[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.263553][ T26] audit: type=1800 audit(1573741546.298:25): pid=8945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.291647][ T26] audit: type=1800 audit(1573741546.298:26): pid=8945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.336514][ T26] audit: type=1800 audit(1573741546.298:27): pid=8945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.201' (ECDSA) to the list of known hosts. 2019/11/14 14:25:56 fuzzer started 2019/11/14 14:25:58 dialing manager at 10.128.0.26:45149 2019/11/14 14:25:58 syscalls: 2566 2019/11/14 14:25:58 code coverage: enabled 2019/11/14 14:25:58 comparison tracing: enabled 2019/11/14 14:25:58 extra coverage: enabled 2019/11/14 14:25:58 setuid sandbox: enabled 2019/11/14 14:25:58 namespace sandbox: enabled 2019/11/14 14:25:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/14 14:25:58 fault injection: enabled 2019/11/14 14:25:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/14 14:25:58 net packet injection: enabled 2019/11/14 14:25:58 net device setup: enabled 2019/11/14 14:25:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/14 14:25:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:28:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) dup3(r1, r0, 0x0) 14:28:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="f800000016001703000000000000000000000000000000000000000000000001000000000000ed8d7f00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8800000000000000000000000000010000000033000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002abd7000"/176], 0xf8}}, 0x0) syzkaller login: [ 212.668414][ T9115] IPVS: ftp: loaded support on port[0] = 21 14:28:18 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000140)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000200)='./bus/file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlink(&(0x7f00000001c0)='./bus/file0\x00') [ 212.811932][ T9117] IPVS: ftp: loaded support on port[0] = 21 [ 212.887423][ T9115] chnl_net:caif_netlink_parms(): no params data found [ 213.012754][ T9115] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.021013][ T9115] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.035788][ T9115] device bridge_slave_0 entered promiscuous mode [ 213.062322][ T9115] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.069535][ T9115] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.072925][ T9120] IPVS: ftp: loaded support on port[0] = 21 [ 213.084031][ T9115] device bridge_slave_1 entered promiscuous mode [ 213.160587][ T9117] chnl_net:caif_netlink_parms(): no params data found [ 213.187792][ T9115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:28:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) [ 213.215111][ T9115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.344619][ T9115] team0: Port device team_slave_0 added [ 213.360446][ T9117] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.368400][ T9117] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.378673][ T9117] device bridge_slave_0 entered promiscuous mode [ 213.390256][ T9115] team0: Port device team_slave_1 added [ 213.442261][ T9117] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.449517][ T9117] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.473934][ T9117] device bridge_slave_1 entered promiscuous mode 14:28:19 executing program 4: setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0x1}, 0x18) socket$netlink(0x10, 0x3, 0x7) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080)=0x15, 0x4) [ 213.536339][ T9124] IPVS: ftp: loaded support on port[0] = 21 [ 213.564805][ T9115] device hsr_slave_0 entered promiscuous mode [ 213.621162][ T9115] device hsr_slave_1 entered promiscuous mode [ 213.716579][ T9117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.738082][ T9120] chnl_net:caif_netlink_parms(): no params data found 14:28:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getcwd(&(0x7f0000000080)=""/214, 0xd6) [ 213.769244][ T9126] IPVS: ftp: loaded support on port[0] = 21 [ 213.784981][ T9117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.877422][ T9120] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.901799][ T9120] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.909747][ T9120] device bridge_slave_0 entered promiscuous mode [ 213.920280][ T9117] team0: Port device team_slave_0 added [ 213.928740][ T9117] team0: Port device team_slave_1 added [ 213.935044][ T9115] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 214.005932][ T9115] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 214.082344][ T9120] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.089540][ T9120] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.098006][ T9120] device bridge_slave_1 entered promiscuous mode [ 214.118908][ T9115] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 214.130512][ T9128] IPVS: ftp: loaded support on port[0] = 21 [ 214.185815][ T9115] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 214.250370][ T9120] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.314060][ T9117] device hsr_slave_0 entered promiscuous mode [ 214.352698][ T9117] device hsr_slave_1 entered promiscuous mode [ 214.401049][ T9117] debugfs: Directory 'hsr0' with parent '/' already present! [ 214.410200][ T9120] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.476254][ T9120] team0: Port device team_slave_0 added [ 214.485270][ T9120] team0: