Warning: Permanently added '10.128.1.27' (ECDSA) to the list of known hosts. 2019/10/14 16:50:05 fuzzer started 2019/10/14 16:50:07 dialing manager at 10.128.0.105:43961 2019/10/14 16:50:07 syscalls: 2523 2019/10/14 16:50:07 code coverage: enabled 2019/10/14 16:50:07 comparison tracing: enabled 2019/10/14 16:50:07 extra coverage: extra coverage is not supported by the kernel 2019/10/14 16:50:07 setuid sandbox: enabled 2019/10/14 16:50:07 namespace sandbox: enabled 2019/10/14 16:50:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/14 16:50:07 fault injection: enabled 2019/10/14 16:50:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/14 16:50:07 net packet injection: enabled 2019/10/14 16:50:07 net device setup: enabled 2019/10/14 16:50:07 concurrency sanitizer: enabled 16:50:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) syzkaller login: [ 53.190116][ T7245] IPVS: ftp: loaded support on port[0] = 21 16:50:11 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) [ 53.281028][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 53.326851][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.335145][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.343426][ T7245] device bridge_slave_0 entered promiscuous mode [ 53.352057][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.359924][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.369654][ T7245] device bridge_slave_1 entered promiscuous mode [ 53.392446][ T7245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.403263][ T7245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.428688][ T7245] team0: Port device team_slave_0 added [ 53.437660][ T7245] team0: Port device team_slave_1 added [ 53.542376][ T7245] device hsr_slave_0 entered promiscuous mode 16:50:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@commit={'commit'}}]}) [ 53.639023][ T7245] device hsr_slave_1 entered promiscuous mode [ 53.686871][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.687443][ T7248] IPVS: ftp: loaded support on port[0] = 21 [ 53.694003][ T7245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.694183][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.714294][ T7245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.853515][ T7245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.880061][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.889650][ T2938] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.906676][ T2938] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.920888][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 53.949041][ T7245] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.989183][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 16:50:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') [ 54.000776][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.007984][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.037876][ T7253] IPVS: ftp: loaded support on port[0] = 21 [ 54.054227][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.063826][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.071049][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.090036][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.120982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.130094][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.140459][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.149346][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.168948][ T7245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.177031][ T7248] chnl_net:caif_netlink_parms(): no params data found [ 54.231820][ T7245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.301606][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.318470][ T7248] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.326626][ T7248] device bridge_slave_0 entered promiscuous mode [ 54.366483][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.388040][ T7248] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.396104][ T7248] device bridge_slave_1 entered promiscuous mode [ 54.469688][ T7248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.495587][ T7261] IPVS: ftp: loaded support on port[0] = 21 [ 54.503547][ T7253] chnl_net:caif_netlink_parms(): no params data found 16:50:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x22}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 54.555773][ T7248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.653815][ T7248] team0: Port device team_slave_0 added [ 54.677883][ T7253] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.694933][ T7253] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.719234][ T7253] device bridge_slave_0 entered promiscuous mode [ 54.729731][ T7248] team0: Port device team_slave_1 added [ 54.747330][ T7253] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.761955][ T7253] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.782425][ T7253] device bridge_slave_1 entered promiscuous mode 16:50:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) [ 54.911190][ T7248] device hsr_slave_0 entered promiscuous mode [ 54.968367][ T7248] device hsr_slave_1 entered promiscuous mode 16:50:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) [ 55.038042][ T7248] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.047601][ T7253] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.072413][ T7253] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.114139][ T7273] IPVS: ftp: loaded support on port[0] = 21 16:50:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) [ 55.158310][ T7253] team0: Port device team_slave_0 added [ 55.165475][ T7253] team0: Port device team_slave_1 added [ 55.261126][ T7253] device hsr_slave_0 entered promiscuous mode 16:50:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) 16:50:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r2 = socket(0xa, 0x4000000001, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={r5, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r7, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="01007d1d3438fc0a06ce79511bd29ff7f50080f20000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000440)={r9, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1000}}, 0x80000000, 0x20, 0xffffffff, 0x101, 0x10}, 0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r9, 0x1}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x88, 0x0}, 0x600, 0x0, 'lblcr\x00'}, 0x2c) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f00000015c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000300)={r12, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r13, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r14, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r11, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x2, {0xa, 0x4e24, 0xee, @rand_addr="ca6e6b915bbe87b2debb00", 0x40}, r14}}, 0x38) ioctl$TIOCLINUX4(r11, 0x541c, &(0x7f0000000140)) add_key$user(0x0, 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 55.328448][ T7253] device hsr_slave_1 entered promiscuous mode [ 55.367987][ T7253] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.456356][ T7248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.512526][ T7248] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.526537][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.535902][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.550661][ C1] hrtimer: interrupt took 53839 ns [ 55.608387][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.617150][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.629495][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.636589][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.645270][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.654156][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.665137][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.672295][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.682718][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.692320][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.706270][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.727800][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.765495][ T7289] IPVS: ftp: loaded support on port[0] = 21 [ 55.776480][ T7261] chnl_net:caif_netlink_parms(): no params data found [ 55.804688][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.813247][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.825192][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.834589][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.847737][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.857104][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.872125][ T7253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.904193][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.914431][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.933475][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.957841][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.969342][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.981287][ T7253] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.014619][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.022033][ T7261] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.030528][ T7261] device bridge_slave_0 entered promiscuous mode 16:50:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r2 = socket(0xa, 0x4000000001, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={r5, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r7, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="01007d1d3438fc0a06ce79511bd29ff7f50080f20000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000440)={r9, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1000}}, 0x80000000, 0x20, 0xffffffff, 0x101, 0x10}, 0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r9, 0x1}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x88, 0x0}, 0x600, 0x0, 'lblcr\x00'}, 0x2c) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f00000015c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000300)={r12, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r13, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r14, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r11, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x2, {0xa, 0x4e24, 0xee, @rand_addr="ca6e6b915bbe87b2debb00", 0x40}, r14}}, 0x38) ioctl$TIOCLINUX4(r11, 0x541c, &(0x7f0000000140)) add_key$user(0x0, 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 56.071990][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.088425][ T7261] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.109132][ T7261] device bridge_slave_1 entered promiscuous mode [ 56.119351][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.128381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.137087][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.144175][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.165633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.174665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.183290][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.191069][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.203715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.213703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.223309][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.232649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.244908][ T7248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.274779][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.286865][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.304023][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.319541][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.333924][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.346118][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.361719][ T7273] chnl_net:caif_netlink_parms(): no params data found [ 56.387225][ T7253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.408639][ T7253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.434611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.462081][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.473743][ T7261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.543138][ T7261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:50:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r2 = socket(0xa, 0x4000000001, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={r5, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r7, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="01007d1d3438fc0a06ce79511bd29ff7f50080f20000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000440)={r9, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1000}}, 0x80000000, 0x20, 0xffffffff, 0x101, 0x10}, 0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r9, 0x1}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x88, 0x0}, 0x600, 0x0, 'lblcr\x00'}, 0x2c) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f00000015c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000300)={r12, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r13, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r14, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r11, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x2, {0xa, 0x4e24, 0xee, @rand_addr="ca6e6b915bbe87b2debb00", 0x40}, r14}}, 0x38) ioctl$TIOCLINUX4(r11, 0x541c, &(0x7f0000000140)) add_key$user(0x0, 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 56.588256][ T7253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.708810][ T7261] team0: Port device team_slave_0 added [ 56.714709][ T7273] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.737172][ T7273] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.756161][ T7273] device bridge_slave_0 entered promiscuous mode [ 56.767268][ T7273] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.775506][ T7273] bridge0: port 