[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.464570][ T26] audit: type=1800 audit(1572905364.239:25): pid=8505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.486212][ T26] audit: type=1800 audit(1572905364.239:26): pid=8505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.522330][ T26] audit: type=1800 audit(1572905364.239:27): pid=8505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. 2019/11/04 22:09:36 fuzzer started 2019/11/04 22:09:37 dialing manager at 10.128.0.26:42879 2019/11/04 22:09:37 syscalls: 2566 2019/11/04 22:09:37 code coverage: enabled 2019/11/04 22:09:37 comparison tracing: enabled 2019/11/04 22:09:37 extra coverage: extra coverage is not supported by the kernel 2019/11/04 22:09:37 setuid sandbox: enabled 2019/11/04 22:09:37 namespace sandbox: enabled 2019/11/04 22:09:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 22:09:37 fault injection: enabled 2019/11/04 22:09:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 22:09:37 net packet injection: enabled 2019/11/04 22:09:37 net device setup: enabled 2019/11/04 22:09:37 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/04 22:09:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:11:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='skcipher\x00', &(0x7f0000000180)='./file0\x00', r1) syzkaller login: [ 186.562764][ T8672] IPVS: ftp: loaded support on port[0] = 21 22:11:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) [ 186.704730][ T8672] chnl_net:caif_netlink_parms(): no params data found [ 186.739125][ T8675] IPVS: ftp: loaded support on port[0] = 21 [ 186.802243][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.810486][ T8672] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.818919][ T8672] device bridge_slave_0 entered promiscuous mode [ 186.829695][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.837329][ T8672] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.845218][ T8672] device bridge_slave_1 entered promiscuous mode [ 186.873382][ T8672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.886729][ T8672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:11:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) [ 186.927160][ T8672] team0: Port device team_slave_0 added [ 186.978531][ T8672] team0: Port device team_slave_1 added [ 187.059846][ T8672] device hsr_slave_0 entered promiscuous mode 22:11:36 executing program 3: stat(&(0x7f0000000000)='./file0\x00', 0x0) getegid() getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000380), 0x0) clock_gettime(0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 187.116002][ T8672] device hsr_slave_1 entered promiscuous mode [ 187.184834][ T8675] chnl_net:caif_netlink_parms(): no params data found [ 187.198880][ T8678] IPVS: ftp: loaded support on port[0] = 21 [ 187.326283][ T8675] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.333411][ T8675] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.356633][ T8675] device bridge_slave_0 entered promiscuous mode [ 187.377296][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.384468][ T8672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.392223][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.399320][ T8672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.409037][ T8680] IPVS: ftp: loaded support on port[0] = 21 [ 187.447278][ T8675] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.454385][ T8675] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.466885][ T8675] device bridge_slave_1 entered promiscuous mode 22:11:37 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 187.584351][ T8675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.620566][ T8675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.707457][ T8675] team0: Port device team_slave_0 added [ 187.720910][ T8678] chnl_net:caif_netlink_parms(): no params data found [ 187.743235][ T3668] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.757696][ T3668] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.790300][ T8672] 8021q: adding VLAN 0 to HW filter on device bond0 22:11:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x62160554]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x4ab97) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 187.803844][ T8675] team0: Port device team_slave_1 added [ 187.894635][ T8672] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.920863][ T8683] IPVS: ftp: loaded support on port[0] = 21 [ 187.946672][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.955409][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.970479][ T8678] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.977783][ T8678] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.985360][ T8678] device bridge_slave_0 entered promiscuous mode [ 187.995231][ T8678] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.002388][ T8678] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.010024][ T8678] device bridge_slave_1 entered promiscuous mode [ 188.068854][ T8675] device hsr_slave_0 entered promiscuous mode [ 188.126005][ T8675] device hsr_slave_1 entered promiscuous mode [ 188.186045][ T8675] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.223106][ T8678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.234522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.244159][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.253853][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.260928][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.269438][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.278319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.286738][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.293765][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.301376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.310328][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.319002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.327845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.336699][ T8680] chnl_net:caif_netlink_parms(): no params data found [ 188.361402][ T8672] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.363155][ T8687] IPVS: ftp: loaded support on port[0] = 21 [ 188.373491][ T8672] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.391154][ T8678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.407775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.416660][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.425045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.434222][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.442880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.451833][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.460157][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.501749][ T8680] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.509225][ T8680] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.519113][ T8680] device bridge_slave_0 entered promiscuous mode [ 188.530775][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.568474][ T8680] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.575537][ T8680] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.583956][ T8680] device bridge_slave_1 entered promiscuous mode [ 188.592976][ T8678] team0: Port device team_slave_0 added [ 188.611940][ T8678] team0: Port device team_slave_1 added [ 188.630386][ T8680] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.658419][ T8680] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.685830][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.693254][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.706879][ T8672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.757936][ T8678] device hsr_slave_0 entered promiscuous mode [ 188.816112][ T8678] device hsr_slave_1 entered promiscuous mode [ 188.855715][ T8678] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.870708][ T8680] team0: Port device team_slave_0 added [ 188.901436][ T8680] team0: Port device team_slave_1 added 22:11:38 executing program 0: timer_settime(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x9, 0x0) write(r1, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140)=0x101, 0x4) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000180)={'bridge_slave_1\x00', {0x2, 0x4e23, @broadcast}}) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 189.039167][ T8680] device hsr_slave_0 entered promiscuous mode [ 189.086233][ T8680] device hsr_slave_1 entered promiscuous mode [ 189.115896][ T8680] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.124763][ C1] hrtimer: interrupt took 26142 ns [ 189.145197][ T8700] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 189.150976][ T8683] chnl_net:caif_netlink_parms(): no params data found [ 189.288408][ T8675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.354928][ T8675] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.384434][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.422689][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.430868][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.444544][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.453482][ T47] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.460593][ T47] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.473775][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.482900][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.497277][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.504462][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.517686][ T8687] chnl_net:caif_netlink_parms(): no params data found 22:11:39 executing program 0: [ 189.552198][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.560309][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.568858][ T8683] device bridge_slave_0 entered promiscuous mode [ 189.580528][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.602777][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.616997][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 22:11:39 executing program 0: 22:11:39 executing program 0: [ 189.704082][ T8687] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.721120][ T8687] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.729265][ T8687] device bridge_slave_0 entered promiscuous mode [ 189.741851][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.754897][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.776947][ T8683] device bridge_slave_1 entered promiscuous mode 22:11:39 executing program 0: [ 189.795422][ T8675] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.808396][ T8675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 22:11:39 executing program 0: [ 189.858027][ T8687] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.865103][ T8687] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.884983][ T8687] device bridge_slave_1 entered promiscuous mode 22:11:39 executing program 0: [ 189.914088][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.938405][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.959133][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.969657][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.982170][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.990899][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.003951][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.012587][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.021828][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.029784][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.066204][ T8678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.075022][ T8683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.106001][ T8687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.117728][ T8687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.131401][ T8683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.166915][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.174325][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.184929][ T8675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.198115][ T8687] team0: Port device team_slave_0 added [ 190.210978][ T8683] team0: Port device team_slave_0 added [ 190.221107][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.229429][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.239572][ T8687] team0: Port device team_slave_1 added [ 190.250287][ T8678] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.261032][ T8683] team0: Port device team_slave_1 added [ 190.292000][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.301248][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.309755][ T8686] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.317109][ T8686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.324921][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.398863][ T8683] device hsr_slave_0 entered promiscuous mode [ 190.436432][ T8683] device hsr_slave_1 entered promiscuous mode [ 190.475849][ T8683] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.518644][ T8687] device hsr_slave_0 entered promiscuous mode [ 190.556006][ T8687] device hsr_slave_1 entered promiscuous mode [ 190.585907][ T8687] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.626958][ T8680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.638333][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.647192][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.655455][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.662527][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.671590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.680997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.690030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.698682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.730181][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.739122][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.749953][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.758805][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.767818][ T3668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.779756][ T8678] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.796909][ T8678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.822419][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.843405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.865292][ T8680] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.901934][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.920820][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.961578][ T8726] kvm: emulating exchange as write [ 190.970684][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.981977][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.990831][ T3100] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.997973][ T3100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.008849][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.020373][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.029012][ T3100] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.036972][ T3100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.044516][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.053661][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.061174][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.071279][ T8678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.111957][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.127860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 22:11:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) [ 191.167678][ T8687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.205477][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.223355][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.247273][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.256815][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.276263][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.284963][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.293776][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.302691][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.312390][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.323368][ T8687] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.345818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.354166][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.371079][ T8680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.386385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.395093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.411036][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.418254][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.455789][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.516021][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.524535][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.536724][ T3100] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.543823][ T3100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.552663][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.560454][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.581144][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:11:41 executing program 2: [ 191.623950][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.646775][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.655331][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.671401][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.680626][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.708390][ T8680] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.725472][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.738355][ T8683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.756030][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.787573][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.806921][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.815366][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.825301][ T8687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.842991][ T8683] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.862205][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.876688][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.905476][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.914072][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.922566][ T3100] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.929672][ T3100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.939257][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.948172][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.957378][ T3100] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.964473][ T3100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.972076][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.979898][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.987515][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.000005][ T8687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.011817][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.030255][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.065982][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.074552][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.099036][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.113647][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.123106][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.131554][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.141372][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.160878][ T8683] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.173278][ T8757] IPVS: ftp: loaded support on port[0] = 21 [ 192.183471][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.195037][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.204914][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.241168][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.249190][ T3100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.270619][ T8683] 8021q: adding VLAN 0 to HW filter on device batadv0 22:11:42 executing program 3: [ 195.196242][ T8771] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.203630][ T8771] bridge0: port 1(bridge_slave_0) entered disabled state 22:11:48 