [ 245.868884][ T9212] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 11:38:11 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x0, 0x0) 11:38:11 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) openat$vcs(0xffffffffffffff9c, 0x0, 0x80400, 0x0) pipe2(&(0x7f0000000000), 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x6c00, &(0x7f0000000140)={&(0x7f0000001080)=ANY=[@ANYBLOB="740000002400f30700000000ddffffff00000000", @ANYRES32, @ANYBLOB="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"], 0x74}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0xa, 0x1000000000000, &(0x7f0000000100)=[{&(0x7f0000000040)="e588da94b522c2d1f313702948718f407fe7166ac45a790cd2065b44582f3310fb003cb29f9afc1ddb6272a61982d91403b9914e7638a71eab73d729de3c717034a0069e9ed7d8d5fa1979ad04faed8aeb63cac0ab9a4d2927d53b44ef0f6eb8b357570586780d116f40c92841c5a3d72ac31d7abedde3433aa57b7fefb2a6e25f68b39642e8ed4cba1d481661ba"}, {&(0x7f0000000600)="a175aecfc133f10e8096d588d507cb2369905aafe9156c60719627564d1f5841ed3912a4b4d6372b4d52111e6d26ae638675c823527d292fb9cfb0691358daaeed278a87b98817f0efa445e1e8110540b7979829311002818ea4bfa43e186dbdf71f761f261789a4e4063b30213fc8674cff946703b49ecc157cd063ec3bf08b8f75365561ef81b12e6d77479cb6fba9e4a0e862fe0729da03403caa9b02aff1a185885195"}], 0xe, &(0x7f0000000100)}], 0x126618d46e7cf97, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:38:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) add_key(0x0, &(0x7f0000000080)={'\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180), 0x0, 0x0) keyctl$revoke(0x3, 0x0) r0 = add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000740)="4b5a4d7649510a842be9429459f5e88f8c92ea174997512b427f1ef7f383b7c00b94be20e28ffabc1c50b170e075d33854311247eace69684e775022a7c625737a943e19090aed5067978c7245434642f3a27910e8db4e131096a06316f898019446d8b408b90ea70e5fe628b83ccf8a6d7ce392ec98b41f6ed8e45d9ab94b0696d66e48655adb379f0bc8a4cd76cdf3a7f36bd25de432150c3428857499a48ae1515a438d804a71b29bb0b96380d5a43f0b38d57b50af2f7fac0f3c502779a3893a", 0xc2, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0x0, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getresuid(0x0, &(0x7f0000000480), 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) setregid(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', 0x0) setregid(0x0, 0x0) getgroups(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ece5361470bf3ea669ad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1cfa600a8713bc8380001459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffafbc90f59e51f3c97a8728bf67e946ec1000037e907d4ee63c55916768d72a67fb888108744339e535a893509d12bacd34b8a9e"], 0xaf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 11:38:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) [ 246.340746][ T2607] blk_update_request: I/O error, dev loop11, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 246.355302][ T9229] isofs_fill_super: bread failed, dev=loop11, iso_blknum=16, block=32 11:38:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) 11:38:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0xa) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:38:14 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x0, 0x0) 11:38:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) add_key(0x0, &(0x7f0000000080)={'\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180), 0x0, 0x0) keyctl$revoke(0x3, 0x0) r0 = add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000740)="4b5a4d7649510a842be9429459f5e88f8c92ea174997512b427f1ef7f383b7c00b94be20e28ffabc1c50b170e075d33854311247eace69684e775022a7c625737a943e19090aed5067978c7245434642f3a27910e8db4e131096a06316f898019446d8b408b90ea70e5fe628b83ccf8a6d7ce392ec98b41f6ed8e45d9ab94b0696d66e48655adb379f0bc8a4cd76cdf3a7f36bd25de432150c3428857499a48ae1515a438d804a71b29bb0b96380d5a43f0b38d57b50af2f7fac0f3c502779a3893a", 0xc2, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0x0, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getresuid(0x0, &(0x7f0000000480), 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) setregid(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) stat(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', 0x0) setregid(0x0, 0x0) getgroups(0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ece5361470bf3ea669ad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1cfa600a8713bc8380001459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffafbc90f59e51f3c97a8728bf67e946ec1000037e907d4ee63c55916768d72a67fb888108744339e535a893509d12bacd34b8a9e"], 0xaf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 11:38:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 11:38:14 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f00000000c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000280)="3980e4", 0x3}], 0x1}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000003c0), &(0x7f0000000400)=0x4) msgget$private(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) preadv(r3, &(0x7f00000008c0)=[{0x0}, {0x0}, {&(0x7f0000000640)=""/187, 0xbb}, {&(0x7f0000000700)=""/89, 0x59}, {&(0x7f0000000780)=""/127, 0x7f}, {&(0x7f0000000800)=""/177, 0xb1}], 0x6, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, 