Warning: Permanently added '10.128.0.221' (ECDSA) to the list of known hosts. 2019/11/17 18:00:51 fuzzer started 2019/11/17 18:00:53 dialing manager at 10.128.0.26:44591 2019/11/17 18:00:53 syscalls: 2566 2019/11/17 18:00:53 code coverage: enabled 2019/11/17 18:00:53 comparison tracing: enabled 2019/11/17 18:00:53 extra coverage: enabled 2019/11/17 18:00:53 setuid sandbox: enabled 2019/11/17 18:00:53 namespace sandbox: enabled 2019/11/17 18:00:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/17 18:00:53 fault injection: enabled 2019/11/17 18:00:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/17 18:00:53 net packet injection: enabled 2019/11/17 18:00:53 net device setup: enabled 2019/11/17 18:00:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/17 18:00:53 devlink PCI setup: PCI device 0000:00:10.0 is not available 18:03:37 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040), 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000), 0x1, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000080)={0x800, "3c3d972f5d54d40a4f87e317a6fb10d553fa5b9688ab710630c5a6e9e268e1fa", 0x1, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2000000000002) 18:03:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x8000000039, &(0x7f0000000180)="d1020400005800200007000613f32e1c00ce5fe1b471985e", 0x18) sendto$inet6(r0, &(0x7f0000000080)='{', 0x1, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) syzkaller login: [ 235.500543][ T9034] IPVS: ftp: loaded support on port[0] = 21 18:03:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xd, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_enter(r0, 0x0, 0x7ffffffe, 0x3, 0x0, 0xfffffffffffffda3) [ 235.670307][ T9036] IPVS: ftp: loaded support on port[0] = 21 [ 235.703272][ T9034] chnl_net:caif_netlink_parms(): no params data found [ 235.830868][ T9034] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.838918][ T9034] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.848703][ T9034] device bridge_slave_0 entered promiscuous mode [ 235.873912][ T9034] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.877970][ T9039] IPVS: ftp: loaded support on port[0] = 21 [ 235.881617][ T9034] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.898525][ T9034] device bridge_slave_1 entered promiscuous mode [ 235.974068][ T9034] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.010419][ T9034] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.027303][ T9036] chnl_net:caif_netlink_parms(): no params data found 18:03:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000039c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000003900)="cf", 0x1}, 0x68) [ 236.085646][ T9034] team0: Port device team_slave_0 added [ 236.136229][ T9034] team0: Port device team_slave_1 added [ 236.193031][ T9036] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.200966][ T9036] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.217145][ T9036] device bridge_slave_0 entered promiscuous mode [ 236.289250][ T9034] device hsr_slave_0 entered promiscuous mode 18:03:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) lsetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0, 0x0, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x100, 0x0) socket(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') semget$private(0x0, 0x2000000010a, 0x182) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000002c0)={@initdev, @broadcast, @remote}, &(0x7f0000000100)=0xfffffeaa) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='security.SMACK64EXEC\x00', &(0x7f0000000400)='keyringppp1\x00', 0xc, 0x0) [ 236.336463][ T9034] device hsr_slave_1 entered promiscuous mode [ 236.428913][ T9036] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.458152][ T9036] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.472526][ T9036] device bridge_slave_1 entered promiscuous mode [ 236.519587][ T9042] IPVS: ftp: loaded support on port[0] = 21 18:03:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xd, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_enter(r0, 0x0, 0x7ffffffe, 0x3, 0x0, 0xfffffffffffffda3) [ 236.582427][ T9044] IPVS: ftp: loaded support on port[0] = 21 [ 236.598484][ T9034] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 236.651447][ T9036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.666211][ T9036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.698251][ T9034] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 236.738134][ T9034] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.828186][ T9034] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.889855][ T9036] team0: Port device team_slave_0 added [ 236.900047][ T9036] team0: Port device team_slave_1 added [ 236.916948][ T9047] IPVS: ftp: loaded support on port[0] = 21 [ 236.960001][ T9036] device hsr_slave_0 entered promiscuous mode [ 237.016501][ T9036] device hsr_slave_1 entered promiscuous mode [ 237.077238][ T9036] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.088278][ T9039] chnl_net:caif_netlink_parms(): no params data found [ 237.142586][ T9039] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.150157][ T9039] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.158348][ T9039] device bridge_slave_0 entered promiscuous mode [ 237.166415][ T9039] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.173594][ T9039] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.183233][ T9039] device bridge_slave_1 entered promiscuous mode [ 237.251474][ T9039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.264326][ T9036] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 237.330559][ T9036] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 237.406212][ T9039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.424038][ T9036] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 237.513975][ T9036] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 237.558376][ T9039] team0: Port device team_slave_0 added [ 237.568486][ T9039] team0: Port device team_slave_1 added [ 237.611185][ T9042] chnl_net:caif_netlink_parms(): no params data found [ 237.678179][ T9039] device hsr_slave_0 entered promiscuous mode [ 237.736429][ T9039] device hsr_slave_1 entered promiscuous mode [ 237.806310][ T9039] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.883098][ T9042] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.890784][ T9042] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.899021][ T9042] device bridge_slave_0 entered promiscuous mode [ 237.911397][ T9044] chnl_net:caif_netlink_parms(): no params data found [ 237.925367][ T9042] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.934050][ T9042] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.942021][ T9042] device bridge_slave_1 entered promiscuous mode [ 238.032208][ T9042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.043576][ T9042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.074553][ T9047] chnl_net:caif_netlink_parms(): no params data found [ 238.102342][ T9042] team0: Port device team_slave_0 added [ 238.113515][ T9039] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 238.172893][ T9042] team0: Port device team_slave_1 added [ 238.183317][ T9044] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.191238][ T9044] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.199380][ T9044] device bridge_slave_0 entered promiscuous mode [ 238.207583][ T9044] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.214652][ T9044] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.222708][ T9044] device bridge_slave_1 entered promiscuous mode [ 238.235294][ T9039] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 238.359758][ T9042] device hsr_slave_0 entered promiscuous mode [ 238.419292][ T9042] device hsr_slave_1 entered promiscuous mode [ 238.476296][ T9042] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.500758][ T9039] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 238.570100][ T9039] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 238.641972][ T9044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.669630][ T9047] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.676943][ T9047] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.685288][ T9047] device bridge_slave_0 entered promiscuous mode [ 238.693667][ T9047] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.701337][ T9047] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.709817][ T9047] device bridge_slave_1 entered promiscuous mode [ 238.722236][ T9034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.734291][ T9044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.775326][ T9044] team0: Port device team_slave_0 added [ 238.797344][ T9044] team0: Port device team_slave_1 added [ 238.832524][ T9034] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.839673][ T9042] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 238.969548][ T9044] device hsr_slave_0 entered promiscuous mode [ 239.046555][ T9044] device hsr_slave_1 entered promiscuous mode [ 239.086232][ T9044] debugfs: Directory 'hsr0' with parent '/' already present! [ 239.101251][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.110261][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.120095][ T9047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.131200][ T9042] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.198279][ T9036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.215872][ T9047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.233066][ T9042] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.283234][ T9042] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.340272][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.349724][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.358321][ T3034] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.366456][ T3034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.374412][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.383441][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.391923][ T3034] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.399017][ T3034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.444165][ T9044] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 239.517166][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.525613][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.534051][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.541956][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.551765][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.562462][ T9036] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.577100][ T9047] team0: Port device team_slave_0 added [ 239.584528][ T9047] team0: Port device team_slave_1 added [ 239.592440][ T9044] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.631554][ T9044] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 239.691518][ T9044] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 