Port device team_slave_1 added [ 214.588344][ T9124] chnl_net:caif_netlink_parms(): no params data found [ 214.600246][ T9117] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 214.664316][ T9117] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 214.725837][ T9117] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 214.804053][ T9117] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 214.904133][ T9120] device hsr_slave_0 entered promiscuous mode [ 214.931297][ T9120] device hsr_slave_1 entered promiscuous mode [ 214.970893][ T9120] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.060020][ T9126] chnl_net:caif_netlink_parms(): no params data found [ 215.172099][ T9120] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 215.226861][ T9120] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 215.287090][ T9124] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.294377][ T9124] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.303464][ T9124] device bridge_slave_0 entered promiscuous mode [ 215.313313][ T9124] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.320388][ T9124] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.329367][ T9124] device bridge_slave_1 entered promiscuous mode [ 215.347801][ T9120] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 215.413228][ T9128] chnl_net:caif_netlink_parms(): no params data found [ 215.441929][ T9115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.449269][ T9120] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 215.506961][ T9124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.537927][ T9124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.556235][ T9126] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.563529][ T9126] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.573558][ T9126] device bridge_slave_0 entered promiscuous mode [ 215.590600][ T9115] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.603148][ T9126] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.610242][ T9126] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.621382][ T9126] device bridge_slave_1 entered promiscuous mode [ 215.640608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.649761][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.662287][ T9117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.687630][ T9124] team0: Port device team_slave_0 added [ 215.719657][ T9117] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.736846][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.746469][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.755571][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.762990][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.771450][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.780010][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.788764][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.795907][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.803758][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.812615][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.821775][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.829494][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.838629][ T9124] team0: Port device team_slave_1 added [ 215.852591][ T9126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.865268][ T9126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.874767][ T9128] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.882042][ T9128] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.889759][ T9128] device bridge_slave_0 entered promiscuous mode [ 215.902047][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.921275][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.932517][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.954792][ T9128] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.962964][ T9128] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.971115][ T9128] device bridge_slave_1 entered promiscuous mode [ 216.054836][ T9124] device hsr_slave_0 entered promiscuous mode [ 216.101234][ T9124] device hsr_slave_1 entered promiscuous mode [ 216.150998][ T9124] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.159324][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.167632][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.177118][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.185731][ T2971] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.193105][ T2971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.201586][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.210257][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.218951][ T2971] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.226046][ T2971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.236536][ T9126] team0: Port device team_slave_0 added [ 216.250375][ T9126] team0: Port device team_slave_1 added [ 216.270360][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.278841][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.288980][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.298490][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.307446][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.316310][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.347371][ T9128] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.361756][ T9128] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.397553][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.406577][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.437436][ T9128] team0: Port device team_slave_0 added [ 216.494381][ T9126] device hsr_slave_0 entered promiscuous mode [ 216.561279][ T9126] device hsr_slave_1 entered promiscuous mode [ 216.610855][ T9126] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.619451][ T9115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.630230][ T9128] team0: Port device team_slave_1 added [ 216.647445][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.673938][ T9124] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 216.787555][ T9128] device hsr_slave_0 entered promiscuous mode [ 216.851380][ T9128] device hsr_slave_1 entered promiscuous mode [ 216.890908][ T9128] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.914001][ T9124] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 216.956624][ T9124] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 217.008337][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.017463][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.026275][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.035774][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.044846][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.052867][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.060329][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.069060][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.082374][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.093711][ T9115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.109581][ T9120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.135445][ T9124] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 217.201560][ T9126] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 217.244600][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.254549][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.264986][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.288323][ T9120] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.295972][ T9126] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 217.358353][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.372171][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.408492][ T9126] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 217.441843][ C0] hrtimer: interrupt took 33211 ns 14:28:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) dup3(r1, r0, 0x0) [ 217.453236][ T9126] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 217.534014][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.559878][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.570547][ T9130] bridge0: port 1(bridge_slave_0) entered blocking state 14:28:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) dup3(r1, r0, 0x0) [ 217.577705][ T9130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.586866][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.597205][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.606366][ T9130] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.613516][ T9130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.622001][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 14:28:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) dup3(r1, r0, 0x0) [ 217.632853][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.660913][ T9128] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 217.703349][ T9128] netdevsim netdevsim5 netdevsim1: renamed from eth1 14:28:23 executing program 0: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) [ 217.757672][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.768195][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.780550][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.792845][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.806153][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.827237][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.837864][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 14:28:23 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) [ 217.855505][ T9117] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.866129][ T9128] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 217.913787][ T9128] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 217.928402][ T9155] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 217.983452][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.019620][ T9120] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.046692][ T9120] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.086499][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.122926][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 14:28:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="f800000016001703000000000000000000000000000000000000000000000001000000000000ed8d7f00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8800000000000000000000000000010000000033000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002abd7000"/176], 0xf8}}, 0x0) [ 218.172202][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.200846][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.261010][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.268914][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.301237][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.324706][ T9124] 8021q: adding VLAN 0 to HW filter on device bond0 14:28:24 executing program 1: open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) gettid() ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x100) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x7fffffffffffffc, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x0, 0x0, 0x800}) syz_open_dev$loop(0x0, 0x0, 0x0) 14:28:24 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) [ 218.406549][ T9120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.475558][ T9126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.518300][ T9124] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.563128][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.594402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.666326][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.679113][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.702908][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.726484][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.744981][ T2971] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.752193][ T2971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.767245][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.779438][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.803683][ T2971] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.810867][ T2971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.828228][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.839762][ T9126] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.878588][ T9128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.912685][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.923061][ T9173] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 218.952772][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.967786][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.977912][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.996637][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.010538][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.025429][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.036663][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 14:28:25 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) [ 219.069825][ T9128] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.098339][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.142584][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.163888][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.183361][ T2971] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.190543][ T2971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.205131][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.215183][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.224101][ T2971] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.231274][ T2971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.239649][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.249385][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.259086][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.267105][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.282083][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.303794][ T9124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.326979][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.335341][ T9181] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 219.337908][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.363755][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.373107][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.381955][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.391972][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.400884][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.409447][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.418963][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.427845][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.448494][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.490088][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.502679][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.524346][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.537884][ T9130] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.545048][ T9130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.560252][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.569480][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.584220][ T9130] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.591374][ T9130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.606185][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.615268][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.627875][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.672340][ T9124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.681311][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.691604][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.706824][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.717606][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.734560][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.749418][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.800953][ T9126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.811493][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.827183][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.843112][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.853102][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.862553][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.880908][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.889678][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.908130][ T9128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.958249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.977556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.004385][ T9128] 8021q: adding VLAN 0 to HW filter on device batadv0 14:28:26 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) [ 220.123878][ T9200] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:28:26 executing program 4: setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0x1}, 0x18) socket$netlink(0x10, 0x3, 0x7) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080)=0x15, 0x4) 14:28:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) 14:28:26 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) 14:28:26 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 14:28:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000100)=@caif=@dgm, 0x0, &(0x7f0000000800)=[{&(0x7f0000000180)=""/217}, {&(0x7f0000000280)=""/162}, {&(0x7f0000000340)=""/17}, {&(0x7f0000000380)=""/215}, {&(0x7f0000000480)=""/179}, {&(0x7f0000000540)=""/213}, {&(0x7f0000000640)=""/212}, {&(0x7f0000000740)=""/142}], 0x0, &(0x7f0000000880)=""/69}}, {{&(0x7f0000000900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/151}, {&(0x7f0000000a40)=""/44}], 0x0, &(0x7f0000000ac0)=""/207}}, {{&(0x7f0000000bc0)=@caif=@dgm, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/56}, {&(0x7f0000000c80)=""/167}, {&(0x7f0000000d40)=""/149}], 0x0, &(0x7f0000000e40)=""/36}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/255}, {&(0x7f0000000f80)=""/158}, {&(0x7f0000001040)=""/99}, {&(0x7f00000010c0)=""/8}, {&(0x7f0000001100)=""/112}, {&(0x7f0000001180)=""/168}, {&(0x7f0000001240)=""/17}]}}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @local}, 0x0, &(0x7f0000001680)=[{&(0x7f0000001380)=""/161}, {&(0x7f0000001440)=""/77}, {&(0x7f00000014c0)=""/245}, {&(0x7f00000015c0)=""/93}, {&(0x7f0000001640)=""/55}], 0x0, &(0x7f0000001700)=""/73}}, {{&(0x7f0000001780)=@sco, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/218}], 0x0, &(0x7f0000001940)=""/40}}], 0x460, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x40, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) syz_open_dev$loop(0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 14:28:26 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) 14:28:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000005480)) 14:28:26 executing program 2: r0 = memfd_create(&(0x7f0000000000)='\x04\x00\x00\x00oduvppp\x95rlo\\wlan1/}\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x1, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0xfffffffffffffe00}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/packet\x00') 14:28:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:28:26 executing program 4: setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0x1}, 0x18) socket$netlink(0x10, 0x3, 0x7) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080)=0x15, 0x4) 14:28:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 14:28:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 221.086512][ T9243] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 221.171396][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.177678][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 221.222337][ T9243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:28:27 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(r1, &(0x7f00000001c0), 0x10000026f) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 221.292984][ T9243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:28:27 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16C\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0xf26f9cb959fab63d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000800), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') lseek(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)='system_u:object_r:sshd_exec_t:s0\x00', 0x21, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141242, 0x60) ftruncate(r2, 0x800fe) sendfile(r4, r6, 0x0, 0x8000fffffffe) 14:28:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x62, 0xa, 0xff00}, [], {0x95, 0x0, 0x6c}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 221.810834][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.816677][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 221.822585][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.828364][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 221.870060][ T9270] BPF:hdr_len not found 14:28:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 14:28:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000100)=@caif=@dgm, 0x0, &(0x7f0000000800)=[{&(0x7f0000000180)=""/217}, {&(0x7f0000000280)=""/162}, {&(0x7f0000000340)=""/17}, {&(0x7f0000000380)=""/215}, {&(0x7f0000000480)=""/179}, {&(0x7f0000000540)=""/213}, {&(0x7f0000000640)=""/212}, {&(0x7f0000000740)=""/142}], 0x0, &(0x7f0000000880)=""/69}}, {{&(0x7f0000000900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/151}, {&(0x7f0000000a40)=""/44}], 0x0, &(0x7f0000000ac0)=""/207}}, {{&(0x7f0000000bc0)=@caif=@dgm, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/56}, {&(0x7f0000000c80)=""/167}, {&(0x7f0000000d40)=""/149}], 