[ 56.847602][ T26] audit: type=1800 audit(1573971022.504:25): pid=8804 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.874370][ T26] audit: type=1800 audit(1573971022.504:26): pid=8804 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.935428][ T26] audit: type=1800 audit(1573971022.514:27): pid=8804 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 57.486708][ T8871] sshd (8871) used greatest stack depth: 22888 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.116' (ECDSA) to the list of known hosts. 2019/11/17 06:10:33 fuzzer started 2019/11/17 06:10:35 dialing manager at 10.128.0.26:44591 2019/11/17 06:10:36 syscalls: 2566 2019/11/17 06:10:36 code coverage: enabled 2019/11/17 06:10:36 comparison tracing: enabled 2019/11/17 06:10:36 extra coverage: enabled 2019/11/17 06:10:36 setuid sandbox: enabled 2019/11/17 06:10:36 namespace sandbox: enabled 2019/11/17 06:10:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/17 06:10:36 fault injection: enabled 2019/11/17 06:10:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/17 06:10:36 net packet injection: enabled 2019/11/17 06:10:36 net device setup: enabled 2019/11/17 06:10:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/17 06:10:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 06:13:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x1) 06:13:20 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) syzkaller login: [ 234.860222][ T8968] IPVS: ftp: loaded support on port[0] = 21 [ 234.967710][ T8970] IPVS: ftp: loaded support on port[0] = 21 06:13:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) close(r0) [ 235.117870][ T8968] chnl_net:caif_netlink_parms(): no params data found [ 235.151084][ T8970] chnl_net:caif_netlink_parms(): no params data found [ 235.269583][ T8968] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.278332][ T8968] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.286929][ T8968] device bridge_slave_0 entered promiscuous mode [ 235.296176][ T8968] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.303279][ T8968] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.311563][ T8968] device bridge_slave_1 entered promiscuous mode [ 235.327175][ T8970] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.334265][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.344096][ T8970] device bridge_slave_0 entered promiscuous mode [ 235.360329][ T8970] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.368545][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.377135][ T8970] device bridge_slave_1 entered promiscuous mode [ 235.378039][ T8975] IPVS: ftp: loaded support on port[0] = 21 [ 235.402114][ T8968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.440313][ T8970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.455753][ T8968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:13:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x30002000000010, 0x3, 0x0) write(r2, &(0x7f0000000440)="fc00000048000703ab092500090017000aab07ff010000000000920821000100ff0100000005d0000000020009039815fa2c1ec2865eaaa79bb94b59fe140000bc00020000036c6c256f1a05002e117c22eb5d8b12170000006000c821b4a62b004740bf0478aa2a7c8b911e400000002fcb5d7bd5afaa8934d073e788b98e20d7d5bbc91a16d0a3f23e2e80772c05defd5a32e24b3a83ab1afad60ce9c0bfb8fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f44660da80b76b6825bbd5b95dbcc037816460e63d9b9af626944bf15b2ccd243f295ed94e0ad91bd0734babc7c3f2e87abd43cd16f17e583df150c3b880f411f46a6b567", 0xfc) [ 235.485474][ T8970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.503785][ T8968] team0: Port device team_slave_0 added [ 235.544915][ T8968] team0: Port device team_slave_1 added [ 235.564212][ T8970] team0: Port device team_slave_0 added [ 235.573127][ T8970] team0: Port device team_slave_1 added [ 235.667608][ T8970] device hsr_slave_0 entered promiscuous mode [ 235.704748][ T8970] device hsr_slave_1 entered promiscuous mode 06:13:21 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 235.779804][ T8968] device hsr_slave_0 entered promiscuous mode [ 235.836796][ T8968] device hsr_slave_1 entered promiscuous mode [ 235.876495][ T8968] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.900707][ T8977] IPVS: ftp: loaded support on port[0] = 21 06:13:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') [ 236.001347][ T8979] IPVS: ftp: loaded support on port[0] = 21 [ 236.072856][ T8970] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 236.148657][ T8970] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 236.182259][ T8968] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 236.270485][ T8982] IPVS: ftp: loaded support on port[0] = 21 [ 236.279685][ T8970] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 236.338438][ T8970] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 236.385845][ T8968] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 236.438760][ T8968] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.487946][ T8968] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.546075][ T8975] chnl_net:caif_netlink_parms(): no params data found [ 236.651210][ T8975] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.659440][ T8975] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.667381][ T8975] device bridge_slave_0 entered promiscuous mode [ 236.676976][ T8975] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.684055][ T8975] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.693073][ T8975] device bridge_slave_1 entered promiscuous mode [ 236.749911][ T8975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.777715][ T8977] chnl_net:caif_netlink_parms(): no params data found [ 236.789254][ T8975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.857653][ T8975] team0: Port device team_slave_0 added [ 236.877842][ T8979] chnl_net:caif_netlink_parms(): no params data found [ 236.895891][ T8975] team0: Port device team_slave_1 added [ 237.006830][ T8975] device hsr_slave_0 entered promiscuous mode [ 237.034969][ T8975] device hsr_slave_1 entered promiscuous mode [ 237.074550][ T8975] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.092178][ T8977] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.099473][ T8977] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.107305][ T8977] device bridge_slave_0 entered promiscuous mode [ 237.116006][ T8979] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.123080][ T8979] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.131631][ T8979] device bridge_slave_0 entered promiscuous mode [ 237.141093][ T8979] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.148217][ T8979] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.156016][ T8979] device bridge_slave_1 entered promiscuous mode [ 237.179074][ T8982] chnl_net:caif_netlink_parms(): no params data found [ 237.189320][ T8977] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.197240][ T8977] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.205721][ T8977] device bridge_slave_1 entered promiscuous mode [ 237.222695][ T8968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.232408][ T8979] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.281889][ T8979] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.307316][ T8977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.318871][ T8977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.362966][ T8982] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.370259][ T8982] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.378901][ T8982] device bridge_slave_0 entered promiscuous mode [ 237.389245][ T8977] team0: Port device team_slave_0 added [ 237.400012][ T8977] team0: Port device team_slave_1 added [ 237.457744][ T8977] device hsr_slave_0 entered promiscuous mode [ 237.494832][ T8977] device hsr_slave_1 entered promiscuous mode [ 237.534528][ T8977] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.544080][ T8979] team0: Port device team_slave_0 added [ 237.550293][ T8982] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.558179][ T8982] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.566053][ T8982] device bridge_slave_1 entered promiscuous mode [ 237.573063][ T8975] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 237.642110][ T8968] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.652219][ T8970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.664449][ T8979] team0: Port device team_slave_1 added [ 237.679019][ T8975] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 237.758026][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.766916][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.808865][ T8975] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 237.826730][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.836128][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.844774][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.851925][ T8983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.860260][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.869871][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.878680][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.885784][ T8983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.893342][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.902451][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.927287][ T8982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.976526][ T8979] device hsr_slave_0 entered promiscuous mode [ 238.024816][ T8979] device hsr_slave_1 entered promiscuous mode [ 238.064440][ T8979] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.074237][ T8975] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 238.117403][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.126041][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.133727][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.143120][ T8970] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.156814][ T8982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.187684][ T8982] team0: Port device team_slave_0 added [ 238.195627][ T8982] team0: Port device team_slave_1 added [ 238.205617][ T8977] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 238.251107][ T8977] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 238.300532][ T8977] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 238.351269][ T8977] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 238.411011][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.420166][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.428652][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.438111][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.446905][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.453943][ T8983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.461710][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.470227][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.497983][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.506927][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.516017][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.524259][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.533286][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.542134][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.609527][ T8982] device hsr_slave_0 entered promiscuous mode [ 238.675348][ T8982] device hsr_slave_1 entered promiscuous mode [ 238.724478][ T8982] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.736630][ T8968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.753231][ T8979] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 238.796927][ T8979] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 238.836363][ T8979] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 238.877950][ T8979] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 238.946435][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.955666][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.964015][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.971122][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.979666][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.990109][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.997631][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.006402][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.047572][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.057269][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.065815][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.079852][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.088377][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.100197][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.109358][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.127131][ T8982] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 239.186966][ T8982] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 239.241005][ T8970] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.252855][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.271944][ T8968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.281876][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.291934][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.301862][ T8982] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 239.361362][ T8982] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 239.443569][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.451581][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.489919][ T8970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.578680][ T8975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.630831][ T8977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.658718][ T8979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.691318][ T8975] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.714753][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.723069][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.731992][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.742276][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.759421][ T8979] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.767917][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.776413][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.784661][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.793243][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.802893][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.810017][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.818293][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.840388][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.850173][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.860210][ T3104] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.867383][ T3104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.876859][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:13:25 executing program 1: [ 239.886122][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.895188][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.902264][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.930506][ T8977] 8021q: adding VLAN 0 to HW filter on device team0 06:13:25 executing program 0: 06:13:25 executing program 1: [ 239.953128][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.965085][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.976634][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.039279][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.067266][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:13:25 executing program 1: 06:13:25 executing program 0: [ 240.088391][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.095551][ T8983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.137210][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.154098][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.171433][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 06:13:25 executing program 0: 06:13:25 executing program 1: [ 240.181264][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.192209][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.226254][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.254632][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.262529][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.284128][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 06:13:25 executing program 1: [ 240.300789][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.330855][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.355806][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.370347][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.380198][ T3104] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.387362][ T3104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.400098][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.408543][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.425073][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.433340][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.441546][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.450127][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.458879][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.468019][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.476470][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.485244][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.493538][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.500643][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.512926][ T8982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.546160][ T8975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.560865][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.570035][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.579603][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.587810][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.595411][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.603683][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.615476][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.624884][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.638266][ T8979] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.655990][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.663826][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.684065][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.699715][ T8982] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.707669][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.716933][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.762743][ T8977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 240.779462][ T8977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.793719][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.802929][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.811869][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.821197][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.830040][ T8984] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.837150][ T8984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.845034][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.852503][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.860148][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.868929][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.877437][ T8984] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.884558][ T8984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.892158][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.901036][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.909622][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.918090][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.926203][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.961244][ T8977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.968585][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.981695][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.991615][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.000162][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.008737][ T8984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.019593][ T8975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.035503][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.060833][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.081885][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.112343][ T8982] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 241.126062][ T8982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 241.155313][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.163769][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.200691][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.223706][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.253393][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.341397][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.349943][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.369499][ T8982] 8021q: adding VLAN 0 to HW filter on device batadv0 06:13:27 executing program 1: 06:13:27 executing program 0: 