[ 61.664656][ T26] audit: type=1800 audit(1574051927.706:25): pid=8921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.684547][ T26] audit: type=1800 audit(1574051927.706:26): pid=8921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.729696][ T26] audit: type=1800 audit(1574051927.716:27): pid=8921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 62.304345][ T8986] sshd (8986) used greatest stack depth: 22888 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2019/11/18 04:38:58 fuzzer started 2019/11/18 04:39:00 dialing manager at 10.128.0.26:44591 2019/11/18 04:39:00 syscalls: 2566 2019/11/18 04:39:00 code coverage: enabled 2019/11/18 04:39:00 comparison tracing: enabled 2019/11/18 04:39:00 extra coverage: enabled 2019/11/18 04:39:00 setuid sandbox: enabled 2019/11/18 04:39:00 namespace sandbox: enabled 2019/11/18 04:39:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/18 04:39:00 fault injection: enabled 2019/11/18 04:39:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/18 04:39:00 net packet injection: enabled 2019/11/18 04:39:00 net device setup: enabled 2019/11/18 04:39:00 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/18 04:39:00 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:41:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000340)=""/244) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000240)=']', 0x1}], 0x1, 0x0) 04:41:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000080)=0x6, 0x7) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syzkaller login: [ 229.971139][ T9090] IPVS: ftp: loaded support on port[0] = 21 04:41:36 executing program 2: sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="fe99"], 0x1}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 230.101954][ T9092] IPVS: ftp: loaded support on port[0] = 21 [ 230.179266][ T9090] chnl_net:caif_netlink_parms(): no params data found [ 230.295821][ T9090] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.305258][ T9090] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.314391][ T9090] device bridge_slave_0 entered promiscuous mode [ 230.347510][ T9090] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.355930][ T9090] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.371839][ T9090] device bridge_slave_1 entered promiscuous mode [ 230.417508][ T9092] chnl_net:caif_netlink_parms(): no params data found [ 230.448979][ T9096] IPVS: ftp: loaded support on port[0] = 21 [ 230.463376][ T9090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:41:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 230.517924][ T9090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.581974][ T9092] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.589161][ T9092] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.605285][ T9092] device bridge_slave_0 entered promiscuous mode [ 230.643806][ T9092] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.654821][ T9092] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.664184][ T9092] device bridge_slave_1 entered promiscuous mode [ 230.673467][ T9098] IPVS: ftp: loaded support on port[0] = 21 [ 230.684732][ T9090] team0: Port device team_slave_0 added [ 230.728356][ T9090] team0: Port device team_slave_1 added [ 230.756080][ T9092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.782969][ T9092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:41:36 executing program 4: socket$netlink(0x10, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d7030302e303030103030303030303038303032303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="0000083d00dd000000008e6b360190161942ff28be0afc50da2180fec97a0d0c4e22802f2b83dbe2678bb0c8c967d8a6e3e004687ce8da41ec033d7b56379cc48ec157719f12e8b8b8e4cbefd4c5f8c0ee763eb3a00f8b2d27911017b02d4733426ea3000027a74cd1cccda7319559a75499728d4dcb03f460f1c8aa7bfc7f7798778c3fe636a99e2cdc7be27e406a41682e85f50d54734110e7717bf166ef2c89e97be8342e0c40fb644c0ae6ec28a3b6ae77c9dcc14fd1a68eee93079a2fb7c016a619a6f835b32f36df15b0bd9b8fb09a1b274c40", @ANYRESDEC=0x0, @ANYBLOB]) fadvise64(r0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f00000003c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') [ 230.933294][ T9090] device hsr_slave_0 entered promiscuous mode [ 230.992117][ T9090] device hsr_slave_1 entered promiscuous mode [ 231.065859][ T9092] team0: Port device team_slave_0 added [ 231.083428][ T9101] IPVS: ftp: loaded support on port[0] = 21 04:41:37 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x4004092b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) [ 231.108481][ T9092] team0: Port device team_slave_1 added [ 231.146628][ T9096] chnl_net:caif_netlink_parms(): no params data found [ 231.223272][ T9092] device hsr_slave_0 entered promiscuous mode [ 231.279981][ T9092] device hsr_slave_1 entered promiscuous mode [ 231.339790][ T9092] debugfs: Directory 'hsr0' with parent '/' already present! [ 231.433587][ T9103] IPVS: ftp: loaded support on port[0] = 21 [ 231.452683][ T9090] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 231.513897][ T9090] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 231.577656][ T9090] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 231.633587][ T9090] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 231.700576][ T9098] chnl_net:caif_netlink_parms(): no params data found [ 231.713054][ T9096] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.720327][ T9096] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.728235][ T9096] device bridge_slave_0 entered promiscuous mode [ 231.777177][ T9096] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.785404][ T9096] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.793285][ T9096] device bridge_slave_1 entered promiscuous mode [ 231.807574][ T9092] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 231.862861][ T9092] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 231.922162][ T9092] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 231.995488][ T9092] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 232.038699][ T9098] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.045978][ T9098] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.053971][ T9098] device