2(bridge_slave_1) entered disabled state 16:50:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) [ 56.801775][ T7273] device bridge_slave_1 entered promiscuous mode [ 56.835072][ T7261] team0: Port device team_slave_1 added [ 56.898771][ T7289] chnl_net:caif_netlink_parms(): no params data found [ 56.946626][ T7273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.974875][ T7273] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.091166][ T7261] device hsr_slave_0 entered promiscuous mode 16:50:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) [ 57.138440][ T7261] device hsr_slave_1 entered promiscuous mode [ 57.178410][ T7261] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.201127][ T7332] gfs2: commit mount option requires a positive numeric argument [ 57.252881][ T7332] gfs2: can't parse mount arguments [ 57.269877][ T7289] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.284976][ T7289] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.302195][ T7289] device bridge_slave_0 entered promiscuous mode [ 57.325257][ T7273] team0: Port device team_slave_0 added [ 57.345259][ T7273] team0: Port device team_slave_1 added [ 57.356691][ T7332] gfs2: commit mount option requires a positive numeric argument [ 57.393399][ T7289] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.398525][ T7332] gfs2: can't parse mount arguments [ 57.407881][ T7289] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.430764][ T7289] device bridge_slave_1 entered promiscuous mode 16:50:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@commit={'commit'}}]}) [ 57.570947][ T7273] device hsr_slave_0 entered promiscuous mode [ 57.618290][ T7273] device hsr_slave_1 entered promiscuous mode [ 57.657999][ T7273] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.680915][ T7289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.703866][ T7289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.771680][ T7289] team0: Port device team_slave_0 added [ 57.783822][ T7261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.814380][ T7289] team0: Port device team_slave_1 added [ 57.818237][ T7348] gfs2: commit mount option requires a positive numeric argument [ 57.834254][ T7348] gfs2: can't parse mount arguments [ 57.859370][ T7273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.911067][ T7289] device hsr_slave_0 entered promiscuous mode [ 57.949034][ T7289] device hsr_slave_1 entered promiscuous mode [ 57.988031][ T7289] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.006197][ T7261] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.018875][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.027335][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.039541][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.047407][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.058652][ T7273] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.066146][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.074974][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.083735][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.090928][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.112719][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.121002][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.130080][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.138799][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.146110][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.154545][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.163697][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.172951][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.181712][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.190631][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.199298][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.207669][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.214751][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.222916][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.231458][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.256420][ T7261] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.267282][ T7261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.281595][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.290636][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.299771][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.308755][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.317121][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.324224][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.332866][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.352697][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.362312][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.370837][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.379807][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.388814][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.398115][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.406501][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.414961][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.423679][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.438227][ T7273] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.449135][ T7273] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.461793][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.469859][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.478418][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.486856][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.495784][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.505536][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.532163][ T7261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.553650][ T7273] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.567200][ T7289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.586344][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.599820][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.613823][ T7289] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.630319][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.646677][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.655975][ T2938] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.663050][ T2938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.671598][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.736740][ T7289] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.792095][ T7289] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.823174][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:50:17 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') [ 