239.729316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.738736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.747452][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.755941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.764945][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.774073][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.782899][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.789996][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.798462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.806962][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.815294][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.823305][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.843213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.853051][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.862390][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.869517][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.881080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.893034][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.968202][ T9047] device hsr_slave_0 entered promiscuous mode [ 240.016590][ T9047] device hsr_slave_1 entered promiscuous mode [ 240.066203][ T9047] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.091124][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.099995][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.129620][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.139145][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.148080][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.156961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.185878][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.222442][ T9039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.231152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.240958][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.250300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.258288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.299165][ T9034] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.311013][ T9036] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.327499][ T9036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.336570][ T9047] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 240.412932][ T9047] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 240.474569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.483730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.492983][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.501060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.521433][ T9047] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 240.559748][ T9047] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 240.623739][ T9039] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.641817][ T9042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.655978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.663934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.678693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.689596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.699443][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.706582][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.719318][ T9036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.740708][ T9044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.750788][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.761442][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.770496][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.780887][ T3034] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.788055][ T3034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.805354][ T9042] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.837054][ T9044] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.865576][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.878807][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.893155][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.902009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.951488][ C0] hrtimer: interrupt took 50861 ns [ 240.986900][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.995625][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.016894][ T3034] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.023994][ T3034] bridge0: port 1(bridge_slave_0) entered forwarding state 18:03:43 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 18:03:43 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket(0xa, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r2}}], 0x20}], 0x1, 0x0) [ 241.044454][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.096684][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.105183][ T3034] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.112319][ T3034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.129661][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 18:03:43 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="a3", 0x1}], 0x1) syz_open_dev$video4linux(0x0, 0x100000000, 0x2) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 241.140254][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.151202][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.160703][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.171791][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.181529][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.191207][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.200636][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.209915][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.221763][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.230734][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.242188][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.251151][ T3034] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.252681][ T9066] syz-executor.0 (9066) used greatest stack depth: 21944 bytes left [ 241.258291][ T3034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.259342][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.282837][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 