06:13:27 executing program 3: 06:13:27 executing program 5: 06:13:27 executing program 2: 06:13:27 executing program 4: 06:13:27 executing program 1: 06:13:27 executing program 0: 06:13:27 executing program 3: 06:13:27 executing program 4: 06:13:27 executing program 3: 06:13:27 executing program 2: 06:13:27 executing program 0: 06:13:27 executing program 1: 06:13:27 executing program 5: 06:13:27 executing program 2: 06:13:27 executing program 3: 06:13:27 executing program 1: 06:13:27 executing program 4: 06:13:27 executing program 0: 06:13:27 executing program 5: 06:13:27 executing program 1: 06:13:27 executing program 2: 06:13:27 executing program 3: 06:13:28 executing program 4: 06:13:28 executing program 0: 06:13:28 executing program 5: 06:13:28 executing program 2: 06:13:28 executing program 3: 06:13:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000180000009500000000000000d57bb3eaac7d1a5cd4716cb966b36f90c326931b8a010aa712acf38373c0fed93937728f17e4f6d349da04e718f25a9fc71e46b3a58d8687422d152151c16e9522188ea929605e62fac8324ef8c09eb26716ce2950fde7745fbf694e"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0xd39}, 0x28) 06:13:28 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) io_setup(0x8, &(0x7f00004eb000)=0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r1, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f00009ca000)={0x0, 0x1c9c380}) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x9000, 0x0) memfd_create(&(0x7f00006a7000)='/dev/vga_arbiter\x00', 0x0) r3 = memfd_create(&(0x7f00006a7000)='/dev/vga_arbiter\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f00008feff8)='net/udp\x00') sendfile(r3, r4, 0x0, 0x1) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000001240)={0x6, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) io_cancel(0x0, 0x0, &(0x7f00000011c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10020040}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r7, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r8 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x20000) ioctl$KVM_GET_DEBUGREGS(r8, 0x8080aea1, 0x0) 06:13:28 executing program 5: 06:13:28 executing program 0: 06:13:28 executing program 2: 06:13:28 executing program 3: [ 242.694731][ T9106] BPF:hdr_len not found 06:13:28 executing program 4: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000240)) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)=0x80063) [ 242.787993][ C1] hrtimer: interrupt took 27613 ns 06:13:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) fcntl$setstatus(r1, 0x4, 0x2000) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x3fffffffffffff1, 0x0) 06:13:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x45142) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24000000) 06:13:28 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r3, &(0x7f0000000580)='./file2\x00', &(0x7f00000008c0)=[&(0x7f00000005c0)='-cgroupvmnet1eth0GPL,!mime_typecgroup\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000800)=')8(\'\x00', &(0x7f0000000840)='trusted.overlay.opaque\x00', &(0x7f0000000880)='y\x00'], &(0x7f0000000a00)=[&(0x7f0000000900)='\x00', &(0x7f0000000940)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7\x00', &(0x7f0000000980)='/dev/rtc0\x00', &(0x7f00000009c0)=',o\x00'], 0x800) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x60, &(0x7f0000000080)={0x0, @loopback, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7\x00', 0x0, 0x704836fb}, 0x2c) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x38, r4, 0x0, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r5, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) 06:13:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000004504000000ffffffb504000000004000570400001000fffa620700fe00000000850000002f000000b70000000000000095000000000000006ca1b0134084bc274e1cdd4f4010668580072963fdeee2bd856144b57c4c492e3eb0e4ba263bc32d57e1a1a935f37a8a7197de269d90f566bb73886c43a3060ca5632e7294803497d5947f37f8c71b3ae6a578d08e0b28e2d2e72b2c127cad737df33d591715f5546d2d12b238cc5f1d0afa39"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 06:13:28 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r4, 0x80003) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) execveat(r4, &(0x7f0000000580)='./file2\x00', &(0x7f00000008c0)=[&(0x7f00000005c0)='-cgroupvmnet1eth0GPL,!mime_typecgroup\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000800)=')8(\'\x00', &(0x7f0000000840)='trusted.overlay.opaque\x00', &(0x7f0000000880)='y\x00'], &(0x7f0000000a00)=[0x0, &(0x7f0000000940)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7\x00', &(0x7f0000000980)='/dev/rtc0\x00', &(0x7f00000009c0)=',o\x00'], 0x800) fcntl$setflags(r2, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x38, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x4, {0x0, 0x0, 0x0, 0x19, 0x6}}) 06:13:28 executing program 0: [ 243.369478][ T9144] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.400076][ T9146] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:13:29 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) chmod(0x0, 0x0) 06:13:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$unix(0x1, 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 06:13:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000fc0)) timer_delete(0x0) 06:13:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00008d7000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 06:13:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a3119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a0dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14a8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a04000000000000006a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b2dad868a53e6f5e69746a71ec92dcaa9a7dfab394286e5c81eae45e3a25b942b8da11edb578b453acac03a9d3448806776d083d6d5fe4f833d4d4cfbeef0e0984c6c4b2b9c33d8a624cea95c3b3c6dd873569cf4786fc5166b0300000000001ff28d3ce3e3b8f81e34cf97c9c841cb2ef08107a9a96549e3d259df17e29ed64bd6120813f9f0344e139506701e8fdedb06009b5e4d0c67bda0b928b732cff782b0684075f2cb7851efdd7797ee95d2ac2848af22896949fb172f52a8cabd26c15682aa58d31aec956bd7c27806403434b3c30b070bcc8266e12fa66602056256f74675b7cb6a2cd93359de4d87b2708d70c8f3df53caf8fe180c4dea3f5b7a871b30c7a5753b48f7f09192a34b0efaab02dca0517eee10ff30206f78ec82c72f000000000000000000"], 0x12e) readv(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040)={0xc, 0x17, "d115c3c9e14107ea0fc1ff673b452d601193062e599ab8"}, 0x1d) 06:13:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x15}) 06:13:29 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffeff) [ 243.926660][ T3104] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 244.015539][ T3104] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 06:13:29 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x80003) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) execveat(r4, &(0x7f0000000580)='./file2\x00', 0x0, &(0x7f0000000a00)=[&(0x7f0000000900)='\x00', &(0x7f0000000940)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7\x00', &(0x7f0000000980)='/dev/rtc0\x00', &(0x7f00000009c0)=',o\x00'], 