[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.433281][ T26] audit: type=1800 audit(1566892959.156:25): pid=8463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.477957][ T26] audit: type=1800 audit(1566892959.156:26): pid=8463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.517327][ T26] audit: type=1800 audit(1566892959.166:27): pid=8463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.42' (ECDSA) to the list of known hosts. 2019/08/27 08:02:50 fuzzer started 2019/08/27 08:02:53 dialing manager at 10.128.0.26:45029 2019/08/27 08:02:54 syscalls: 2487 2019/08/27 08:02:54 code coverage: enabled 2019/08/27 08:02:54 comparison tracing: enabled 2019/08/27 08:02:54 extra coverage: extra coverage is not supported by the kernel 2019/08/27 08:02:54 setuid sandbox: enabled 2019/08/27 08:02:54 namespace sandbox: enabled 2019/08/27 08:02:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/27 08:02:54 fault injection: enabled 2019/08/27 08:02:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/27 08:02:54 net packet injection: enabled 2019/08/27 08:02:54 net device setup: enabled 08:05:07 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xcf04ee3e220a4be, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() fstat(r1, 0x0) fadvise64(r0, 0x0, 0x5, 0x5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmget(0x3, 0xa000, 0x80, &(0x7f0000ff6000/0xa000)=nil) shmget$private(0x0, 0x1000, 0xfa0c9ae17f377ff7, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) readlink(0x0, 0x0, 0xffdd) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x6, 0x4000000ff, 0x20000000007}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x800000000000012, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfd}, 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:05:08 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) syzkaller login: [ 204.466798][ T8627] IPVS: ftp: loaded support on port[0] = 21 [ 204.543412][ T8629] IPVS: ftp: loaded support on port[0] = 21 08:05:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) [ 204.692385][ T8627] chnl_net:caif_netlink_parms(): no params data found [ 204.748374][ T8629] chnl_net:caif_netlink_parms(): no params data found [ 204.779990][ T8627] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.798838][ T8627] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.806996][ T8627] device bridge_slave_0 entered promiscuous mode [ 204.837271][ T8627] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.846508][ T8627] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.855940][ T8627] device bridge_slave_1 entered promiscuous mode [ 204.883015][ T8627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.885498][ T8633] IPVS: ftp: loaded support on port[0] = 21 [ 204.902983][ T8627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.975004][ T8627] team0: Port device team_slave_0 added [ 204.981049][ T8629] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.988591][ T8629] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.996585][ T8629] device bridge_slave_0 entered promiscuous mode [ 205.010570][ T8627] team0: Port device team_slave_1 added 08:05:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bridge0\x00', @ifru_hwaddr=@random="0e40767003a1"}) [ 205.032423][ T8629] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.040303][ T8629] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.050733][ T8629] device bridge_slave_1 entered promiscuous mode [ 205.120903][ T8627] device hsr_slave_0 entered promiscuous mode [ 205.170192][ T8627] device hsr_slave_1 entered promiscuous mode 08:05:09 executing program 4: r0 = gettid() clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, r1+30000000}, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000014) [ 205.289473][ T8629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.305031][ T8636] IPVS: ftp: loaded support on port[0] = 21 [ 205.320974][ T8627] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.328237][ T8627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.336101][ T8627] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.343255][ T8627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.405126][ T8629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.450571][ T8633] chnl_net:caif_netlink_parms(): no params data found [ 205.463737][ T8629] team0: Port device team_slave_0 added [ 205.472342][ T8629] team0: Port device team_slave_1 added [ 205.507372][ T8639] IPVS: ftp: loaded support on port[0] = 21 08:05:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000001c0)='posix_acl_access*selfvmnet0\\mime_type:\xe1mime_typevboxnet0]\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x80000004a, 0x0, &(0x7f0000001000)) [ 205.612390][ T8629] device hsr_slave_0 entered promiscuous mode [ 205.658042][ T8629] device hsr_slave_1 entered promiscuous mode [ 205.708156][ T8629] debugfs: Directory 'hsr0' with parent '/' already present! [ 205.741172][ T8641] IPVS: ftp: loaded support on port[0] = 21 [ 205.749449][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.757712][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.777148][ T8633] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.784756][ T8633] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.792985][ T8633] device bridge_slave_0 entered promiscuous mode [ 205.822549][ T8633] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.830402][ T8633] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.838382][ T8633] device bridge_slave_1 entered promiscuous mode [ 205.903425][ T8633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.938255][ T8633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.976775][ T8636] chnl_net:caif_netlink_parms(): no params data found [ 205.988968][ T8627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.007037][ T8627] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.023590][ T8633] team0: Port device team_slave_0 added [ 206.031786][ T8633] team0: Port device team_slave_1 added [ 