58.834670][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.847329][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.854440][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.862959][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.872301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.881796][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.890915][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.900309][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.909365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.918608][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.927160][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.936394][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.945088][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.954431][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.963358][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.991031][ T7289] 8021q: adding VLAN 0 to HW filter on device batadv0 16:50:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x22}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 16:50:17 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r2 = socket(0xa, 0x4000000001, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={r5, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r7, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="01007d1d3438fc0a06ce79511bd29ff7f50080f20000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000440)={r9, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1000}}, 0x80000000, 0x20, 0xffffffff, 0x101, 0x10}, 0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r9, 0x1}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x88, 0x0}, 0x600, 0x0, 'lblcr\x00'}, 0x2c) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f00000015c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000300)={r12, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r13, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r14, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r11, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x2, {0xa, 0x4e24, 0xee, @rand_addr="ca6e6b915bbe87b2debb00", 0x40}, r14}}, 0x38) ioctl$TIOCLINUX4(r11, 0x541c, &(0x7f0000000140)) add_key$user(0x0, 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:50:17 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) 16:50:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@commit={'commit'}}]}) [ 59.181394][ T7381] gfs2: commit mount option requires a positive numeric argument [ 59.231431][ T7381] gfs2: can't parse mount arguments 16:50:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) 16:50:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@commit={'commit'}}]}) 16:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x22}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 59.890154][ T7410] gfs2: commit mount option requires a positive numeric argument 16:50:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') [ 59.967782][ T7410] gfs2: can't parse mount arguments 16:50:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x22}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 16:50:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2230031, 0x0) 16:50:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) 16:50:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) 16:50:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) 16:50:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0/file0\x00') 16:50:19 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0xfe73, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$ipvs(0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) [ 61.651104][ T7253] ================================================================== [ 61.659233][ T7253] BUG: KCSAN: data-race in ext4_free_inode / find_next_zero_bit [ 61.667011][ T7253] [ 61.669355][ T7253] read to 0xffff8881220cc010 of 8 bytes by task 7482 on cpu 1: [ 61.677162][ T7253] find_next_zero_bit+0x9b/0xe0 [ 61.682107][ T7253] find_inode_bit.isra.0+0x82/0x300 [ 61.687380][ T7253] __ext4_new_inode+0xd4b/0x3070 [ 61.692305][ T7253] ext4_symlink+0x30e/0x970 [ 61.696791][ T7253] vfs_symlink+0x218/0x310 [ 61.701193][ T7253] do_symlinkat+0x1a5/0x1e0 [ 61.705681][ T7253] __x64_sys_symlink+0x3f/0x50 [ 61.710440][ T7253] do_syscall_64+0xcf/0x2f0 [ 61.714932][ T7253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.720798][ T7253] [ 61.723128][ T7253] write to 0xffff8881220cc010 of 8 bytes by task 7253 on cpu 0: [ 61.730830][ T7253] ext4_free_inode+0x9f2/0xaa0 [ 61.735577][ T7253] ext4_evict_inode+0x9a9/0xdb0 [ 61.740504][ T7253] evict+0x244/0x410 [ 61.744391][ T7253] iput+0x362/0x4a0 [ 61.748279][ T7253] dentry_unlink_inode+0x27a/0x2f0 [ 61.753386][ T7253] d_delete+0xdb/0xe0 [ 61.757367][ T7253] vfs_rmdir+0x2e2/0x300 [ 61.761594][ T7253] do_rmdir+0x2cb/0x300 [ 61.765731][ T7253] __x64_sys_rmdir+0x2f/0x40 [ 61.770398][ T7253] do_syscall_64+0xcf/0x2f0 [ 61.774895][ T7253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.780769][ T7253] [ 61.783076][ T7253] Reported by Kernel Concurrency Sanitizer on: [ 61.789241][ T7253] CPU: 0 PID: 7253 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 61.796789][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.806841][ T7253] ================================================================== [ 61.814885][ T7253] Kernel panic - not syncing: panic_on_warn set ... [ 61.821460][ T7253] CPU: 0 PID: 7253 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 61.828895][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.838947][ T7253] Call Trace: [ 61.842228][ T7253] dump_stack+0xf5/0x159 [ 61.846474][ T7253] panic+0x209/0x639 [ 61.850361][ T7253] ? do_syscall_64+0xcf/0x2f0 [ 61.855103][ T7253] ? vprintk_func+0x8d/0x140 [ 61.859707][ T7253] kcsan_report.cold+0xc/0x1b [ 61.864384][ T7253] __kcsan_setup_watchpoint+0x3ee/0x510 [ 61.869939][ T7253] ext4_free_inode+0x9f2/0xaa0 [ 61.874842][ T7253] ext4_evict_inode+0x9a9/0xdb0 [ 61.879739][ T7253] ? ext4_da_write_begin+0x7e0/0x7e0 [ 61.885015][ T7253] evict+0x244/0x410 [ 61.888915][ T7253] iput+0x362/0x4a0 [ 61.892734][ T7253] dentry_unlink_inode+0x27a/0x2f0 [ 61.897837][ T7253] d_delete+0xdb/0xe0 [ 61.901824][ T7253] vfs_rmdir+0x2e2/0x300 [ 61.906059][ T7253] do_rmdir+0x2cb/0x300 [ 61.910400][ T7253] __x64_sys_rmdir+0x2f/0x40 [ 61.915425][ T7253] do_syscall_64+0xcf/0x2f0 [ 61.919963][ T7253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.925863][ T7253] RIP: 0033:0x4597c7 [ 61.929766][ T7253] Code: 00 66 90 b8 57 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 54 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.949380][ T7253] RSP: 002b:00007fffec9dbcd8 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 [ 61.957780][ T7253] RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 00000000004597c7 [ 61.965754][ T7253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fffec9dce70 [ 61.973905][ T7253] RBP: 000000000000000f R08: 0000000000000000 R09: 0000000000000001 [ 61.981879][ T7253] R10: 0000000000000005 R11: 0000000000000207 R12: 00007fffec9dce70 [ 61.989833][ T7253] R13: 0000555556946980 R14: 0000000000000000 R15: 00007fffec9ddf00 [ 61.999360][ T7253] Kernel Offset: disabled [ 62.003692][ T7253] Rebooting in 86400 seconds..