18:03:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x200000) openat$cgroup_int(r1, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x4d0], [0x3a]}) unshare(0x40000000) 18:03:43 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = gettid() tkill(r5, 0x3c) clock_gettime(0x0, 0x0) [ 241.296833][ T3034] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.303942][ T3034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.322782][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.351450][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.361352][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.378705][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.432105][ T9039] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 241.450098][ T9039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 241.487437][ T9079] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. [ 241.489171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.528305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.541898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.551530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.564845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.574497][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.579217][ T9077] IPVS: ftp: loaded support on port[0] = 21 [ 241.588353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.588879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.589559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.590035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.590506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.591250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:03:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000540)="d3b9f8691c40f786e27ccf036bea137e1c1c3a6520de379af26dc7450a4338e531", 0x21}], 0x1}}], 0x1, 0x0) [ 241.592909][ T9042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.637999][ T9042] 8021q: adding VLAN 0 to HW filter on device batadv0 18:03:44 executing program 1: creat(0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) getegid() sched_setattr(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 241.776330][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.784144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.792937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.803517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.811774][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.846315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.855237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.878358][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.887327][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 18:03:44 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f00000002c0)={0x0, 0x989680}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r2, 0xd0f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x300, @ipv4={[], [], @loopback}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 241.954367][ T9039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.987062][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.011249][ T9044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 242.035155][ T9044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.186143][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.194684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.221067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.237413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.258510][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.299573][ T9047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.323975][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.332024][ T3034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.355078][ T9044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.380937][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.398425][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.415531][ T9047] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.432007][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.441100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.453534][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.460694][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.471642][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:03:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xd, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_enter(r0, 0x0, 0x7ffffffe, 0x3, 0x0, 0xfffffffffffffda3) 18:03:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000039c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000003900)="cf", 0x1}, 0x68) [ 242.502525][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.519267][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.528246][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.535362][ T3672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.633576][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.663410][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.677737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.687605][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.702534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.713052][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.770814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.785671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.805089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.831868][ T9047] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.854512][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.872087][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.888590][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.918874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.926963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 