206.040431][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.048959][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.081499][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.091647][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.100240][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.107259][ T8634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.114860][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.124009][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.132394][ T8634] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.139434][ T8634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.186851][ T8636] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.194434][ T8636] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.202634][ T8636] device bridge_slave_0 entered promiscuous mode [ 206.210177][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.271997][ T8636] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.279244][ T8636] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.286878][ T8636] device bridge_slave_1 entered promiscuous mode [ 206.351226][ T8633] device hsr_slave_0 entered promiscuous mode [ 206.388231][ T8633] device hsr_slave_1 entered promiscuous mode [ 206.447957][ T8633] debugfs: Directory 'hsr0' with parent '/' already present! [ 206.459340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.474335][ T8641] chnl_net:caif_netlink_parms(): no params data found [ 206.486622][ T8636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.502262][ T8636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.512014][ T8639] chnl_net:caif_netlink_parms(): no params data found [ 206.554731][ T8629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.567613][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.579388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.600733][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.610091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.619308][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.664896][ T8636] team0: Port device team_slave_0 added [ 206.671431][ T8639] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.679572][ T8639] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.687180][ T8639] device bridge_slave_0 entered promiscuous mode [ 206.699513][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.711449][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.720129][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.728033][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.736167][ T8641] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.747124][ T8641] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.755203][ T8641] device bridge_slave_0 entered promiscuous mode [ 206.763308][ T8641] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.770406][ T8641] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.778402][ T8641] device bridge_slave_1 entered promiscuous mode [ 206.791715][ T8636] team0: Port device team_slave_1 added [ 206.803491][ T8639] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.813622][ T8639] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.822019][ T8639] device bridge_slave_1 entered promiscuous mode [ 206.845079][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.853657][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.869016][ T8641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.894393][ T8639] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.908332][ T8629] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.916300][ T8639] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.933311][ T8641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 207.011152][ T8636] device hsr_slave_0 entered promiscuous mode [ 207.068312][ T8636] device hsr_slave_1 entered promiscuous mode [ 207.107919][ T8636] debugfs: Directory 'hsr0' with parent '/' already present! [ 207.131159][ T8633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.143325][ T8641] team0: Port device team_slave_0 added [ 207.152422][ T8627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.161381][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.173092][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.181965][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.189160][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.196940][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.205937][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.214323][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.221372][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.229798][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.259007][ T8633] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.266756][ T8639] team0: Port device team_slave_0 added [ 207.274074][ T8641] team0: Port device team_slave_1 added [ 207.289287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.297124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.306693][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.315318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.324167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.332117][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.340171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.359996][ T8639] team0: Port device team_slave_1 added [ 207.377612][ T8627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.388364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.397086][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.405998][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.414916][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.424639][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.431744][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.439683][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.448460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.456598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.465267][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.473784][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.480867][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.488563][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.496814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.505207][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.536648][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.580143][ T8641] device hsr_slave_0 entered promiscuous mode [ 207.608549][ T8641] device hsr_slave_1 entered promiscuous mode [ 207.658141][ T8641] debugfs: Directory 'hsr0' with parent '/' already present! [ 207.719961][ T8639] device hsr_slave_0 entered promiscuous mode [ 207.769736][ T8639] device hsr_slave_1 entered promiscuous mode [ 207.818305][ T8639] debugfs: Directory 'hsr0' with parent '/' already present! [ 207.852889][ T8633] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 207.863775][ T8633] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.881298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.891012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.899868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.909211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.917538][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.926510][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.935135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.943880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.952555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.961136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.969425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.977148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.005883][ T8629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.059970][ T8633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.084104][ T8636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.149002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.156965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.170102][ T8636] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.197021][ C1] hrtimer: interrupt took 25916 ns [ 208.216637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.226434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.237439][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.244558][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.275723][ T8641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.291120][ T8639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.293137][ T8657] fuse: Bad value for 'subtype' [ 208.359623][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.367643][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.382514][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.401295][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.408432][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.416605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.425758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.434940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.444249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.459379][ T8672] fuse: Bad value for 'subtype' [ 208.467180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.489240][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.498502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.506931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.523895][ T8641] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.543642][ T8636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 208.594942][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 208.594956][ T26] audit: type=1804 audit(1566893112.306:31): pid=8666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir446516516/syzkaller.eL3V9N/0/memory.events" dev="sda1" ino=16522 res=1 [ 208.629272][ T8636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.637394][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.647062][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.664098][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.675540][ T26] audit: type=1800 audit(1566893112.366:32): pid=8666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16522 res=0 08:05:12 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xcf04ee3e220a4be, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() fstat(r1, 0x0) fadvise64(r0, 0x0, 0x5, 0x5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmget(0x3, 0xa000, 0x80, &(0x7f0000ff6000/0xa000)=nil) shmget$private(0x0, 0x1000, 0xfa0c9ae17f377ff7, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) readlink(0x0, 0x0, 0xffdd) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x6, 0x4000000ff, 0x20000000007}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x800000000000012, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfd}, 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:05:12 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xcf04ee3e220a4be, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() fstat(r1, 0x0) fadvise64(r0, 0x0, 0x5, 0x5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmget(0x3, 0xa000, 0x80, &(0x7f0000ff6000/0xa000)=nil) shmget$private(0x0, 0x1000, 0xfa0c9ae17f377ff7, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) readlink(0x0, 0x0, 0xffdd) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x6, 0x4000000ff, 0x20000000007}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x800000000000012, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfd}, 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 208.717316][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.739329][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.747723][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.801021][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.819243][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.828413][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.837037][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.844132][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.856640][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.874485][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.883225][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.890341][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.898003][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.907434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.917013][ T8639] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.922342][ T8692] fuse: Bad value for 'subtype' [ 208.931359][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.944373][ T8693] fuse: Bad value for 'subtype' 08:05:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) [ 209.004427][ T8641] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 209.043729][ T8641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 08:05:12 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xcf04ee3e220a4be, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() fstat(r1, 0x0) fadvise64(r0, 0x0, 0x5, 0x5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmget(0x3, 0xa000, 0x80, &(0x7f0000ff6000/0xa000)=nil) shmget$private(0x0, 0x1000, 0xfa0c9ae17f377ff7, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) readlink(0x0, 0x0, 0xffdd) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x6, 0x4000000ff, 0x20000000007}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x800000000000012, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfd}, 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 209.064285][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.072958][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.082006][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.100527][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.111500][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.118643][ T8634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.126851][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.136701][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.145614][ T8634] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.152710][ T8634] bridge0: port 2(bridge_slave_1) entered forwarding state 08:05:12 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xcf04ee3e220a4be, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() fstat(r1, 0x0) fadvise64(r0, 0x0, 0x5, 0x5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmget(0x3, 0xa000, 0x80, &(0x7f0000ff6000/0xa000)=nil) shmget$private(0x0, 0x1000, 0xfa0c9ae17f377ff7, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) readlink(0x0, 0x0, 0xffdd) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x6, 0x4000000ff, 0x20000000007}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x800000000000012, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfd}, 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 209.163300][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.172522][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.184857][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.205745][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.216608][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.240719][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.256164][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.267659][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.276807][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.285670][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.299926][ T8636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.322766][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.331874][ T8709] fuse: Bad value for 'subtype' [ 209.338949][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:05:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000200)=ANY=[]) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 209.364325][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.375976][ T8703] fuse: Bad value for 'subtype' [ 209.378686][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.395843][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.412181][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.456608][ T8641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.492685][ T3771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 08:05:13 executing program 0: r0 = gettid() getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c784512634c060cfb6b72c3c922835d2b5fe1600c22afc34984842ae37ab5045cb487813885e8f91b9605000000afe849ea9853c8d9e91b9c2643c120b9b0a292476e34309c522fce639eccfc2945538a59098348819f04cec733094dab9e723c"], 0x70) msgctl$IPC_SET(0x0, 0x1, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@null=' \x00', 0x4, 'ip6erspan0\x00'}) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000000)=0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 209.495475][ T8714] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 209.504004][ T3771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.540113][ T3771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.549426][ T3771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 08:05:13 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0xc0505405, &(0x7f0000000240)) [ 209.605597][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.706609][ T8639] 8021q: adding VLAN 0 to HW filter on device batadv0 08:05:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, {{0x0, 0x7, 0x0, r1}}}, 0x28) msgget(0x1, 0x100010210) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) [ 209.851303][ T8733] bridge0: mtu greater than device maximum [ 209.859454][ T8728] kvm: emulating exchange as write 08:05:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="200000001a00230200000066835f7f081c140200000000000000000004001e00", 0x20) 08:05:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0), 0x0, 0x1400}], 0x0, 0x0) 08:05:14 executing program 0: r0 = gettid() getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c784512634c060cfb6b72c3c922835d2b5fe1600c22afc34984842ae37ab5045cb487813885e8f91b9605000000afe849ea9853c8d9e91b9c2643c120b9b0a292476e34309c522fce639eccfc2945538a59098348819f04cec733094dab9e723c"], 0x70) msgctl$IPC_SET(0x0, 0x1, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@null=' \x00', 0x4, 'ip6erspan0\x00'}) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000000)=0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:05:14 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000002c0)=@file={0x0, './file1/file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) lstat(0x0, &(0x7f00000006c0)) fstat(r0, &(0x7f0000000740)) r1 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, 0x0) getgroups(0x2, &(0x7f0000001b80)=[0xffffffffffffffff, 0xee01]) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) lstat(&(0x7f0000001e40)='./file1\x00', 0x0) stat(0x0, 0x0) getresgid(&(0x7f0000002140), 0x0, &(0x7f0000000080)) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getuid() r7 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000002580)) stat(&(0x7f0000002640)='./file1\x00', 0x0) fstat(r0, 0x0) gettid() lstat(0x0, 0x0) fstat(r0, &(0x7f0000002840)) getgroups(0x1, &(0x7f0000002980)=[0xffffffffffffffff]) sendmmsg$unix(r0, &(0x7f0000002a80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="dd2e49fc0162e654632307174ec1e214587e81e3ca2c98bf010cbce4b562bb29a29298313a504f0910bece69ca9383786383e723107aab8fbc8a31d146d1eb839b7ea8863f815125d6b4394719aa5b74f1c30001d194c23c4b37f436e52c8110bbf6a490899f01547b8070112dcd28e603063a8468d2923fef8600ee0beb37ab461c45303bba0a534a61a9c1eea4cb289e78baab87dc9719", 0x98}, {&(0x7f0000000280)="3402d86e97a831d8bacd57346508be", 0xf}, {0x0}], 0x6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000002299df7d893f0adfe20755eb07112fde1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0000000001000000000000000100000002000000f46b35fffc42e110c9ad656230595265279dd55c08d5a4191e22b21219a87f00b78f5837606a686a9ef67e5bca1dc88dec977e9238e5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000ff7f00000100000002000000705e580e4d843c6329d39eb2a5fa594fc8ad99b0abb116ab44b727a96d1ecc746b73304b0a8305fdf16e31c74f2e7a1783950cd8bd2b9ffdc6c1312ac404088b2e5ced0012f6a58673f403078e831bdfaa3f38574409132655daf8", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00410496"], 0x191}], 0x1, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 08:05:14 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000480)) 08:05:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 211.080700][ T8770] Unknown ioctl 21545 08:05:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, 0x0, &(0x7f00000009c0)) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x6cd) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file2\x00') 08:05:15 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 08:05:15 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0xfdfdffff, 0x200000022d}) 08:05:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) [ 211.376407][ T8770] Unknown ioctl 21545 [ 211.385368][ T8791] overlayfs: filesystem on './file0' not supported as upperdir [ 211.418886][ T8780] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 211.430118][ T8793] fuse: Bad value for 'subtype' [ 211.439049][ T8780] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 08:05:15 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000002c0)=@file={0x0, './file1/file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) lstat(0x0, &(0x7f00000006c0)) fstat(r0, &(0x7f0000000740)) r1 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, 0x0) getgroups(0x2, &(0x7f0000001b80)=[0xffffffffffffffff, 0xee01]) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) lstat(&(0x7f0000001e40)='./file1\x00', 0x0) stat(0x0, 0x0) getresgid(&(0x7f0000002140), 0x0, &(0x7f0000000080)) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getuid() r7 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000002580)) stat(&(0x7f0000002640)='./file1\x00', 0x0) fstat(r0, 0x0) gettid() lstat(0x0, 0x0) fstat(r0, &(0x7f0000002840)) getgroups(0x1, &(0x7f0000002980)=[0xffffffffffffffff]) sendmmsg$unix(r0, &(0x7f0000002a80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="dd2e49fc0162e654632307174ec1e214587e81e3ca2c98bf010cbce4b562bb29a29298313a504f0910bece69ca9383786383e723107aab8fbc8a31d146d1eb839b7ea8863f815125d6b4394719aa5b74f1c30001d194c23c4b37f436e52c8110bbf6a490899f01547b8070112dcd28e603063a8468d2923fef8600ee0beb37ab461c45303bba0a534a61a9c1eea4cb289e78baab87dc9719", 0x98}, {&(0x7f0000000280)="3402d86e97a831d8bacd57346508be", 0xf}, {0x0}], 0x6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000002299df7d893f0adfe20755eb07112fde1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0000000001000000000000000100000002000000f46b35fffc42e110c9ad656230595265279dd55c08d5a4191e22b21219a87f00b78f5837606a686a9ef67e5bca1dc88dec977e9238e5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000ff7f00000100000002000000705e580e4d843c6329d39eb2a5fa594fc8ad99b0abb116ab44b727a96d1ecc746b73304b0a8305fdf16e31c74f2e7a1783950cd8bd2b9ffdc6c1312ac404088b2e5ced0012f6a58673f403078e831bdfaa3f38574409132655daf8", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00410496"], 0x191}], 0x1, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) [ 211.464422][ T8780] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 211.483375][ T8780] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 211.488329][ T8799] fuse: Bad value for 'subtype' 08:05:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@mcast1, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@mcast1, @rand_addr="e4e19a5c10c9332dc4b500fa97eeb441", @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x400}) 08:05:15 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) [ 211.758092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 211.758144][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 211.764478][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 211.770222][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 211.789190][ T8810] Unknown ioctl 