bridge_slave_0 entered promiscuous mode [ 232.064108][ T9096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.104689][ T9098] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.113105][ T9098] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.122885][ T9098] device bridge_slave_1 entered promiscuous mode [ 232.137954][ T9096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.210760][ T9096] team0: Port device team_slave_0 added [ 232.221159][ T9103] chnl_net:caif_netlink_parms(): no params data found [ 232.232896][ T9098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.256847][ T9096] team0: Port device team_slave_1 added [ 232.275583][ T9098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.297416][ T9101] chnl_net:caif_netlink_parms(): no params data found [ 232.372365][ T9096] device hsr_slave_0 entered promiscuous mode [ 232.421497][ T9096] device hsr_slave_1 entered promiscuous mode [ 232.489748][ T9096] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.536148][ T9101] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.543929][ T9101] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.554377][ T9101] device bridge_slave_0 entered promiscuous mode [ 232.564557][ T9098] team0: Port device team_slave_0 added [ 232.576777][ T9098] team0: Port device team_slave_1 added [ 232.593784][ T9101] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.602780][ T9101] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.611513][ T9101] device bridge_slave_1 entered promiscuous mode [ 232.633960][ T9103] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.642140][ T9103] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.650351][ T9103] device bridge_slave_0 entered promiscuous mode [ 232.658215][ T9103] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.665679][ T9103] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.673898][ T9103] device bridge_slave_1 entered promiscuous mode [ 232.743270][ T9098] device hsr_slave_0 entered promiscuous mode [ 232.790055][ T9098] device hsr_slave_1 entered promiscuous mode [ 232.879849][ T9098] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.926753][ T9101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.948875][ T9103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.971604][ T9103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.997093][ T9101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.015009][ T9096] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 233.055981][ T9096] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 233.107226][ T9096] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 233.175558][ T9103] team0: Port device team_slave_0 added [ 233.186177][ T9103] team0: Port device team_slave_1 added [ 233.203232][ T9101] team0: Port device team_slave_0 added [ 233.211024][ T9101] team0: Port device team_slave_1 added [ 233.222306][ T9092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.229404][ T9096] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 233.296933][ T9090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.349343][ T9092] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.356947][ T9098] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 233.426316][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.435144][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.443796][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.452109][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.501993][ T9103] device hsr_slave_0 entered promiscuous mode [ 233.560179][ T9103] device hsr_slave_1 entered promiscuous mode [ 233.599981][ T9103] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.619962][ T9090] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.664102][ T9101] device hsr_slave_0 entered promiscuous mode [ 233.740108][ T9101] device hsr_slave_1 entered promiscuous mode [ 233.789750][ T9101] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.800287][ T9098] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 233.841914][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.850915][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.859315][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.866567][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.874820][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.883945][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.892456][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.899499][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.908112][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.944034][ T9098] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 233.981086][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.989858][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.998196][ T9105] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.005279][ T9105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.013732][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.022547][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.032282][ T9105] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.039358][ T9105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.090432][ T9098] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 234.142671][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.151840][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.161043][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.170078][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.178652][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.188111][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.197263][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.205936][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.217624][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.226382][ T9103] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 234.287184][ T9103] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 234.358289][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.366964][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.375839][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.386076][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.394806][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.403781][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.412212][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.421292][ T9103] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 234.471472][ T9103] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 234.522227][ T9101] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 234.592853][ T9090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.604710][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.613974][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.623414][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.644351][ T9101] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 234.682993][ T9101] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 234.741606][ T9101] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 234.820031][ T9096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.856913][ T9090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.866116][ T9092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 234.877607][ T9092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.890053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.898345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.908129][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.916673][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.925599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.933115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.941012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.968094][ T9096] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.977703][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.986920][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.036838][ T9092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.058410][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.067825][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.076530][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.083612][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.099418][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.109049][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.117771][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.124887][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.133351][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.141297][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.150176][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.158842][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.201827][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.212020][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.221064][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.270774][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.286845][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.309316][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:41:41 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x8}, 0x10) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x220104) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl(r0, 0x8918, &(0x7f0000000000)) [ 235.333290][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.355862][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.380105][ T9101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.409292][ T9098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.421794][ T9119] IPVS: ftp: loaded support on port[0] = 21 [ 235.449152][ T9101] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.461694][ T9096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.474575][ T9096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.498384][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.507522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.516206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.525957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.536007][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.544928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.603384][ T9103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.615378][ T9098] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.634662][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.644721][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.653880][ T3109] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.661028][ T3109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.673103][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.682498][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.691535][ T3109] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.698684][ T3109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.707228][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.715806][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.724479][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.751938][ T9103] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.763991][ T9096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.788387][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.798709][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.810584][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.854321][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.864844][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.876200][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.886963][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.896274][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.906009][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.915075][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.924198][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.933517][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.942389][ T9109] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.949453][ T9109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.958327][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.967487][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.975992][ T9109] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.983086][ T9109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.991221][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.000310][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.008727][ T9109] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.015903][ T9109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.026874][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.035110][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.043433][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.064265][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.073769][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.083524][ T3109] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.090657][ T3109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.098642][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.108149][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.117246][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.141467][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.196998][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.221027][ T9120] IPVS: ftp: loaded support on port[0] = 21 [ 236.222068][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.248910][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.276089][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.296637][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.329520][ T9101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.342641][ T9125] loop2: p1 p2[EZD] p3 p4 [ 236.348031][ T9125] loop2: p1 size 2047 extends beyond EOD, truncated [ 236.393232][ T9125] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 236.395099][ T9103] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 236.413141][ T9125] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 236.418145][ T9103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.434785][ T9125] loop2: p4 size 32768 extends beyond EOD, truncated [ 236.463112][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.481391][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.496160][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.504964][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 04:41:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)=""/151, 0x6129cec2}], 0x1, &(0x7f00000001c0)=""/7, 0x10036}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 236.514479][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.523262][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.531194][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.538831][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.551359][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.560716][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.571801][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.581189][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.589720][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.598247][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.606872][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.615795][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.625226][ T3617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:41:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 236.742535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.780221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.788728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.823642][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.868296][ T9098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.896739][ T9103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.913359][ T9150] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 237.089164][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.107798][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:41:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0xfffffffffffffff4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f00000000c0), 0x4000676, 0x0) [ 237.142023][ T9098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.358695][ C0] hrtimer: interrupt took 74503 ns [ 237.438329][ T9169] fuse: Unknown parameter '0x0000000000000006' 04:41:43 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000040), 0x7, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x803, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "48fa09411def712d902f5004cff7a0fa2b3e6bea84278f39ab90c500da0bf211f87591351d3e104cd10787ac62ac70f16659993ef2e9e95189e6587acd26b8f3"}}, 0x80}}, 0x0) 04:41:43 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x349) move_pages(0x0, 0x2, &(0x7f00000001c0)=[&(0x7f0000007000/0x1000)=nil, &(0x7f0000002000/0x2000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000180), 0x0) [ 237.656275][ T9184] md0: error: failed to get bitmap file [ 237.668776][ T9174] fuse: Unknown parameter '0x0000000000000006' 04:41:43 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x24000000000013, &(0x7f0000000180), 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xffffffffffffff0b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) keyctl$get_persistent(0x10, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x80, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e77e6e560000f9fff77711be18a3d918e000"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000440)={r5, 0x80, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x24}, @in6={0xa, 0x4e20, 0x0, @local, 0x1000}, @in6={0xa, 0x4e24, 0xed9, @mcast2, 0x9}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @broadcast}, 0x1c}]}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f00000006c0)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x8b38c1f1781768e9) sendmsg$IPVS_CMD_SET_SERVICE(r3, 0x0, 0x4000000) keyctl$get_persistent(0x10, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000000000002, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffefffc, 0x0, 0x0) 04:41:43 executing program 4: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0x24, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r3, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) recvmmsg(r3, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) 04:41:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r3, r1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c00600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x306c, 