0x800) fcntl$setflags(r2, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x4, {0x0, 0x0, 0x0, 0x0, 0x6}}) [ 244.362521][ T9184] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000000201ffff000000000000000000020000080015000000000008000800e1e24b75"], 0x24}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 06:13:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3a, 0x0, &(0x7f0000000100)='GPM\x00', 0x0, 0xffffff01, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x192, 0x10, 0x0, 0xffffff74}, 0x298) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x005\x00', @ifru_flags}) 06:13:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_addrs=@nl}) 06:13:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x1}) [ 244.929346][ T9201] bridge0: port 3(team0) entered blocking state [ 244.974901][ T9201] bridge0: port 3(team0) entered disabled state [ 245.011663][ T9201] device team0 entered promiscuous mode [ 245.017497][ T9201] device team_slave_0 entered promiscuous mode 06:13:30 executing program 0: move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 245.024042][ T9201] device team_slave_1 entered promiscuous mode [ 245.041803][ T9201] bridge0: port 3(team0) entered blocking state [ 245.048460][ T9201] bridge0: port 3(team0) entered forwarding state 06:13:30 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 06:13:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0x9) 06:13:30 executing program 4: getpid() sched_setscheduler(0x0, 0xc, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xfffffec6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0x741) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:13:30 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000040), 0x0) 06:13:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 06:13:30 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r2, r1, 0x0, 0x80000008000000a) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) [ 245.186075][ T9212] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 06:13:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000200)=0x5, 0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) 06:13:31 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @empty, [], {@ipv4={0x800, {{0xb, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev, {[@timestamp={0x44, 0x14, 0x5, 0x3, 0x0, [{[@local]}, {[@remote]}]}, @ssrr={0x89, 0x3}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 06:13:31 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 06:13:31 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r2, r1, 0x0, 0x80000008000000a) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) 06:13:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r2, r1, 0x0, 0x80000008000000a) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) 06:13:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000039c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 06:13:31 executing program 0: 06:13:32 executing program 0: 06:13:32 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000271, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000200)="99245b2e6972731d959a35fdda251e35ceb8ee43918959f7dd7b24d017bea99bcdbbb8a6b67464cb73e2a641e8ca5f85c082b2f3692082a4a4ef49fe789ca3ca92403dc6143c6246066422fc8d18fe2d0a90e12cd6c49af49d10783a6e1a45bd59c6c6", 0x30837c0d}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x4) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) 06:13:32 executing program 1: 06:13:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}}) 06:13:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r2, 0x0, 0xa, &(0x7f00006ed000), &(0x7f0000000240)=0x4) 06:13:32 executing program 1: 06:13:32 executing program 0: 06:13:32 executing program 4: 06:13:32 executing program 5: 06:13:32 executing program 2: 06:13:32 executing program 3: 06:13:32 executing program 1: 06:13:32 executing program 0: 06:13:32 executing program 4: 06:13:32 executing program 5: 06:13:32 executing program 2: 06:13:32 executing program 1: 06:13:32 executing program 4: 06:13:32 executing program 5: 06:13:32 executing program 0: 06:13:32 executing program 2: 06:13:32 executing program 1: [ 248.610826][ T309] TX() has been purged, node left! [ 249.325066][ T9345] IPVS: ftp: loaded support on port[0] = 21 [ 249.460864][ T9345] chnl_net:caif_netlink_parms(): no params data found [ 249.491145][ T9345] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.498371][ T9345] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.507553][ T9345] device bridge_slave_0 entered promiscuous mode [ 249.515933][ T9345] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.523020][ T9345] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.530912][ T9345] device bridge_slave_1 entered promiscuous mode [ 249.553941][ T9345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.567417][ T9345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.589928][ T9345] team0: Port device team_slave_0 added [ 249.597263][ T9345] team0: Port device team_slave_1 added [ 249.657619][ T9345] device hsr_slave_0 entered promiscuous mode [ 249.694861][ T9345] device hsr_slave_1 entered promiscuous mode [ 249.754494][ T9345] debugfs: Directory 'hsr0' with parent '/' already present! [ 249.842170][ T9345] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.849274][ T9345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.856652][ T9345] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.863703][ T9345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.909650][ T9345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.923262][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.932524][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.940780][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.950220][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 249.964724][ T9345] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.978287][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.986728][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.993823][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.006450][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.015616][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.022659][ T8983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.111457][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.120811][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.132455][ T8988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.150009][ T9345] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.161084][ T9345] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.178317][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.188762][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.197772][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.217386][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.225047][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.239125][ T9345] 8021q: adding VLAN 0 to HW filter on device batadv0 06:13:36 executing program 3: 06:13:36 executing program 5: 