21545 [ 211.861308][ T8810] overlayfs: conflicting lowerdir path [ 211.930816][ T8814] device nr0 entered promiscuous mode [ 212.156324][ T8819] device nr0 entered promiscuous mode 08:05:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002f80), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000004000), 0x1000) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', '/dev/fuse\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000580)={0x78, 0x0, 0x2}, 0x78) 08:05:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_channels={0x3c}}) 08:05:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:17 executing program 2: ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x8000000000008006, 0x0) 08:05:17 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000002c0)=@file={0x0, './file1/file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) lstat(0x0, &(0x7f00000006c0)) fstat(r0, &(0x7f0000000740)) r1 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, 0x0) getgroups(0x2, &(0x7f0000001b80)=[0xffffffffffffffff, 0xee01]) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) lstat(&(0x7f0000001e40)='./file1\x00', 0x0) stat(0x0, 0x0) getresgid(&(0x7f0000002140), 0x0, &(0x7f0000000080)) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getuid() r7 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000002580)) stat(&(0x7f0000002640)='./file1\x00', 0x0) fstat(r0, 0x0) gettid() lstat(0x0, 0x0) fstat(r0, &(0x7f0000002840)) getgroups(0x1, &(0x7f0000002980)=[0xffffffffffffffff]) sendmmsg$unix(r0, &(0x7f0000002a80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="dd2e49fc0162e654632307174ec1e214587e81e3ca2c98bf010cbce4b562bb29a29298313a504f0910bece69ca9383786383e723107aab8fbc8a31d146d1eb839b7ea8863f815125d6b4394719aa5b74f1c30001d194c23c4b37f436e52c8110bbf6a490899f01547b8070112dcd28e603063a8468d2923fef8600ee0beb37ab461c45303bba0a534a61a9c1eea4cb289e78baab87dc9719", 0x98}, {&(0x7f0000000280)="3402d86e97a831d8bacd57346508be", 0xf}, {0x0}], 0x6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000002299df7d893f0adfe20755eb07112fde1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0000000001000000000000000100000002000000f46b35fffc42e110c9ad656230595265279dd55c08d5a4191e22b21219a87f00b78f5837606a686a9ef67e5bca1dc88dec977e9238e5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000ff7f00000100000002000000705e580e4d843c6329d39eb2a5fa594fc8ad99b0abb116ab44b727a96d1ecc746b73304b0a8305fdf16e31c74f2e7a1783950cd8bd2b9ffdc6c1312ac404088b2e5ced0012f6a58673f403078e831bdfaa3f38574409132655daf8", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00410496"], 0x191}], 0x1, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 08:05:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) [ 214.145630][ T8833] Unknown ioctl 21545 08:05:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x3, 0x0, &(0x7f0000000040)) 08:05:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shutdown(r0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) [ 214.170427][ T8837] device nr0 entered promiscuous mode [ 214.178136][ T8836] fuse: Bad value for 'subtype' [ 214.200246][ T8839] fuse: Bad value for 'subtype' [ 214.237670][ T8833] overlayfs: conflicting lowerdir path 08:05:18 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x2, 0x2d, 0x3}) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB='z'], 0x8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000419, 0x810) unshare(0x0) dup(0xffffffffffffffff) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) 08:05:18 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000002c0)=@file={0x0, './file1/file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) lstat(0x0, &(0x7f00000006c0)) fstat(r0, &(0x7f0000000740)) r1 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, 0x0) getgroups(0x2, &(0x7f0000001b80)=[0xffffffffffffffff, 0xee01]) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) lstat(&(0x7f0000001e40)='./file1\x00', 0x0) stat(0x0, 0x0) getresgid(&(0x7f0000002140), 0x0, &(0x7f0000000080)) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getuid() r7 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000002580)) stat(&(0x7f0000002640)='./file1\x00', 0x0) fstat(r0, 0x0) gettid() lstat(0x0, 0x0) fstat(r0, &(0x7f0000002840)) getgroups(0x1, &(0x7f0000002980)=[0xffffffffffffffff]) sendmmsg$unix(r0, &(0x7f0000002a80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="dd2e49fc0162e654632307174ec1e214587e81e3ca2c98bf010cbce4b562bb29a29298313a504f0910bece69ca9383786383e723107aab8fbc8a31d146d1eb839b7ea8863f815125d6b4394719aa5b74f1c30001d194c23c4b37f436e52c8110bbf6a490899f01547b8070112dcd28e603063a8468d2923fef8600ee0beb37ab461c45303bba0a534a61a9c1eea4cb289e78baab87dc9719", 0x98}, {&(0x7f0000000280)="3402d86e97a831d8bacd57346508be", 0xf}, {0x0}], 0x6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000002299df7d893f0adfe20755eb07112fde1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0000000001000000000000000100000002000000f46b35fffc42e110c9ad656230595265279dd55c08d5a4191e22b21219a87f00b78f5837606a686a9ef67e5bca1dc88dec977e9238e5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000ff7f00000100000002000000705e580e4d843c6329d39eb2a5fa594fc8ad99b0abb116ab44b727a96d1ecc746b73304b0a8305fdf16e31c74f2e7a1783950cd8bd2b9ffdc6c1312ac404088b2e5ced0012f6a58673f403078e831bdfaa3f38574409132655daf8", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00410496"], 0x191}], 0x1, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 08:05:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x40, 0x82140) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) 08:05:18 executing program 2: pipe(&(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1500) [ 214.498536][ T8853] Unknown ioctl 21545 08:05:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x79}) 08:05:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x1, 0x1000, 0x0, 0x0, 0x2000000000000, 0x4, 0x0, 0x1, 0x4}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0x3ff, 0xf, 0x4, 