0x4000002, 0x0, 0x2ff) readv(r0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/200, 0xc8}], 0x1) 04:41:44 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x349) move_pages(0x0, 0x2, &(0x7f00000001c0)=[&(0x7f0000007000/0x1000)=nil, &(0x7f0000002000/0x2000)=nil], &(0x7f0000000040)=[0x0], &(0x7f0000000180), 0x0) 04:41:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af30, &(0x7f0000000100)=ANY=[@ANYBLOB="ff"]) 04:41:44 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x10000000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(0x0, 0x141042, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000002900)) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) dup(0xffffffffffffffff) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80001d00c0d0) 04:41:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) 04:41:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)=[0x7fff]) semop(r0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(r0, 0x0, 0x0) 04:41:46 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0) close(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 04:41:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x20, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x4, 0x13}]}, 0x20}}, 0x0) 04:41:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="a1"], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:41:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[], [{@uid_eq={'uid'}}, {@pcr={'pcr'}}]}) 04:41:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x00\x00\x00\x00\x00\x9b\xec\x00', &(0x7f00000001c0)=@ethtool_coalesce={0xf}}) [ 240.419715][ T9237] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:41:46 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000100)=0x7d, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') accept4(0xffffffffffffffff, 0x0, 0x0, 0x1000) 04:41:46 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) [ 240.543055][ T9246] jfs: Unrecognized mount option "pcr=00000000000000000000" or missing value 04:41:46 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r5 = syz_open_procfs(0x0, 0x0) write$P9_RREADLINK(r5, 0x0, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000002740)={0xa, 0xfffd, 0x0, @mcast1, 0x4}, 0x1c) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x6) writev(0xffffffffffffffff, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r8, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r4, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r9, 0x8918, 0x0) sendmmsg(r6, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 04:41:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:41:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00!\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) 04:41:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 04:41:46 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x10000000) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 04:41:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r0, r3) bind$packet(r4, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r0, 0x0, r5) write$P9_RSTATFS(r6, &(0x7f0000000080)={0x43}, 0x43) 04:41:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 241.230263][ T9260] EXT4-fs (sda1): re-mounted. Opts: 04:41:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000dc0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x203, 0x0) [ 241.270127][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 241.276191][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:41:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/l\x01op-contl\x00', 0x20000, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xfffffffffffffff8, 0x4143) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f00000001c0)={0x1, 0x0, {0x3c, 0x1f, 0x3, 0x7, 0x6, 0x20, 0x3, 0x142, 0xffffffffffffffff}}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @multicast1}, {0x306}, 0xa4, {0x2, 0x4e23, @multicast1}, 'bond0\x00'}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./bus\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) close(r1) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r1, r6, 0x0, 0x8000fffffffe) sync_file_range(r6, 0x0, 0x0, 0x4) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r0) [ 241.321603][ T9296] EXT4-fs (sda1): re-mounted. Opts: [ 241.419678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.425584][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:41:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08035000fffff00004000638877fbac141414e9", 0x0, 0x100}, 0x28) 04:41:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x105400, 0x0) io_setup(0x2, &(0x7f00000002c0)=0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) io_submit(r1, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 04:41:47 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x28, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}, @request_death, @clear_death], 0x0, 0x20000000, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x80001) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000003c0)=""/202, 0x0) close(0xffffffffffffffff) bind$netrom(0xffffffffffffffff, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) quotactl(0x0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)="b7a4d9dd6ff566bd0dca24201f1a414b8f141202498c") mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYBLOB=',permit_directio,smackfsdef=g', @ANYBLOB=',uid', @ANYRESDEC, @ANYRESHEX]) socket$nl_route(0x10, 0x3, 0x0) [ 241.659369][ T9315] BPF:hdr_len not found 04:41:47 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:41:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') preadv(r0, &(0x7f0000000600)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x10000000) 04:41:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001480)=@newlink={0x78, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x58, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x44, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="a561dfe739a319a20f1c1778d484edac"}, @IFLA_GRE_LOCAL={0x14, 0x6, @mcast2}, @gre_common_policy=[@IFLA_GRE_TTL={0x8, 0x8, 0x8}, @IFLA_GRE_TOS={0x8, 0x9, 0x9}, @IFLA_GRE_TOS={0x8}]]}}}]}, 