06:13:36 executing program 4: connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x2, @remote, 'gretap0\x00'}}, 0x1e) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @random="611162e996d8"}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x6800) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x1) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x6, &(0x7f0000001380)=[{&(0x7f0000000180)="e0c4e75cf8f4166cb2f5c377e81deb943088b4fad04d5a7670eaa1ab06b5c19d70465d3dff77ddfec419ca001bc71a79dcce8b7ed6301829d1435ab605", 0x3d, 0x3f}, {&(0x7f00000001c0)="6b3d278efaeb62d9854e1d27912ffb0c8b14fd1df976dc3729a1cefc301422a44615db64cb771eed98892ecd51c21db2bc0422df832c0776b2b11390679467b7e4455056a91ec4d2026aafb94583178fdbffe7661f2f4fb601cc69b2", 0x5c, 0x4}, {&(0x7f0000000280)="455ac965271fac622dcd5143264f99842dd297ce062908", 0x17, 0xffff}, {&(0x7f00000002c0)="ffab174e1928be2ab164507fcd071bdec8669907cbb24fa7456dc54504859a3f71f8a204dc14e736f644bec0442e869bf44d9a35291d5ab7658f2ad60e2a0803a4ae137a64", 0x45, 0x2}, {&(0x7f0000000340)="765eb41efa4d998f6bcb866c", 0xc, 0x5}, {&(0x7f0000000380)="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", 0x1000, 0x1b}], 0xc5a031ef8bc6683, &(0x7f0000001440)=ANY=[@ANYBLOB='dots,nocase,dots,nfs=nostale_ro,dots,quiet,dos1xfloppy,dos1xfloppy,roovcontext=system_u,fscontext=system_u,smackfshat=fd/3\x00,\x00']) socket$netlink(0x10, 0x3, 0x0) 06:13:36 executing program 2: 06:13:36 executing program 0: 06:13:36 executing program 1: 06:13:36 executing program 1: 06:13:36 executing program 2: 06:13:36 executing program 0: 06:13:36 executing program 5: 06:13:36 executing program 3: 06:13:36 executing program 5: 06:13:36 executing program 1: 06:13:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 06:13:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000300)=' ', 0x1) 06:13:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_init1(0x0) 06:13:36 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 06:13:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r1, 0x0) 06:13:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)) read(r0, &(0x7f0000000040)=""/11, 0x158) syz_open_pts(r0, 0x4080) 06:13:36 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x4}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = inotify_init() dup2(r1, r0) 06:13:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000001c0)=""/11, 0xb) ptrace(0x4206, r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, r0) 06:13:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) [ 251.169227][ T9406] syz-executor.3 uses old SIOCAX25GETINFO [ 251.193400][ T9408] input: syz1 as /devices/virtual/input/input5 [ 251.281809][ T9408] input: syz1 as /devices/virtual/input/input6 06:13:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 06:13:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fadvise64(r0, 0x0, 0x80000001, 0x4) sched_getscheduler(0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) vmsplice(0xffffffffffffffff, 0x0, 0xfffffffffffffd06, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000008c0)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) 06:13:37 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/udplite\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) 06:13:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) 06:13:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfdd9, 0xfffffeffbff9b7ba, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 06:13:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180)) read(r1, &(0x7f0000000040)=""/11, 0x158) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) syz_open_pts(r1, 0x4080) 06:13:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x1d0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x0) 06:13:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001900)='R', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000480)='I', 0x1}], 0x1}}], 0x2, 0x600d054) 06:13:37 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) [ 251.825508][ T9464] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:13:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001900)="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", 0x541}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)}, {&(0x7f0000000480)='I', 0x1}, {&(0x7f0000000580)=':', 0x25c}], 0x3}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002e40)=[{0x0, 0x4}], 0x1}}], 0x4, 0x600d054) [ 252.039447][ T9476] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:13:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 06:13:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) close(r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 06:13:37 executing program 5: mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) munlockall() 06:13:37 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x400, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x40000000}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820100}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a01283a053520924e46b0b8671fee0d13b434000", @ANYRES16=r2, @ANYBLOB="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"], 0x358}}, 0x4000000) iopl(0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) creat(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x4000) r3 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) ftruncate(r4, 0x2007fff) socket$unix(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = getpgrp(0x0) sched_setparam(r5, &(0x7f0000000080)=0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) write$binfmt_script(r6, 0x0, 0x0) close(0xffffffffffffffff) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:13:37 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0xd, 0x0, 0x8001}}) 06:13:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 06:13:38 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) 06:13:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x1, 0x63, 0x2}], 0xff49) 06:13:38 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) [ 252.600386][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 252.600399][ T26] audit: type=1804 audit(1573971218.254:31): pid=9496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir850040758/syzkaller.qR0ayL/21/memory.events" dev="sda1" ino=16610 res=1 06:13:38 executing program 0: r0 = socket(0x400000000010, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x7a, &(0x7f0000000040)={r2}, &(0x7f00000002c0)=0x18) 06:13:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x38) 06:13:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x64, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000004000000000000000000ffffffff0100000003000000"]}, 0xdc) 06:13:38 executing program 3: clone(0xca0a3280, 0x0, 0x0, 0x0, 0x0) [ 253.149321][ T9496] syz-executor.2 (9496) used greatest stack depth: 22376 bytes left [ 253.204219][ T26] audit: type=1804 audit(1573971218.854:32): pid=9502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir850040758/syzkaller.qR0ayL/21/memory.events" dev="sda1" ino=16610 res=1 [ 253.291498][ T26] audit: type=1804 