0x0, &(0x7f0000000e40)=""/36}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/255}, {&(0x7f0000000f80)=""/158}, {&(0x7f0000001040)=""/99}, {&(0x7f00000010c0)=""/8}, {&(0x7f0000001100)=""/112}, {&(0x7f0000001180)=""/168}, {&(0x7f0000001240)=""/17}]}}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @local}, 0x0, &(0x7f0000001680)=[{&(0x7f0000001380)=""/161}, {&(0x7f0000001440)=""/77}, {&(0x7f00000014c0)=""/245}, {&(0x7f00000015c0)=""/93}, {&(0x7f0000001640)=""/55}], 0x0, &(0x7f0000001700)=""/73}}, {{&(0x7f0000001780)=@sco, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/218}], 0x0, &(0x7f0000001940)=""/40}}], 0x460, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x40, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) syz_open_dev$loop(0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 14:28:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:28:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), 0x14) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x80000000002c00) 14:28:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 222.453708][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 222.460319][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:28:28 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="a0000000e6be87d887cd1ba564baf39f9fbfb748414ff2a81f019d649ea53ac0c164c514c950ffa7992e64d29b723482db654f6386a282b3c7789fac02c57f4f9c0ac984e224f4917a7611bf660c2e3abcc1609c4ee9242bc869c04640603f3706a2291d8440ab7068153f819e389afcff2013fbc72804e57b29224221c0fecbfcf74306a2c53de4c598124e1115031d2c39ed5bcd1a8e83b1a9b52286eaff22f114acb9"], &(0x7f0000000340)=0xa8) [ 222.520216][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 222.520230][ T26] audit: type=1800 audit(1573741708.548:31): pid=9297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16549 res=0 14:28:28 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(r1, &(0x7f00000001c0), 0x10000026f) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:28:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) [ 222.771104][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 222.776978][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:28:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_procfs(0x0, 0x0) gettid() ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) r0 = dup(0xffffffffffffffff) read$FUSE(r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x277b, 0xfffffffffffffffe}) syz_open_dev$loop(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 14:28:29 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() getpid() r1 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) accept4$inet6(r1, 0x0, &(0x7f00000001c0), 0x80000) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, &(0x7f0000000000)) 14:28:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 14:28:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000100)=@caif=@dgm, 0x0, &(0x7f0000000800)=[{&(0x7f0000000180)=""/217}, {&(0x7f0000000280)=""/162}, {&(0x7f0000000340)=""/17}, {&(0x7f0000000380)=""/215}, {&(0x7f0000000480)=""/179}, {&(0x7f0000000540)=""/213}, {&(0x7f0000000640)=""/212}, {&(0x7f0000000740)=""/142}], 0x0, &(0x7f0000000880)=""/69}}, {{&(0x7f0000000900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/151}, {&(0x7f0000000a40)=""/44}], 0x0, &(0x7f0000000ac0)=""/207}}, {{&(0x7f0000000bc0)=@caif=@dgm, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/56}, {&(0x7f0000000c80)=""/167}, {&(0x7f0000000d40)=""/149}], 0x0, &(0x7f0000000e40)=""/36}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/255}, {&(0x7f0000000f80)=""/158}, {&(0x7f0000001040)=""/99}, {&(0x7f00000010c0)=""/8}, {&(0x7f0000001100)=""/112}, {&(0x7f0000001180)=""/168}, {&(0x7f0000001240)=""/17}]}}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @local}, 0x0, &(0x7f0000001680)=[{&(0x7f0000001380)=""/161}, {&(0x7f0000001440)=""/77}, {&(0x7f00000014c0)=""/245}, {&(0x7f00000015c0)=""/93}, {&(0x7f0000001640)=""/55}], 0x0, &(0x7f0000001700)=""/73}}, {{&(0x7f0000001780)=@sco, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/218}], 0x0, &(0x7f0000001940)=""/40}}], 0x460, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x40, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) syz_open_dev$loop(0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) [ 223.223434][ T9319] debugfs: File 'dropped' in directory 'loop0' already present! [ 223.269605][ T9319] debugfs: File 'msg' in directory 'loop0' already present! [ 223.395227][ T9319] debugfs: File 'trace0' in directory 'loop0' already present! 14:28:29 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 14:28:29 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0xe88eafe37dcada71, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x2020000002a277c, 0x0) readlinkat(r2, &(0x7f000090fff8)='./file0\x00', &(0x7f0000728000)=""/145, 0x4) 14:28:29 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(r1, &(0x7f00000001c0), 0x10000026f) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:28:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 14:28:29 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 14:28:30 executing program 1: io_setup(0x5, &(0x7f0000000180)=0x0) r1 = socket(0x10, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 14:28:30 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) 14:28:30 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0x2100001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='./file1\x00') setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file2\x00', 