18:03:45 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 242.941574][ T9047] 8021q: adding VLAN 0 to HW filter on device batadv0 18:03:45 executing program 5: ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000080002, 0x10) getsockname$packet(r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001300fdff00000000006159923d511b09e05eea94fde50340371c3a84339df3cd7675b99d5b5910e0f7f08642e0777165bab6e0472da9f0fcbafbd03d618e477fa45946c1eee5c81c7fcd6dcc2405b16280d6338223d73843bb9096f1e6a06794ea4b39501a09bf1d2511e0d65758708af6ca3ee3675041ad4fd36b6f87e87d7c6f1c48e5b288f215e55f8a9a7383bb7ca18f5bceb8e1acb583eb81e3c0722b6e7588e929dbe0b2f94a91c7ec06db2dc0b083afc26f532e34f476735ac0644c3ff0375e971ceca3a38a0af20b3e3f2ac8f237060e5d45bf167cbfe8df4ea1f43e8a1ced7cc813806f9c6630d8e5481ff5fbc24cc59bbc91dfdfc47f18ed3ef86ea1e6a3ce63503374527a0a8543d6156b43e69057d08fa55bf8775fbddddcf8f07271a70dc52658e7e4ad555a76ca16bdc004bd90726491a5288072e962b12b8cd6059dc73259d10938f9845609ec053f3a2c94288b4f014ea77a93d5950cc7ccb2b00ebd2a3cda7340194f2fb2a809231155416538fe13f2214212aabaa507fdaf64d0367108bc10c95b67c7e0ecf9d52d933967944fa64a08fb227eec52edff619101a33754609cc4020000000000f8010085de5eaebe8e14d6a1d76953252f9394922141a2d0563bd089cee1bb62ccd8bec78b367c8dfda2ebb34f1a4c66d16a9fddddd407d9aa726aa49e2f21488f918321a0d3c8ae25e4ab855c894a6daef1dc13d6fe6912d6305458dd192df92b5c9b190b50598f1661c9773d56c724faf6c42ab6a4f7c6fac744c1ab9b69"], 0x14}}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000680)=0x10000, 0x4) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x49249249249266b, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140), 0x8) 18:03:45 executing program 3: mknod(&(0x7f0000000080)='./bus\x00', 0x8, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000000)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{}, {0x8}]}, 0x14, 0x0) clone(0x1240100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 18:03:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) lsetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0, 0x0, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x100, 0x0) socket(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') semget$private(0x0, 0x2000000010a, 0x182) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000002c0)={@initdev, @broadcast, @remote}, &(0x7f0000000100)=0xfffffeaa) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='security.SMACK64EXEC\x00', &(0x7f0000000400)='keyringppp1\x00', 0xc, 0x0) 18:03:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xaf, 0x0, 0x0, 0xffffff56) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x5af4c977b55a8b9c) ioctl$KVM_NMI(r4, 0xae9a) clone(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 243.409255][ T9175] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 243.664146][ T9175] kvm: emulating exchange as write 18:03:47 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0x21c}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x1, {0x7, 0x4}}, 0x50) 18:03:47 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:47 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x793e28fc4ba081f8, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="48000000240007050098de78817e630b0a000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001007072696f00000000180002000d000000030000007be791f4c8"], 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 18:03:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0) 18:03:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) lsetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0, 0x0, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x100, 0x0) socket(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') semget$private(0x0, 0x2000000010a, 0x182) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000002c0)={@initdev, @broadcast, @remote}, &(0x7f0000000100)=0xfffffeaa) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='security.SMACK64EXEC\x00', &(0x7f0000000400)='keyringppp1\x00', 0xc, 0x0) 18:03:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xaf, 0x0, 0x0, 0xffffff56) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x5af4c977b55a8b9c) ioctl$KVM_NMI(r4, 0xae9a) clone(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:03:47 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:47 executing program 3: unshare(0x400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000001c0)={0x0, r2}) 18:03:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000080)='./file0\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') stat(&(0x7f00000004c0)='./file0\x00', 0x0) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 18:03:47 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@fwd={0x1}, @ptr]}}, &(0x7f0000000700)=""/220, 0x32, 0xdc, 0x1}, 0x20) 18:03:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35b08ff338832ca84b13a719c053724c5666747ea7723ef96ff4508ed4fcff49b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0010000000c8f2837e218026ac53c13a60f9d22248bd"], 0x28}}, 0x0) 18:03:47 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xaf, 0x0, 0x0, 0xffffff56) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x5af4c977b55a8b9c) ioctl$KVM_NMI(r4, 0xae9a) clone(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:03:47 executing program 3: unshare(0x400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000001c0)={0x0, r2}) [ 245.417146][ T9246] overlayfs: maximum fs stacking depth exceeded [ 245.428671][ T9252] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 18:03:47 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000140)={0x0, 0x9}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000016f000000700000400000000000003000000008e"], 0x0, 0x1c}, 