0x0, 0x0) [ 248.786548][ T2607] blk_update_request: I/O error, dev loop11, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 248.803081][ T9261] isofs_fill_super: bread failed, dev=loop11, iso_blknum=16, block=32 11:38:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) 11:38:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0), 0x0, 0x80092, 0x0, 0x0) 11:38:14 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) msgget$private(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x0) 11:38:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 11:38:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 11:38:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sync_file_range(r0, 0x0, 0x0, 0x0) 11:38:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000000000001000000000000000000000000000cba3e6cc3f8000000000000000400000000000000080000000092e4e13503f13e1000000008200000001000010000000000100000000000006c0b4a402000100001000000000000000206c", 0x67}], 0x0, 0x0) [ 249.843880][ T9080] BUG: unable to handle page fault for address: fffff52002c80000 [ 249.851767][ T9080] #PF: supervisor read access in kernel mode [ 249.857755][ T9080] #PF: error_code(0x0000) - not-present page [ 249.863752][ T9080] PGD 21ffee067 P4D 21ffee067 PUD aa51c067 PMD 5ca24067 PTE 0 [ 249.871273][ T9080] Oops: 0000 [#1] PREEMPT SMP KASAN [ 249.876562][ T9080] CPU: 1 PID: 9080 Comm: kworker/1:4 Not tainted 5.5.0-rc1-syzkaller #0 [ 249.885000][ T9080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.895331][ T9080] Workqueue: xfs-buf/loop4 xfs_buf_ioend_work [ 249.901463][ T9080] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 249.907175][ T9080] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 249.926882][ T9080] RSP: 0018:ffffc90004757af0 EFLAGS: 00010a06 [ 249.933000][ T9080] RAX: dffffc0000000000 RBX: 1ffff920008eaf61 RCX: ffffffff82ad2f66 [ 249.941160][ T9080] RDX: 1ffff92002c80000 RSI: ffffffff82a9f88b RDI: ffff88808dfa0a60 [ 249.949120][ T9080] RBP: ffffc90004757cd0 R08: ffff88805ab30000 R09: ffffed1015d2703d [ 249.957081][ T9080] R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff88808dfa0940 [ 249.965180][ T9080] R13: ffffc90016400000 R14: ffffc90004757ca8 R15: ffff88808e860000 [ 249.973147][ T9080] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 249.982061][ T9080] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 249.988671][ T9080] CR2: fffff52002c80000 CR3: 000000005fdee000 CR4: 00000000001406e0 [ 249.996643][ T9080] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 250.004701][ T9080] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 250.012676][ T9080] Call Trace: [ 250.016235][ T9080] ? xfs_sb_write_verify+0x470/0x470 [ 250.021576][ T9080] ? __kasan_check_read+0x11/0x20 [ 250.026598][ T9080] ? mark_lock+0xc2/0x1220 [ 250.031002][ T9080] ? __kasan_check_read+0x11/0x20 [ 250.036012][ T9080] ? __lock_acquire+0x16f2/0x4a00 [ 250.041260][ T9080] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 250.047666][ T9080] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 250.053198][ T9080] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 250.059170][ T9080] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 250.065318][ T9080] xfs_buf_ioend+0x3f9/0xde0 [ 250.070086][ T9080] ? trace_hardirqs_on+0x67/0x240 [ 250.075160][ T9080] xfs_buf_ioend_work+0x19/0x20 [ 250.080051][ T9080] process_one_work+0x9af/0x1740 [ 250.085007][ T9080] ? pwq_dec_nr_in_flight+0x320/0x320 [ 250.090612][ T9080] ? lock_acquire+0x190/0x410 [ 250.095331][ T9080] worker_thread+0x98/0xe40 [ 250.099842][ T9080] ? trace_hardirqs_on+0x67/0x240 [ 250.104922][ T9080] kthread+0x361/0x430 [ 250.108992][ T9080] ? process_one_work+0x1740/0x1740 [ 250.114183][ T9080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 250.120133][ T9080] ret_from_fork+0x24/0x30 [ 250.124535][ T9080] Modules linked in: [ 250.128418][ T9080] CR2: fffff52002c80000 [ 250.132567][ T9080] ---[ end trace 7ce46c31591ce966 ]--- [ 250.138023][ T9080] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 250.143890][ T9080] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 250.164679][ T9080] RSP: 0018:ffffc90004757af0 EFLAGS: 00010a06 [ 250.171446][ T9080] RAX: dffffc0000000000 RBX: 1ffff920008eaf61 RCX: ffffffff82ad2f66 [ 250.179431][ T9080] RDX: 1ffff92002c80000 RSI: ffffffff82a9f88b RDI: ffff88808dfa0a60 [ 250.187410][ T9080] RBP: ffffc90004757cd0 R08: ffff88805ab30000 R09: ffffed1015d2703d [ 250.195407][ T9080] R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff88808dfa0940 [ 250.203401][ T9080] R13: ffffc90016400000 R14: ffffc90004757ca8 R15: ffff88808e860000 [ 250.211363][ T9080] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 250.220279][ T9080] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 250.226861][ T9080] CR2: fffff52002c80000 CR3: 000000005fdee000 CR4: 00000000001406e0 [ 250.234861][ T9080] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 250.243040][ T9080] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 250.251213][ T9080] Kernel panic - not syncing: Fatal exception [ 250.258894][ T9080] Kernel Offset: disabled [ 250.263228][ T9080] Rebooting in 86400 seconds..