0x0, &(0x7f0000000080)={'\x0e\x00', 0x3b}, 0xfffffffffffffe1f, 0x2) timer_create(0x0, 0x0, 0x0) 14:28:30 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x86, &(0x7f000000a000)) 14:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000100)=@caif=@dgm, 0x0, &(0x7f0000000800)=[{&(0x7f0000000180)=""/217}, {&(0x7f0000000280)=""/162}, {&(0x7f0000000340)=""/17}, {&(0x7f0000000380)=""/215}, {&(0x7f0000000480)=""/179}, {&(0x7f0000000540)=""/213}, {&(0x7f0000000640)=""/212}, {&(0x7f0000000740)=""/142}], 0x0, &(0x7f0000000880)=""/69}}, {{&(0x7f0000000900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/151}, {&(0x7f0000000a40)=""/44}], 0x0, &(0x7f0000000ac0)=""/207}}, {{&(0x7f0000000bc0)=@caif=@dgm, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/56}, {&(0x7f0000000c80)=""/167}, {&(0x7f0000000d40)=""/149}], 0x0, &(0x7f0000000e40)=""/36}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/255}, {&(0x7f0000000f80)=""/158}, {&(0x7f0000001040)=""/99}, {&(0x7f00000010c0)=""/8}, {&(0x7f0000001100)=""/112}, {&(0x7f0000001180)=""/168}, {&(0x7f0000001240)=""/17}]}}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @local}, 0x0, &(0x7f0000001680)=[{&(0x7f0000001380)=""/161}, {&(0x7f0000001440)=""/77}, {&(0x7f00000014c0)=""/245}, {&(0x7f00000015c0)=""/93}, {&(0x7f0000001640)=""/55}], 0x0, &(0x7f0000001700)=""/73}}, {{&(0x7f0000001780)=@sco, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/218}], 0x0, &(0x7f0000001940)=""/40}}], 0x460, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x40, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) syz_open_dev$loop(0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) [ 383.731006][ T1067] INFO: task :9334 can't die for more than 143 seconds. [ 383.738188][ T1067] R running task 28144 9334 9126 0x00004006 [ 383.754819][ T1067] Call Trace: [ 383.758154][ T1067] __schedule+0x8e9/0x1f30 [ 383.765206][ T1067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.775603][ T1067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.781973][ T1067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.787438][ T1067] ? lockdep_hardirqs_on+0x421/0x5e0 [ 383.796443][ T1067] ? retint_kernel+0x2b/0x2b [ 383.802043][ T1067] ? retint_kernel+0x2b/0x2b [ 383.806669][ T1067] ? trace_hardirqs_on_caller+0x6a/0x240 [ 383.816046][ T1067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.822463][ T1067] ? preempt_schedule_irq+0xf3/0x160 [ 383.827749][ T1067] ? retint_kernel+0x2b/0x2b [ 383.836498][ T1067] ? irq_work_sync+0x106/0x1d0 [ 383.842272][ T1067] ? irq_work_sync+0xd1/0x1d0 [ 383.846966][ T1067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.856980][ T1067] ? irq_work_sync+0x106/0x1d0 [ 383.862985][ T1067] ? _free_event+0x89/0x13b0 [ 383.867619][ T1067] ? __kasan_check_write+0x14/0x20 [ 383.876775][ T1067] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 383.883285][ T1067] ? mark_held_locks+0xa4/0xf0 [ 383.888065][ T1067] ? ring_buffer_attach+0x650/0x650 [ 383.898428][ T1067] ? wait_for_completion+0x440/0x440 [ 383.904672][ T1067] ? put_event+0x47/0x60 [ 383.908914][ T1067] ? perf_event_release_kernel+0x6d5/0xd70 [ 383.918431][ T1067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.925631][ T1067] ? __perf_event_exit_context+0x170/0x170 [ 383.935234][ T1067] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 383.942716][ T1067] ? perf_release+0x37/0x50 [ 383.947219][ T1067] ? __fput+0x2ff/0x890 [ 383.955123][ T1067] ? perf_event_release_kernel+0xd70/0xd70 [ 383.961908][ T1067] ? ____fput+0x16/0x20 [ 383.966063][ T1067] ? task_work_run+0x145/0x1c0 [ 383.975154][ T1067] ? exit_to_usermode_loop+0x316/0x380 [ 383.980622][ T1067] ? do_syscall_64+0x65f/0x760 [ 383.986455][ T1067] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.996788][ T1067] [ 383.996788][ T1067] Showing all locks held in the system: [ 384.005476][ T1067] 1 lock held by khungtaskd/1067: [ 384.010494][ T1067] #0: ffffffff88fac6c0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 384.025081][ T1067] 1 lock held by rsyslogd/8983: [ 384.029944][ T1067] #0: ffff8880a4c31360 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 384.038726][ T1067] 2 locks held by getty/9073: [ 384.047914][ T1067] #0: ffff8880a0b77090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.058162][ T1067] #1: ffffc90005f3d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.072725][ T1067] 2 locks held by getty/9074: [ 384.077421][ T1067] #0: ffff8880a87ab090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.089087][ T1067] #1: ffffc90005f5f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.103498][ T1067] 2 locks held by getty/9075: [ 384.108222][ T1067] #0: ffff8880a0874090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.119085][ T1067] #1: ffffc90005f412e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.133555][ T1067] 2 locks held by getty/9076: [ 384.138272][ T1067] #0: ffff8880a08ae090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.148927][ T1067] #1: ffffc90005f632e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.164006][ T1067] 2 locks held by getty/9077: [ 384.168712][ T1067] #0: ffff88809127c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.179434][ T1067] #1: ffffc90005f572e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.194481][ T1067] 2 locks held by getty/9078: [ 384.199197][ T1067] #0: ffff888095548090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.209391][ T1067] #1: ffffc90005f4f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.224794][ T1067] 2 locks held by getty/9079: [ 384.229535][ T1067] #0: ffff88809a558090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 384.238684][ T1067] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 384.252795][ T1067] [ 384.255165][ T1067] ============================================= [ 384.255165][ T1067] [ 384.265896][ T1067] NMI backtrace for cpu 0 [ 384.270253][ T1067] CPU: 0 PID: 1067 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191113 #0 [ 384.278915][ T1067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.289411][ T1067] Call Trace: [ 384.292697][ T1067] dump_stack+0x197/0x210 [ 384.297019][ T1067] nmi_cpu_backtrace.cold+0x70/0xb2 [ 384.302205][ T1067] ? vprintk_func+0x86/0x189 [ 384.306785][ T1067] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 384.312424][ T1067] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 384.318438][ T1067] arch_trigger_cpumask_backtrace+0x14/0x20 [ 384.324343][ T1067] watchdog+0xc8f/0x1350 [ 384.328589][ T1067] kthread+0x361/0x430 [ 384.332652][ T1067] ? reset_hung_task_detector+0x30/0x30 [ 384.338194][ T1067] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 384.343916][ T1067] ret_from_fork+0x24/0x30 [ 384.348532][ T1067] Sending NMI from CPU 0 to CPUs 1: [ 384.354164][ C1] NMI backtrace for cpu 1 [ 384.354170][ C1] CPU: 1 PID: 9334 Comm: Not tainted 5.4.0-rc7-next-20191113 #0 [ 384.354175][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.354178][ C1] RIP: 0010:irq_work_sync+0xd3/0x1d0 [ 384.354188][ C1] Code: f5 ff 4d 89 e6 4d 89 e5 48 b8 00 00 00 00 00 fc ff df 49 c1 ee 03 41 83 e5 07 49 01 c6 41 83 c5 03 eb 07 e8 6f 8c f5 ff f3 90 68 8c f5 ff be 04 00 00 00 4c 89 e7 e8 eb 8d 31 00 41 0f b6 06 [ 384.354191][ C1] RSP: 0018:ffff8880570c7c08 EFLAGS: 00000293 [ 384.354198][ C1] RAX: ffff8880570ba4c0 RBX: 0000000000000002 RCX: ffffffff817e1f96 [ 384.354203][ C1] RDX: 0000000000000000 RSI: ffffffff817e1f61 RDI: 0000000000000005 [ 384.354207][ C1] RBP: ffff8880570c7c28 R08: ffff8880570ba4c0 R09: ffffed1014283681 [ 384.354211][ C1] R10: ffffed1014283680 R11: ffff8880a141b403 R12: ffff8880a141b400 [ 384.354215][ C1] R13: 0000000000000003 R14: ffffed1014283680 R15: ffff8880570c7cc8 [ 384.354220][ C1] FS: 0000000001a19940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 384.354224][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 384.354228][ C1] CR2: ffffffffff600400 CR3: 0000000098ccd000 CR4: 00000000001406e0 [ 384.354232][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 384.354237][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 384.354239][ C1] Call Trace: [ 384.354242][ C1] _free_event+0x89/0x13b0 [ 384.354245][ C1] ? __kasan_check_write+0x14/0x20 [ 384.354249][ C1] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 384.354252][ C1] ? mark_held_locks+0xa4/0xf0 [ 384.354255][ C1] ? ring_buffer_attach+0x650/0x650 [ 384.354258][ C1] ? wait_for_completion+0x440/0x440 [ 384.354261][ C1] put_event+0x47/0x60 [ 384.354264][ C1] perf_event_release_kernel+0x6d5/0xd70 [ 384.354267][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.354271][ C1] ? __perf_event_exit_context+0x170/0x170 [ 384.354274][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 384.354277][ C1] perf_release+0x37/0x50 [ 384.354280][ C1] __fput+0x2ff/0x890 [ 384.354290][ C1] ? perf_event_release_kernel+0xd70/0xd70 [ 384.354293][ C1] ____fput+0x16/0x20 [ 384.354296][ C1] task_work_run+0x145/0x1c0 [ 384.354299][ C1] exit_to_usermode_loop+0x316/0x380 [ 384.354302][ C1] do_syscall_64+0x65f/0x760 [ 384.354305][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.354308][ C1] RIP: 0033:0x4141f1 [ 384.354317][ C1] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 384.354321][ C1] RSP: 002b:00007ffe78314840 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 384.354328][ C1] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004141f1 [ 384.354332][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 384.354337][ C1] RBP: 0000000000000001 R08: 00000000d1170490 R09: 00000000d1170494 [ 384.354341][ C1] R10: 00007ffe78314920 R11: 0000000000000293 R12: 000000000075c9a0 [ 384.354345][ C1] R13: 000000000075c9a0 R14: 0000000000761580 R15: 000000000075bf2c [ 384.365399][ T1067] Kernel panic - not syncing: hung_task: blocked tasks [ 384.664992][ T1067] CPU: 0 PID: 1067 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191113 #0 [ 384.673557][ T1067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.683599][ T1067] Call Trace: [ 384.686913][ T1067] dump_stack+0x197/0x210 [ 384.691837][ T1067] panic+0x2e3/0x75c [ 384.695714][ T1067] ? add_taint.cold+0x16/0x16 [ 384.700377][ T1067] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 384.706003][ T1067] ? ___preempt_schedule+0x16/0x18 [ 384.711101][ T1067] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 384.717241][ T1067] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 384.723383][ T1067] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 384.729532][ T1067] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 384.735770][ T1067] watchdog+0xca0/0x1350 [ 384.740110][ T1067] kthread+0x361/0x430 [ 384.744171][ T1067] ? reset_hung_task_detector+0x30/0x30 [ 384.749703][ T1067] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 384.755412][ T1067] ret_from_fork+0x24/0x30 [ 384.761602][ T1067] Kernel Offset: disabled [ 384.765991][ T1067] Rebooting in 86400 seconds..