0x20) clock_gettime(0x0, &(0x7f0000000340)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 245.469125][ T9252] team0: Device ip6gretap0 is up. Set it down before adding it as a team port 18:03:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000640)="cee61470ddbfdac41d0bd6c398b03d4ec6ac494a272d87970336f28f7c6bcc7cd0", 0x21}], 0x1}}], 0x1, 0x0) [ 245.558665][ T9263] team0: Device ip6gretap0 is up. Set it down before adding it as a team port 18:03:47 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000080)='./file0\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') chdir(&(0x7f0000000200)='./file0\x00') 18:03:47 executing program 3: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 18:03:48 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 18:03:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000900)="b9a6", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001d40)='7', 0x1}], 0x1}}], 0x2, 0x0) 18:03:48 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:48 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:48 executing program 4: 18:03:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xaf, 0x0, 0x0, 0xffffff56) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x5af4c977b55a8b9c) ioctl$KVM_NMI(r4, 0xae9a) clone(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:03:48 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:48 executing program 3: 18:03:48 executing program 4: 18:03:48 executing program 0: 18:03:48 executing program 1: creat(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:03:48 executing program 1: creat(0x0, 0x0) r0 = memfd_create(&(0x7f0000000680)=':+\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 402.066394][ T1080] INFO: task :9288 can't die for more than 143 seconds. [ 402.073531][ T1080] R running task 28144 9288 9047 0x00004006 [ 402.094870][ T1080] Call Trace: [ 402.098627][ T1080] __schedule+0x8e9/0x1f30 [ 402.103043][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.113157][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.119755][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.125211][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 402.134995][ T1080] ? retint_kernel+0x2b/0x2b [ 402.140465][ T1080] ? trace_hardirqs_on_caller+0x6a/0x240 [ 402.151011][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.156917][ T1080] retint_kernel+0x1b/0x2b [ 402.161364][ T1080] RIP: 0010:check_memory_region+0x30/0x1a0 [ 402.171669][ T1080] Code: Bad RIP value. [ 402.175742][ T1080] RSP: 0005:ffffffff817e51c1 EFLAGS: 00000000 ORIG_RAX: ffff8880a903e3c0 [ 402.185130][ T1080] RAX: ffff88805648fc28 RBX: ffffffff87600a30 RCX: 0000000000000002 [ 402.197615][ T1080] RDX: ffff888093fea40b RSI: ffffed10127fd481 RDI: ffffed10127fd482 [ 402.205588][ T1080] RBP: ffff88805648fb59 R08: ffff888093fea408 R09: 0000000000000003 [ 402.215943][ T1080] R10: ffffed10127fd481 R11: ffff88805648fcc8 R12: 0000000000000007 [ 402.230115][ T1080] R13: ffff88805648fb49 R14: ffff8880a903e3c0 R15: 0000000000000008 [ 402.239916][ T1080] ? __this_cpu_preempt_check+0x8a/0x190 [ 402.245549][ T1080] ? __this_cpu_preempt_check+0x35/0x190 [ 402.254373][ T1080] ? retint_kernel+0x2b/0x2b [ 402.260635][ T1080] ? irq_work_sync+0x106/0x1d0 [ 402.265506][ T1080] ? write_comp_data+0x17/0x70 [ 402.274043][ T1080] ? __kasan_check_read+0x11/0x20 [ 402.280718][ T1080] ? irq_work_sync+0xd8/0x1d0 [ 402.285388][ T1080] ? _free_event+0x89/0x13b0 [ 402.293038][ T1080] ? __kasan_check_write+0x14/0x20 [ 402.299861][ T1080] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 402.305398][ T1080] ? mark_held_locks+0xa4/0xf0 [ 402.313434][ T1080] ? ring_buffer_attach+0x650/0x650 [ 402.320248][ T1080] ? wait_for_completion+0x440/0x440 [ 402.325530][ T1080] ? put_event+0x47/0x60 [ 402.332797][ T1080] ? perf_event_release_kernel+0x6d5/0xd70 [ 402.341094][ T1080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.350381][ T1080] ? __perf_event_exit_context+0x170/0x170 [ 402.357904][ T1080] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 402.364140][ T1080] ? perf_release+0x37/0x50 [ 402.371715][ T1080] ? __fput+0x2ff/0x890 [ 402.375869][ T1080] ? perf_event_release_kernel+0xd70/0xd70 [ 402.383362][ T1080] ? ____fput+0x16/0x20 [ 402.392038][ T1080] ? task_work_run+0x145/0x1c0 [ 402.399330][ T1080] ? exit_to_usermode_loop+0x316/0x380 [ 402.404799][ T1080] ? do_syscall_64+0x676/0x790 [ 402.412612][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.420528][ T1080] [ 402.420528][ T1080] Showing all locks held in the system: [ 402.431543][ T1080] 1 lock held by khungtaskd/1080: [ 402.438350][ T1080] #0: ffffffff88faccc0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 402.451886][ T1080] 1 lock held by rsyslogd/8902: [ 402.458648][ T1080] #0: ffff8880a41bce20 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 402.472101][ T1080] 2 locks held by getty/8992: [ 402.478464][ T1080] #0: ffff888092eda090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.490802][ T1080] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.502154][ T1080] 2 locks held by getty/8993: [ 402.509860][ T1080] #0: ffff8880a0d7d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.520506][ T1080] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.533994][ T1080] 2 locks held by getty/8994: [ 402.540323][ T1080] #0: ffff888092ed2090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.553809][ T1080] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.569419][ T1080] 2 locks held by getty/8995: [ 402.574095][ T1080] #0: ffff8880a88e3090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.584776][ T1080] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.598441][ T1080] 2 locks held by getty/8996: [ 402.603120][ T1080] #0: ffff8880a47c7090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.615517][ T1080] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.630063][ T1080] 2 locks held by getty/8997: [ 402.634741][ T1080] #0: ffff8880a908e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.644058][ T1080] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.658730][ T1080] 2 locks held by getty/8998: [ 402.663409][ T1080] #0: ffff88809aaf6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 402.678750][ T1080] #1: ffffc90005f092e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 402.690706][ T1080] [ 402.693039][ T1080] ============================================= [ 402.693039][ T1080] [ 402.703816][ T1080] NMI backtrace for cpu 0 [ 402.708276][ T1080] CPU: 0 PID: 1080 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 402.716857][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.726900][ T1080] Call Trace: [ 402.730247][ T1080] dump_stack+0x197/0x210 [ 402.734580][ T1080] nmi_cpu_backtrace.cold+0x70/0xb2 [ 402.739764][ T1080] ? vprintk_func+0x86/0x189 [ 402.744356][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 402.749972][ T1080] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 402.755940][ T1080] arch_trigger_cpumask_backtrace+0x14/0x20 [ 402.761827][ T1080] watchdog+0xc8f/0x1350 [ 402.766061][ T1080] kthread+0x361/0x430 [ 402.770129][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 402.775670][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 402.781404][ T1080] ret_from_fork+0x24/0x30 [ 402.786798][ T1080] Sending NMI from CPU 0 to CPUs 1: [ 402.792411][ C1] NMI backtrace for cpu 1 [ 402.792417][ C1] CPU: 1 PID: 9288 Comm: Not tainted 5.4.0-rc7-next-20191115 #0 [ 402.792423][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.792426][ C1] RIP: 0010:check_memory_region+0x1f/0x1a0 [ 402.792436][ C1] Code: 00 66 2e 0f 1f 84 00 00 00 00 00 48 85 f6 0f 84 34 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 55 0f b6 d2 48 39 c7 48 89 e5 41 55 <41> 54 53 0f 86 07 01 00 00 4c 8d 5c 37 ff 49 89 f8 48 b8 00 00 00 [ 402.792440][ C1] RSP: 0018:ffff88805648fbe0 EFLAGS: 00000216 [ 402.792447][ C1] RAX: ffff7fffffffffff RBX: 0000000000000002 RCX: ffffffff817e51d5 [ 402.792452][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888093fea408 [ 402.792456][ C1] RBP: ffff88805648fbe8 R08: ffff8880a903e3c0 R09: ffffed10127fd482 [ 402.792461][ C1] R10: ffffed10127fd481 R11: ffff888093fea40b R12: ffff888093fea408 [ 402.792465][ C1] R13: 0000000000000003 R14: ffffed10127fd481 R15: ffff88805648fcc8 [ 402.792470][ C1] FS: 0000000001dfe940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 402.792474][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 402.792479][ C1] CR2: ffffffffff600400 CR3: 00000000a8462000 CR4: 00000000001406e0 [ 402.792483][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 402.792488][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 402.792490][ C1] Call Trace: [ 402.792493][ C1] __kasan_check_read+0x11/0x20 [ 402.792496][ C1] irq_work_sync+0xe5/0x1d0 [ 402.792499][ C1] _free_event+0x89/0x13b0 [ 402.792503][ C1] ? __kasan_check_write+0x14/0x20 [ 402.792506][ C1] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 402.792509][ C1] ? mark_held_locks+0xa4/0xf0 [ 402.792512][ C1] ? ring_buffer_attach+0x650/0x650 [ 402.792516][ C1] ? wait_for_completion+0x440/0x440 [ 402.792519][ C1] put_event+0x47/0x60 [ 402.792522][ C1] perf_event_release_kernel+0x6d5/0xd70 [ 402.792526][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.792529][ C1] ? __perf_event_exit_context+0x170/0x170 [ 402.792533][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 402.792536][ C1] perf_release+0x37/0x50 [ 402.792539][ C1] __fput+0x2ff/0x890 [ 402.792542][ C1] ? perf_event_release_kernel+0xd70/0xd70 [ 402.792545][ C1] ____fput+0x16/0x20 [ 402.792548][ C1] task_work_run+0x145/0x1c0 [ 402.792551][ C1] exit_to_usermode_loop+0x316/0x380 [ 402.792554][ C1] do_syscall_64+0x676/0x790 [ 402.792558][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.792561][ C1] RIP: 0033:0x4141d1 [ 402.792570][ C1] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 402.792574][ C1] RSP: 002b:00007ffe79c7a320 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 402.792582][ C1] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004141d1 [ 402.792586][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 402.792591][ C1] RBP: 0000000000000001 R08: 000000006fc2607d R09: 000000006fc26081 [ 402.792595][ C1] R10: 00007ffe79c7a400 R11: 0000000000000293 R12: 000000000075c9a0 [ 402.792600][ C1] R13: 000000000075c9a0 R14: 0000000000761580 R15: 000000000075bf2c [ 402.809229][ T1080] Kernel panic - not syncing: hung_task: blocked tasks [ 403.116481][ T1080] CPU: 0 PID: 1080 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 403.125054][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.135193][ T1080] Call Trace: [ 403.138520][ T1080] dump_stack+0x197/0x210 [ 403.142972][ T1080] panic+0x2e3/0x75c [ 403.146871][ T1080] ? add_taint.cold+0x16/0x16 [ 403.151554][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 403.157364][ T1080] ? ___preempt_schedule+0x16/0x18 [ 403.162483][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 403.168632][ T1080] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 403.174932][ T1080] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 403.181138][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 403.187416][ T1080] watchdog+0xca0/0x1350 [ 403.191746][ T1080] kthread+0x361/0x430 [ 403.195813][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 403.201439][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 403.207157][ T1080] ret_from_fork+0x24/0x30 [ 403.213529][ T1080] Kernel Offset: disabled [ 403.217883][ T1080] Rebooting in 86400 seconds..