0x78}}, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) getxattr(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)=@known='trusted.syz\x00', &(0x7f0000001380)=""/4, 0x4) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0xdefd) [ 241.870580][ T9326] EXT4-fs (sda1): re-mounted. Opts: 04:41:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 04:41:48 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x28, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}, @request_death, @clear_death], 0x0, 0x20000000, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x80001) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000003c0)=""/202, 0x0) close(0xffffffffffffffff) bind$netrom(0xffffffffffffffff, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) quotactl(0x0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)="b7a4d9dd6ff566bd0dca24201f1a414b8f141202498c") mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYBLOB=',permit_directio,smackfsdef=g', @ANYBLOB=',uid', @ANYRESDEC, @ANYRESHEX]) socket$nl_route(0x10, 0x3, 0x0) 04:41:48 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x12200, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5421, 0x0) pipe(&(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_ima(0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x1, 0x0) socket$kcm(0xa, 0xffffffffffffffff, 0x11) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x741100, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f00000002c0)=ANY=[@ANYBLOB='filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00', @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/160], @ANYBLOB="00000000000000000000000000000080ffffffffffffff0000000000000000000000004000"/132], 0xd0) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4", 0x36}], 0x1}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x2142, 0x0) r6 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000001c0)={0x0, r6}, &(0x7f0000000440)=""/243, 0xe0, &(0x7f0000000240)={&(0x7f0000000040)={'rmd160-generic\x00'}}) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\a\x00'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r7) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r8) r9 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$unlink(0x9, r6, r9) open(&(0x7f0000001300)='.\x00', 0x0, 0x0) [ 242.187064][ T9344] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 242.354009][ T9341] netlink: 'syz-executor.3': attribute type 8 has an invalid length. 04:41:48 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x28, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}, @request_death, @clear_death], 0x0, 0x20000000, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x80001) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000003c0)=""/202, 0x0) close(0xffffffffffffffff) bind$netrom(0xffffffffffffffff, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) quotactl(0x0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)="b7a4d9dd6ff566bd0dca24201f1a414b8f141202498c") mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYBLOB=',permit_directio,smackfsdef=g', @ANYBLOB=',uid', @ANYRESDEC, @ANYRESHEX]) socket$nl_route(0x10, 0x3, 0x0) 04:41:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) [ 405.659907][ T1081] INFO: task :9304 can't die for more than 143 seconds. [ 405.668413][ T1081] R running task 28144 9304 9092 0x00004006 [ 405.689140][ T1081] Call Trace: [ 405.696051][ T1081] __schedule+0x8e9/0x1f30 [ 405.704876][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.714496][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.724945][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.732326][ T1081] ? lockdep_hardirqs_on+0x421/0x5e0 [ 405.737729][ T1081] ? retint_kernel+0x2b/0x2b [ 405.745639][ T1081] ? retint_kernel+0x2b/0x2b [ 405.752132][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.757908][ T1081] ? __this_cpu_preempt_check+0x8a/0x190 [ 405.766853][ T1081] ? __this_cpu_preempt_check+0x8a/0x190 [ 405.774305][ T1081] ? __this_cpu_preempt_check+0x35/0x190 [ 405.783305][ T1081] ? retint_kernel+0x2b/0x2b [ 405.788041][ T1081] ? irq_work_sync+0x106/0x1d0 [ 405.795207][ T1081] ? irq_work_sync+0xd1/0x1d0 [ 405.803189][ T1081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.811428][ T1081] ? irq_work_sync+0xd1/0x1d0 [ 405.816254][ T1081] ? _free_event+0x89/0x13b0 [ 405.824023][ T1081] ? __kasan_check_write+0x14/0x20 [ 405.829352][ T1081] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 405.837329][ T1081] ? mark_held_locks+0xa4/0xf0 [ 405.845316][ T1081] ? ring_buffer_attach+0x650/0x650 [ 405.852451][ T1081] ? wait_for_completion+0x440/0x440 [ 405.858446][ T1081] ? put_event+0x47/0x60 [ 405.866011][ T1081] ? perf_event_release_kernel+0x6d5/0xd70 [ 405.873881][ T1081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.883339][ T1081] ? __perf_event_exit_context+0x170/0x170 [ 405.889320][ T1081] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 405.897435][ T1081] ? perf_release+0x37/0x50 [ 405.906076][ T1081] ? __fput+0x2ff/0x890 [ 405.912802][ T1081] ? perf_event_release_kernel+0xd70/0xd70 [ 405.918727][ T1081] ? ____fput+0x16/0x20 [ 405.926119][ T1081] ? task_work_run+0x145/0x1c0 [ 405.932872][ T1081] ? exit_to_usermode_loop+0x316/0x380 [ 405.938346][ T1081] ? do_syscall_64+0x676/0x790 [ 405.947018][ T1081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.955508][ T1081] [ 405.955508][ T1081] Showing all locks held in the system: [ 405.966949][ T1081] 1 lock held by khungtaskd/1081: [ 405.974455][ T1081] #0: ffffffff88faccc0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 405.991139][ T1081] 1 lock held by rsyslogd/8959: [ 405.996204][ T1081] #0: ffff88809bc8eba0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 406.008546][ T1081] 2 locks held by getty/9049: [ 406.015380][ T1081] #0: ffff8880a4d9d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.027827][ T1081] #1: ffffc90005ef92e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.042720][ T1081] 2 locks held by getty/9050: [ 406.047502][ T1081] #0: ffff888099d5e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.059280][ T1081] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.072472][ T1081] 2 locks held by getty/9051: [ 406.077288][ T1081] #0: ffff888099ced090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.088278][ T1081] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.103337][ T1081] 2 locks held by getty/9052: [ 406.108075][ T1081] #0: ffff8880a869d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.118324][ T1081] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.134224][ T1081] 2 locks held by getty/9053: [ 406.139057][ T1081] #0: ffff88809a1e5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.153756][ T1081] #1: ffffc90005f152e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.165342][ T1081] 2 locks held by getty/9054: [ 406.174204][ T1081] #0: ffff888092008090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.184300][ T1081] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.197787][ T1081] 2 locks held by getty/9055: [ 406.203664][ T1081] #0: ffff8880a33a5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 406.216964][ T1081] #1: ffffc90005ef12e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 406.228679][ T1081] [ 406.235036][ T1081] ============================================= [ 406.235036][ T1081] [ 406.244996][ T1081] NMI backtrace for cpu 0 [ 406.249691][ T1081] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 406.258309][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.268367][ T1081] Call Trace: [ 406.271731][ T1081] dump_stack+0x197/0x210 [ 406.276066][ T1081] nmi_cpu_backtrace.cold+0x70/0xb2 [ 406.281354][ T1081] ? vprintk_func+0x86/0x189 [ 406.286031][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 406.291663][ T1081] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 406.297935][ T1081] arch_trigger_cpumask_backtrace+0x14/0x20 [ 406.303930][ T1081] watchdog+0xc8f/0x1350 [ 406.308214][ T1081] kthread+0x361/0x430 [ 406.312315][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 406.317863][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 406.323590][ T1081] ret_from_fork+0x24/0x30 [ 406.328268][ T1081] Sending NMI from CPU 0 to CPUs 1: [ 406.333928][ C1] NMI backtrace for cpu 1 [ 406.333934][ C1] CPU: 1 PID: 9304 Comm: Not tainted 5.4.0-rc7-next-20191115 #0 [ 406.333940][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.333943][ C1] RIP: 0010:write_comp_data+0x17/0x70 [ 406.333953][ C1] Code: c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 65 4c 8b 04 25 c0 1e 02 00 65 8b 05 e8 44 8e 7e a9 00 01 1f 00 75 51 <41> 8b 80 00 13 00 00 83 f8 03 75 45 49 8b 80 08 13 00 00 45 8b 80 [ 406.333957][ C1] RSP: 0018:ffff888054457bf0 EFLAGS: 00000246 [ 406.333964][ C1] RAX: 0000000080000000 RBX: 0000000000000002 RCX: ffffffff817e51f6 [ 406.333969][ C1] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000005 [ 406.333973][ C1] RBP: ffff888054457bf8 R08: ffff8880545ca500 R09: ffffed101523c282 [ 406.333978][ C1] R10: ffffed101523c281 R11: ffff8880a91e140b R12: ffff8880a91e1408 [ 406.333982][ C1] R13: 0000000000000003 R14: ffffed101523c281 R15: ffff888054457cc8 [ 406.333987][ C1] FS: 00000000020a6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 406.333991][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 406.333996][ C1] CR2: 00007f35ee695d7c CR3: 00000000957f2000 CR4: 00000000001406e0 [ 406.334000][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 406.334004][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 406.334007][ C1] Call Trace: [ 406.334011][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.334014][ C1] irq_work_sync+0x106/0x1d0 [ 406.334017][ C1] _free_event+0x89/0x13b0 [ 406.334020][ C1] ? __kasan_check_write+0x14/0x20 [ 406.334024][ C1] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 406.334027][ C1] ? mark_held_locks+0xa4/0xf0 [ 406.334030][ C1] ? ring_buffer_attach+0x650/0x650 [ 406.334033][ C1] ? wait_for_completion+0x440/0x440 [ 406.334036][ C1] put_event+0x47/0x60 [ 406.334040][ C1] perf_event_release_kernel+0x6d5/0xd70 [ 406.334043][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.334047][ C1] ? __perf_event_exit_context+0x170/0x170 [ 406.334051][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 406.334053][ C1] perf_release+0x37/0x50 [ 406.334056][ C1] __fput+0x2ff/0x890 [ 406.334060][ C1] ? perf_event_release_kernel+0xd70/0xd70 [ 406.334062][ C1] ____fput+0x16/0x20 [ 406.334065][ C1] task_work_run+0x145/0x1c0 [ 406.334069][ C1] exit_to_usermode_loop+0x316/0x380 [ 406.334072][ C1] do_syscall_64+0x676/0x790 [ 406.334075][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.334078][ C1] RIP: 0033:0x4141d1 [ 406.334088][ C1] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 406.334091][ C1] RSP: 002b:00007fff98ab1ae0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 406.334100][ C1] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004141d1 [ 406.334104][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 406.334109][ C1] RBP: 0000000000000001 R08: 000000006df17ee7 R09: 000000006df17eeb [ 406.334113][ C1] R10: 00007fff98ab1bc0 R11: 0000000000000293 R12: 000000000075c9a0 [ 406.334118][ C1] R13: 000000000075c9a0 R14: 0000000000761f70 R15: 000000000075bfd4 [ 406.343741][ T1081] Kernel panic - not syncing: hung_task: blocked tasks [ 406.664264][ T1081] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 406.672846][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.682896][ T1081] Call Trace: [ 406.686347][ T1081] dump_stack+0x197/0x210 [ 406.690720][ T1081] panic+0x2e3/0x75c [ 406.694620][ T1081] ? add_taint.cold+0x16/0x16 [ 406.699351][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 406.704998][ T1081] ? ___preempt_schedule+0x16/0x18 [ 406.710253][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 406.716750][ T1081] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 406.723160][ T1081] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 406.729311][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 406.735559][ T1081] watchdog+0xca0/0x1350 [ 406.739815][ T1081] kthread+0x361/0x430 [ 406.743882][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 406.749427][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 406.755242][ T1081] ret_from_fork+0x24/0x30 [ 406.761948][ T1081] Kernel Offset: disabled [ 406.766850][ T1081] Rebooting in 86400 seconds..