audit(1573971218.854:33): pid=9511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir850040758/syzkaller.qR0ayL/21/memory.events" dev="sda1" ino=16610 res=1 [ 253.326455][ T26] audit: type=1800 audit(1573971218.854:34): pid=9511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="memory.events" dev="sda1" ino=16610 res=0 06:13:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) close(r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 06:13:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x2, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) 06:13:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 06:13:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x40, 0x0, "15a187697ae50000"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 06:13:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) [ 253.685116][ T26] audit: type=1804 audit(1573971219.334:35): pid=9551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir850040758/syzkaller.qR0ayL/22/memory.events" dev="sda1" ino=16621 res=1 [ 253.711755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 253.711931][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 253.715302][ C0] protocol 88fb is buggy, dev hsr_slave_0 06:13:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sendto$inet(r0, 0x0, 0x1d0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x0) [ 253.991012][ T26] audit: type=1804 audit(1573971219.434:36): pid=9549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir940373337/syzkaller.XEoujn/31/memory.events" dev="sda1" ino=16518 res=1 06:13:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x53adc69e) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x4b564d02, 0x3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaaaaaaaaad28, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:13:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180)) read(r1, &(0x7f0000000040)=""/11, 0x158) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) syz_open_pts(r1, 0x4080) 06:13:39 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)='9', 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') [ 254.407943][ T309] device bridge_slave_1 left promiscuous mode [ 254.474639][ T309] bridge0: port 2(bridge_slave_1) entered disabled state 06:13:40 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x21, &(0x7f0000000000), 0x8) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) 06:13:40 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10200000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 06:13:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfdd9, 0xfffffeffbff9b7ba, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 254.569143][ T309] device bridge_slave_0 left promiscuous mode [ 254.590231][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.773860][ T9605] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:13:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r0, &(0x7f0000002580), 0x309b1ae133b49a7, 0x0) 06:13:40 executing program 3: getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x3, 0x0, @pic={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 06:13:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a00)=@newsa={0x13c, 0x10, 0x963ddcda599079f3, 0x0, 0x0, {{@in, @in6=@local}, {@in6=@loopback, 0x0, 0x33}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 06:13:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/21, 0x15}], 0x10000000000000ca, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000080), 0x5b) 06:13:40 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0xd, 0x0, 0x8001}}) [ 255.246864][ T9631] rtc_cmos 00:00: Alarms can be up to one day in the future 06:13:41 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) pipe(&(0x7f0000000000)) 06:13:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000500), 0x12) 06:13:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/udplite\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) [ 258.284882][ T309] device hsr_slave_0 left promiscuous mode [ 258.324520][ T309] device hsr_slave_1 left promiscuous mode [ 258.384103][ T309] team0 (unregistering): Port device team_slave_1 removed [ 258.405545][ T309] team0 (unregistering): Port device team_slave_0 removed [ 258.426843][ T309] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 258.490417][ T309] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 258.652150][ T309] bond0 (unregistering): Released all slaves 06:13:44 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 06:13:44 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) mincore(&(0x7f0000ffb000/0x1000)=nil, 0x1000, &(0x7f0000000880)=""/229) 06:13:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@enum={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000000c0)=""/136, 0x2e, 0x88, 0x1}, 0x20) 06:13:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) syz_open_pts(r0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 06:13:44 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0xc0045878, 0x0) 06:13:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@enum={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000000c0)=""/136, 0x2e, 0x88, 0x1}, 0x20) 06:13:44 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 400.814494][ T1081] INFO: task :9658 can't die for more than 143 seconds. [ 400.821626][ T1081] R running task 29504 9658 8979 0x00004006 [ 400.841080][ T1081] Call Trace: [ 400.844826][ T1081] __schedule+0x8e9/0x1f30 [ 400.849363][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.859306][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.867383][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.872856][ T1081] ? lockdep_hardirqs_on+0x421/0x5e0 [ 400.883235][ T1081] ? retint_kernel+0x2b/0x2b [ 400.888211][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.893743][ T1081] ? __this_cpu_preempt_check+0x35/0x190 [ 400.905267][ T1081] ? __this_cpu_preempt_check+0x35/0x190 [ 400.910942][ T1081] ? retint_kernel+0x2b/0x2b [ 400.918717][ T1081] ? irq_work_sync+0x106/0x1d0 [ 400.923483][ T1081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.931425][ T1081] ? irq_work_sync+0xd1/0x1d0 [ 400.939208][ T1081] ? _free_event+0x89/0x13b0 [ 400.943798][ T1081] ? __kasan_check_write+0x14/0x20 [ 400.951022][ T1081] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 400.959722][ T1081] ? mark_held_locks+0xa4/0xf0 [ 400.966157][ T1081] ? ring_buffer_attach+0x650/0x650 [ 400.971353][ T1081] ? wait_for_completion+0x440/0x440 [ 400.979802][ T1081] ? put_event+0x47/0x60 [ 400.984059][ T1081] ? perf_event_release_kernel+0x6d5/0xd70 [ 400.991622][ T1081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.001542][ T1081] ? __perf_event_exit_context+0x170/0x170 [ 401.009115][ T1081] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 401.018549][ T1081] ? perf_release+0x37/0x50 [ 401.023280][ T1081] ? __fput+0x2ff/0x890 [ 401.029259][ T1081] ? perf_event_release_kernel+0xd70/0xd70 [ 401.038727][ T1081] ? ____fput+0x16/0x20 [ 401.042906][ T1081] ? task_work_run+0x145/0x1c0 [ 401.049430][ T1081] ? exit_to_usermode_loop+0x316/0x380 [ 401.058548][ T1081] ? do_syscall_64+0x676/0x790 [ 401.063337][ T1081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.071173][ T1081] [ 401.071173][ T1081] Showing all locks held in the system: [ 401.082132][ T1081] 1 lock held by khungtaskd/1081: [ 401.088873][ T1081] #0: ffffffff88faccc0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 401.101663][ T1081] 1 lock held by rsyslogd/8842: [ 401.108298][ T1081] #0: ffff8880a9b89de0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 401.120102][ T1081] 2 locks held by getty/8932: [ 401.127054][ T1081] #0: ffff8880a136b090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.140677][ T1081] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.153169][ T1081] 2 locks held by getty/8933: [ 401.160939][ T1081] #0: ffff8880a76a4090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.171963][ T1081] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.184700][ T1081] 2 locks held by getty/8934: [ 401.189385][ T1081] #0: ffff888096ba2090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.202511][ T1081] #1: ffffc90005f412e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.213103][ T1081] 2 locks held by getty/8935: [ 401.221717][ T1081] #0: ffff88809e99a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.232043][ T1081] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.246173][ T1081] 2 locks held by getty/8936: [ 401.250953][ T1081] #0: ffff8880a3d39090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.263121][ T1081] #1: ffffc90005f3d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.275221][ T1081] 2 locks held by getty/8937: [ 401.282941][ T1081] #0: ffff8880a3e1c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.297398][ T1081] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.313832][ T1081] 2 locks held by getty/8938: [ 401.321817][ T1081] #0: ffff88809fe0c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 401.332623][ T1081] #1: ffffc90005f092e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 401.349944][ T1081] [ 401.352597][ T1081] ============================================= [ 401.352597][ T1081] [ 401.361657][ T1081] NMI backtrace for cpu 0 [ 401.366096][ T1081] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 401.374679][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.384960][ T1081] Call Trace: [ 401.388363][ T1081] dump_stack+0x197/0x210 [ 401.392838][ T1081] nmi_cpu_backtrace.cold+0x70/0xb2 [ 401.398034][ T1081] ? vprintk_func+0x86/0x189 [ 401.402705][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 401.408339][ T1081] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 401.414322][ T1081] arch_trigger_cpumask_backtrace+0x14/0x20 [ 401.420910][ T1081] watchdog+0xc8f/0x1350 [ 401.425148][ T1081] kthread+0x361/0x430 [ 401.429426][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 401.434991][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 401.441066][ T1081] ret_from_fork+0x24/0x30 [ 401.445677][ T1081] Sending NMI from CPU 0 to CPUs 1: [ 401.451704][ C1] NMI backtrace for cpu 1 [ 401.451711][ C1] CPU: 1 PID: 9658 Comm: Not tainted 5.4.0-rc7-next-20191115 #0 [ 401.451716][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.451720][ C1] RIP: 0010:irq_work_sync+0xd3/0x1d0 [ 401.451729][ C1] Code: f5 ff 4d 89 e6 4d 89 e5 48 b8 00 00 00 00 00 fc ff df 49 c1 ee 03 41 83 e5 07 49 01 c6 41 83 c5 03 eb 07 e8 7f 87 f5 ff f3 90 78 87 f5 ff be 04 00 00 00 4c 89 e7 e8 ab a6 31 00 41 0f b6 06 [ 401.451733][ C1] RSP: 0018:ffff88805cba7c08 EFLAGS: 00000246 [ 401.451740][ C1] RAX: 0000000000040000 RBX: 0000000000000002 RCX: ffffc9000edb0000 [ 401.451745][ C1] RDX: 0000000000040000 RSI: ffffffff817e51c1 RDI: 0000000000000005 [ 401.451750][ C1] RBP: ffff88805cba7c28 R08: ffff88805d17c1c0 R09: ffffed10136fa682 [ 401.451754][ C1] R10: ffffed10136fa681 R11: ffff88809b7d340b R12: ffff88809b7d3408 [ 401.451759][ C1] R13: 0000000000000003 R14: ffffed10136fa681 R15: ffff88805cba7cc8 [ 401.451764][ C1] FS: 00007f1d265c2700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 401.451768][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.451772][ C1] CR2: 000000c4337fb010 CR3: 000000008dc2f000 CR4: 00000000001406e0 [ 401.451777][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.451782][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 401.451784][ C1] Call Trace: [ 401.451787][ C1] _free_event+0x89/0x13b0 [ 401.451791][ C1] ? __kasan_check_write+0x14/0x20 [ 401.451794][ C1] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 401.451797][ C1] ? mark_held_locks+0xa4/0xf0 [ 401.451800][ C1] ? ring_buffer_attach+0x650/0x650 [ 401.451803][ C1] ? wait_for_completion+0x440/0x440 [ 401.451806][ C1] put_event+0x47/0x60 [ 401.451810][ C1] perf_event_release_kernel+0x6d5/0xd70 [ 401.451814][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.451817][ C1] ? __perf_event_exit_context+0x170/0x170 [ 401.451821][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 401.451824][ C1] perf_release+0x37/0x50 [ 401.451827][ C1] __fput+0x2ff/0x890 [ 401.451830][ C1] ? perf_event_release_kernel+0xd70/0xd70 [ 401.451833][ C1] ____fput+0x16/0x20 [ 401.451836][ C1] task_work_run+0x145/0x1c0 [ 401.451839][ C1] exit_to_usermode_loop+0x316/0x380 [ 401.451842][ C1] do_syscall_64+0x676/0x790 [ 401.451846][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.451849][ C1] RIP: 0033:0x45a639 [ 401.451858][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.451862][ C1] RSP: 002b:00007f1d265c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 401.451870][ C1] RAX: 0000000020000000 RBX: 0000000000000006 RCX: 000000000045a639 [ 401.451874][ C1] RDX: 0000000000010006 RSI: 0000000000003000 RDI: 0000000020000000 [ 401.451879][ C1] RBP: 000000000075c118 R08: 0000000000000006 R09: 0000000000000000 [ 401.451883][ C1] R10: 0000000000080011 R11: 0000000000000246 R12: 00007f1d265c26d4 [ 401.451888][ C1] R13: 00000000004c705c R14: 00000000004dc7f8 R15: 00000000ffffffff [ 401.468541][ T1081] Kernel panic - not syncing: hung_task: blocked tasks [ 401.771529][ T1081] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 401.780277][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.790322][ T1081] Call Trace: [ 401.793603][ T1081] dump_stack+0x197/0x210 [ 401.797931][ T1081] panic+0x2e3/0x75c [ 401.801814][ T1081] ? add_taint.cold+0x16/0x16 [ 401.806480][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 401.812100][ T1081] ? ___preempt_schedule+0x16/0x18 [ 401.817206][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 401.823348][ T1081] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 401.829504][ T1081] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 401.835691][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 401.841842][ T1081] watchdog+0xca0/0x1350 [ 401.846077][ T1081] kthread+0x361/0x430 [ 401.850130][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 401.855681][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 401.861422][ T1081] ret_from_fork+0x24/0x30 [ 401.867404][ T1081] Kernel Offset: disabled [ 401.871753][ T1081] Rebooting in 86400 seconds..