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:11:48 executing program 2: 22:11:48 executing program 0: 22:11:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 22:11:48 executing program 3: 22:11:48 executing program 5: 22:11:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:11:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:11:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d}, {0x80000006}]}, 0x10) 22:11:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fanotify_init(0x1f, 0x0) 22:11:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 22:11:48 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) [ 199.200668][ T8807] overlayfs: conflicting lowerdir path [ 199.979977][ T8807] overlayfs: conflicting lowerdir path [ 201.655082][ T8784] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.662521][ T8784] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.056667][ T8790] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.063927][ T8790] bridge0: port 1(bridge_slave_0) entered disabled state 22:12:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:12:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) memfd_create(&(0x7f00000001c0)='\xb3', 0x0) 22:12:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffc000/0x1000)=nil) 22:12:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x1000)=nil) 22:12:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:var_lib_t:s0\x00', 0x1f, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, 0x0) fstat(r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = getegid() setresgid(0x0, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000004c0)=0xc) r7 = getegid() setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r9 = getegid() setresgid(0x0, r9, 0x0) keyctl$chown(0x4, 0x0, r8, r9) setgroups(0x5, &(0x7f0000000500)=[0x0, r6, r7, r9, 0xee00]) r10 = socket(0x1d, 0xc0001, 0x0) preadv(r10, &(0x7f0000000400), 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) socket$inet_udplite(0x2, 0x2, 0x88) 22:12:00 executing program 5: r0 = open(0x0, 0x14103e, 0x0) getsockname$unix(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_emit_ethernet(0x300500, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/604], 0x0) munmap(&(0x7f000050f000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) listen(r1, 0x0) socket$unix(0x1, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt6_stats\x00') lseek(r2, 0x1c, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:12:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x6b5ae3fe2d495fa6, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="a60000002901000200000010020000000600000000000000c5f20000000000000307002e2f66696c65305401000000060000000000000000010000000000000507002e2f66696c653036000000000300000000"], 0x53) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:12:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) 22:12:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a5633657b52873b9925f15a5b587ec8eaab2abd683c8ff8640f46e160757c496cd97afe9afbc9", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x8000000000000000, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:12:00 executing program 5: r0 = open(0x0, 0x14103e, 0x0) getsockname$unix(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_emit_ethernet(0x300500, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/604], 0x0) munmap(&(0x7f000050f000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) listen(r1, 0x0) socket$unix(0x1, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt6_stats\x00') lseek(r2, 0x1c, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:12:00 executing program 0: r0 = open(0x0, 0x14103e, 0x0) getsockname$unix(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_emit_ethernet(0x300500, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/604], 0x0) munmap(&(0x7f000050f000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) listen(r1, 0x0) socket$unix(0x1, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt6_stats\x00') lseek(r2, 0x1c, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:12:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:12:00 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) readlink(0x0, 0x0, 0x0) memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2a) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) [ 211.149908][ T8830] BPF:hdr_len not found 22:12:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {&(0x7f0000000000)="053ea537b6a0d1f9ebe16a316e72d697609e465d845d58a878711c9f7f685e0170e63de11ed685c3", 0x28}], 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) memfd_create(&(0x7f00000001c0)='\xb3', 0x0) 22:12:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(0xffffffffffffffff, 0x0, 0x4000, 0x0) 22:12:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0xb8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f610500020000e8fe0208010001080008000f000400ff7e2800", 0x26}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r3) openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x18000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup(r4) connect$inet6(0xffffffffffffffff, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) wait4(r5, 0x0, 0x40000000, 0x0) getpgid(r5) sched_setattr(0x0, &(0x7f0000000040)={0xffffffffffffff22, 0x2, 0x0, 0x0, 0x9, 0x7ffffffffffffe, 0x0, 0x8001}, 0x0) getpid() r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) gettid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r7 = gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r7}) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) dup2(0xffffffffffffffff, r8) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000280)='/\xcde\xc5Ydmmidi#\x00', 0x5, 0x20a000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r9}, 0x30) 22:12:01 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) clock_nanosleep(0x1, 0x1, &(0x7f00000000c0), 0x0) io_submit(0x0, 0x0, 0x0) 22:12:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0xb8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f610500020000e8fe0208010001080008000f000400ff7e2800", 0x26}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r3) openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x18000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup(r4) connect$inet6(0xffffffffffffffff, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) wait4(r5, 0x0, 0x40000000, 0x0) getpgid(r5) sched_setattr(0x0, &(0x7f0000000040)={0xffffffffffffff22, 0x2, 0x0, 0x0, 0x9, 0x7ffffffffffffe, 0x0, 0x8001}, 0x0) getpid() r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) gettid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r7 = gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r7}) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) dup2(0xffffffffffffffff, r8) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000280)='/\xcde\xc5Ydmmidi#\x00', 