0x20000000, {0x77359400}, {0x44204a8ed65832c1, 0x8, 0x7fff, 0x3, 0x800, 0x2, "481b27a0"}, 0x8, 0x1, @userptr=0x8, 0x4}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x4000) 08:05:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x6) 08:05:18 executing program 2: ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\b\x00\x06\xff', @ifru_names='bond_slave_1\x00\x00\x12\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x3, 0x2) 08:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 08:05:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000fc0)) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000900)={0x10000, 0x2, 0x0, "835521b143cddf143c6b1d800fa075309409179413a835b8c65d708949f73db16405fd47f2f109b8081d9efe2b2f9bd8f61b673bf9e93a068ee0650c", 0x0, "04bcebdb25f7908c119c5a69047f06fd9b86341703976ef17f213c558601b720ee6ec75f35256ffd387fa0715175b27637f97caef0c83f13c425c24f"}) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x8}}], 0x48}, 0x0) 08:05:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x3d, &(0x7f0000000140)={'mangle\x00'}, &(0x7f00000001c0)=0x54) [ 215.137298][ T8890] mmap: syz-executor.0 (8890) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:05:19 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000fc0)) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000900)={0x10000, 0x2, 0x0, "835521b143cddf143c6b1d800fa075309409179413a835b8c65d708949f73db16405fd47f2f109b8081d9efe2b2f9bd8f61b673bf9e93a068ee0650c", 0x0, "04bcebdb25f7908c119c5a69047f06fd9b86341703976ef17f213c558601b720ee6ec75f35256ffd387fa0715175b27637f97caef0c83f13c425c24f"}) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x8}}], 0x48}, 0x0) [ 215.263030][ T8883] bond0: (slave bond_slave_1): Releasing backup interface 08:05:19 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000480)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000280)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r3 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 08:05:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:05:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) geteuid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x80, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1000000000004006, 0x0) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000bc0)) [ 215.912479][ T26] audit: type=1800 audit(1566893119.626:33): pid=8919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16565 res=0 [ 216.649783][ T26] audit: type=1800 audit(1566893120.376:34): pid=8924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16565 res=0 [ 216.650236][ T8919] syz-executor.1 (8919) used greatest stack depth: 22984 bytes left 08:05:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) geteuid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x80, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1000000000004006, 0x0) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000bc0)) 08:05:20 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2842, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 216.904956][ T26] audit: type=1800 audit(1566893120.626:35): pid=8930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16565 res=0 08:05:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:21 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="3d2800006f0000040000000000000080000000000000000000000000000000f8ffabd85202c6cca0fb0700000000000021"], 0x40) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 217.614935][ T8942] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 217.642978][ T8942] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 217.677409][ T8942] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 217.741763][ T8942] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 08:05:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) select(0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x1, 0x101, 0x81, 0x973, 0x8000, 0x8}, &(0x7f0000000540)={0x77359400}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 08:05:21 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0x8008563f, 0x0) 08:05:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 08:05:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00()\x89\xe5\x14^W\x86\xa3\x14K|\x0e\xfe-\x9d\xbe\xca`\n\x1a', 0x275a, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080), 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80087601, &(0x7f0000000000)) 08:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000000)) 08:05:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) [ 218.000102][ T8629] [ 218.005181][ T8963] device nr0 entered promiscuous mode [ 218.011811][ T8629] ============================= [ 218.021382][ T8629] WARNING: suspicious RCU usage [ 218.038706][ T8629] 5.3.0-rc6-next-20190826 #73 Not tainted 08:05:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x10000000004, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 218.046896][ T8629] ----------------------------- [ 218.052360][ T8629] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 218.061238][ T8629] [ 218.061238][ T8629] other info that might help us debug this: [ 218.061238][ T8629] [ 218.075122][ T8629] [ 218.075122][ T8629] rcu_scheduler_active = 2, debug_locks = 1 [ 218.108867][ T8629] 1 lock held by syz-executor.1/8629: 08:05:21 executing program 0: setgroups(0x54b, &(0x7f0000000180)) [ 218.132520][ T8629] #0: ffff8880588f0498 (&type->s_umount_key#32){++++}, at: deactivate_super+0x1aa/0x1d0 [ 218.155695][ T8968] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns [ 218.205341][ T8629] [ 218.205341][ T8629] stack backtrace: [ 218.235984][ T8629] CPU: 0 PID: 8629 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190826 #73 [ 218.245025][ T8629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.255076][ T8629] Call Trace: [ 218.258361][ T8629] dump_stack+0x172/0x1f0 [ 218.258394][ T8629] lockdep_rcu_suspicious+0x153/0x15d [ 218.258414][ T8629] ext4_release_system_zone+0x166/0x1a0 [ 218.258427][ T8629] ext4_put_super+0x954/0xd70 [ 218.258442][ T8629] ? ext4_quota_write+0x5a0/0x5a0 [ 218.283397][ T8629] generic_shutdown_super+0x14c/0x370 [ 218.288778][ T8629] kill_block_super+0xa0/0x100 [ 218.293554][ T8629] deactivate_locked_super+0x95/0x100 [ 218.298931][ T8629] deactivate_super+0x1b2/0x1d0 [ 218.303787][ T8629] ? mount_bdev+0x3c0/0x3c0 [ 218.308292][ T8629] ? dput+0x38/0xe10 [ 218.312185][ T8629] ? dput+0x1f2/0xe10 [ 218.316275][ T8629] ? mnt_get_writers.isra.0+0xf9/0x150 [ 218.321745][ T8629] cleanup_mnt+0x351/0x4c0 [ 218.326158][ T8629] ? trace_hardirqs_on+0x67/0x240 [ 218.331174][ T8629] ? __kasan_check_read+0x11/0x20 [ 218.336195][ T8629] __cleanup_mnt+0x16/0x20 [ 218.340610][ T8629] task_work_run+0x145/0x1c0 [ 218.345211][ T8629] exit_to_usermode_loop+0x316/0x380 [ 218.350497][ T8629] do_syscall_64+0x65f/0x760 [ 218.355085][ T8629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.360968][ T8629] RIP: 0033:0x45c2a7 [ 218.364860][ T8629] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.384458][ T8629] RSP: 002b:00007ffda90c6c68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 218.392866][ T8629] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 08:05:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 08:05:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x10000000004, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 218.400839][ T8629] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffda90c6d10 [ 218.408801][ T8629] RBP: 0000000000000033 R08: 0000000000000000 R09: 000000000000000a [ 218.416767][ T8629] R10: 0000000000000005 R11: 0000000000000202 R12: 00007ffda90c7da0 [ 218.424729][ T8629] R13: 0000555556a11940 R14: 0000000000000000 R15: 00007ffda90c7da0 08:05:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100), &(0x7f0000000180)=0x8) pipe(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer2\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video35\x00', 0x2, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000540)) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, r0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000400)={0x2, 0x0, [{}, {0xb77, 0x0, 0x3e9}]}) [ 218.581221][ T8629] ------------[ cut here ]------------ [ 218.586718][ T8629] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 218.595769][ T8629] WARNING: CPU: 0 PID: 8629 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 218.605224][ T8629] Kernel panic - not syncing: panic_on_warn set ... [ 218.611816][ T8629] CPU: 0 PID: 8629 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190826 #73 [ 218.620830][ T8629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.631582][ T8629] Call Trace: [ 218.634882][ T8629] dump_stack+0x172/0x1f0 [ 218.639322][ T8629] ? debug_print_object+0x90/0x250 [ 218.644433][ T8629] panic+0x2dc/0x755 [ 218.648326][ T8629] ? add_taint.cold+0x16/0x16 [ 218.653010][ T8629] ? __kasan_check_write+0x14/0x20 [ 218.658126][ T8629] ? __warn.cold+0x14/0x3c [ 218.662542][ T8629] ? __warn+0xd9/0x1d0 [ 218.666621][ T8629] ? debug_print_object+0x168/0x250 [ 218.671819][ T8629] __warn.cold+0x2f/0x3c [ 218.676070][ T8629] ? debug_print_object+0x168/0x250 [ 218.681272][ T8629] report_bug+0x289/0x300 [ 218.685608][ T8629] do_error_trap+0x11b/0x200 [ 218.690204][ T8629] do_invalid_op+0x37/0x50 [ 218.694624][ T8629] ? debug_print_object+0x168/0x250 [ 218.699818][ T8629] invalid_op+0x23/0x30 [ 218.703953][ T8629] RIP: 0010:debug_print_object+0x168/0x250 [ 218.709741][ T8629] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 218.729325][ T8629] RSP: 0018:ffff8880866c7b80 EFLAGS: 00010086 [ 218.735370][ T8629] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 218.743318][ T8629] RDX: 0000000000000000 RSI: ffffffff815bd606 RDI: ffffed1010cd8f62 [ 218.751287][ T8629] RBP: ffff8880866c7bc0 R08: ffff88808b40a580 R09: ffffed1015d04109 [ 218.759238][ T8629] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 218.767186][ T8629] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff8880940792d8 [ 218.775160][ T8629] ? vprintk_func+0x86/0x189 [ 218.779746][ T8629] debug_check_no_obj_freed+0x2d4/0x43f [ 218.785267][ T8629] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 218.790792][ T8629] kfree+0xf8/0x2c0 [ 218.792043][ T8962] kobject: 'kvm' (00000000645fa42d): kobject_uevent_env [ 218.794585][ T8629] ext4_put_super+0x8e0/0xd70 [ 218.803255][ T8962] kobject: 'kvm' (00000000645fa42d): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 218.806187][ T8629] ? ext4_quota_write+0x5a0/0x5a0 [ 218.806206][ T8629] generic_shutdown_super+0x14c/0x370 [ 218.806223][ T8629] kill_block_super+0xa0/0x100 [ 218.806241][ T8629] deactivate_locked_super+0x95/0x100 [ 218.836390][ T8629] deactivate_super+0x1b2/0x1d0 [ 218.841239][ T8629] ? mount_bdev+0x3c0/0x3c0 [ 218.845721][ T8629] ? dput+0x38/0xe10 [ 218.849597][ T8629] ? dput+0x1f2/0xe10 [ 218.853558][ T8629] ? mnt_get_writers.isra.0+0xf9/0x150 [ 218.858998][ T8629] cleanup_mnt+0x351/0x4c0 [ 218.863391][ T8629] ? trace_hardirqs_on+0x67/0x240 [ 218.868392][ T8629] ? __kasan_check_read+0x11/0x20 [ 218.873403][ T8629] __cleanup_mnt+0x16/0x20 [ 218.877796][ T8629] task_work_run+0x145/0x1c0 [ 218.882372][ T8629] exit_to_usermode_loop+0x316/0x380 [ 218.887640][ T8629] do_syscall_64+0x65f/0x760 [ 218.892214][ T8629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.898091][ T8629] RIP: 0033:0x45c2a7 [ 218.901965][ T8629] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.922353][ T8629] RSP: 002b:00007ffda90c6c68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 218.930739][ T8629] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 218.938690][ T8629] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffda90c6d10 [ 218.946647][ T8629] RBP: 0000000000000033 R08: 0000000000000000 R09: 000000000000000a [ 218.954598][ T8629] R10: 0000000000000005 R11: 0000000000000202 R12: 00007ffda90c7da0 [ 218.962547][ T8629] R13: 0000555556a11940 R14: 0000000000000000 R15: 00007ffda90c7da0 [ 218.971762][ T8629] Kernel Offset: disabled [ 218.976151][ T8629] Rebooting in 86400 seconds..