0x5, 0x20a000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r9}, 0x30) [ 212.879487][ T8855] IPVS: ftp: loaded support on port[0] = 21 [ 213.031487][ T8855] chnl_net:caif_netlink_parms(): no params data found [ 213.095026][ T8855] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.103615][ T8855] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.119661][ T8855] device bridge_slave_0 entered promiscuous mode [ 213.132174][ T8855] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.142396][ T8855] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.154615][ T8855] device bridge_slave_1 entered promiscuous mode [ 213.185209][ T8855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.202068][ T8855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.225386][ T8855] team0: Port device team_slave_0 added [ 213.232947][ T8855] team0: Port device team_slave_1 added [ 213.307727][ T8855] device hsr_slave_0 entered promiscuous mode [ 213.365953][ T8855] device hsr_slave_1 entered promiscuous mode [ 213.405673][ T8855] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.466738][ T8855] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.473918][ T8855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.481315][ T8855] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.488432][ T8855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.524634][ T8859] IPVS: ftp: loaded support on port[0] = 21 [ 213.580668][ T8860] IPVS: ftp: loaded support on port[0] = 21 [ 213.668622][ T8855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.724697][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.733253][ T47] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.741338][ T47] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.751029][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 213.763104][ T8855] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.811740][ T8859] chnl_net:caif_netlink_parms(): no params data found [ 213.828548][ T8860] chnl_net:caif_netlink_parms(): no params data found [ 213.839208][ T8705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.847691][ T8705] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.854728][ T8705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.884617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.894941][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.902036][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.910055][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.919316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.956053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.963698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.973262][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.987515][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.023292][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.030843][ T8860] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.039319][ T8860] device bridge_slave_0 entered promiscuous mode [ 214.047302][ T8859] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.054333][ T8859] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.062518][ T8859] device bridge_slave_0 entered promiscuous mode [ 214.074074][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.081435][ T8860] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.089562][ T8860] device bridge_slave_1 entered promiscuous mode [ 214.102946][ T8859] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.110395][ T8859] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.118761][ T8859] device bridge_slave_1 entered promiscuous mode [ 214.131959][ T8855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.144803][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.152380][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.180474][ T8860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.200988][ T8860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.213548][ T8859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.239882][ T8859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.260439][ T8860] team0: Port device team_slave_0 added [ 214.275587][ T8859] team0: Port device team_slave_0 added [ 214.283367][ T8860] team0: Port device team_slave_1 added [ 214.300274][ T8859] team0: Port device team_slave_1 added [ 214.398325][ T8860] device hsr_slave_0 entered promiscuous mode [ 214.416322][ T8860] device hsr_slave_1 entered promiscuous mode [ 214.435991][ T616] INFO: task khugepaged:623 blocked for more than 143 seconds. [ 214.443755][ T616] Not tainted 5.4.0-rc5-next-20191031 #0 [ 214.450348][ T616] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 214.459528][ T616] khugepaged D27840 623 2 0x80004000 [ 214.466135][ T616] Call Trace: [ 214.469453][ T616] __schedule+0x94a/0x1e70 [ 214.473871][ T616] ? __sched_text_start+0x8/0x8 [ 214.479167][ T616] ? blk_insert_cloned_request+0x530/0x530 [ 214.484974][ T616] ? _raw_spin_unlock_irq+0x23/0x80 [ 214.490604][ T616] ? __lock_page+0x3d9/0xab0 [ 214.495192][ T616] ? _raw_spin_unlock_irq+0x23/0x80 [ 214.500503][ T616] schedule+0xdc/0x2b0 [ 214.504616][ T616] io_schedule+0x1c/0x70 [ 214.509171][ T616] __lock_page+0x422/0xab0 [ 214.513588][ T616] ? wait_on_page_bit+0xa60/0xa60 [ 214.520348][ T616] ? page_cache_next_miss+0x340/0x340 [ 214.526154][ T616] ? ___might_sleep+0x163/0x2c0 [ 214.531017][ T616] ? __might_sleep+0x95/0x190 [ 214.535765][ T616] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 214.541580][ T616] ? mpage_process_page_bufs+0x780/0x780 [ 214.547291][ T616] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 214.552878][ T616] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 214.559787][ T616] ? __kmalloc_node+0xf/0x70 [ 214.564393][ T616] ext4_writepages+0x954/0x2e70 [ 214.569316][ T616] ? get_page_from_freelist+0x21fb/0x4330 [ 214.575035][ T616] ? find_held_lock+0x35/0x130 [ 214.579873][ T616] ? get_page_from_freelist+0x21fb/0x4330 [ 214.585647][ T616] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 214.591107][ T616] ? 0xffffffff81000000 [ 214.595264][ T616] ? mark_lock+0xc2/0x1220 [ 214.600533][ T616] ? prep_new_page+0x19f/0x200 [ 214.605303][ T616] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 214.611356][ T616] ? find_held_lock+0x35/0x130 [ 214.616340][ T616] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 214.622845][ T616] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 214.628359][ T616] do_writepages+0xfa/0x2a0 [ 214.632876][ T616] ? do_writepages+0xfa/0x2a0 [ 214.637602][ T616] ? lock_downgrade+0x920/0x920 [ 214.642467][ T616] ? page_writeback_cpu_online+0x20/0x20 [ 214.648167][ T616] ? __kasan_check_read+0x11/0x20 [ 214.653190][ T616] ? do_raw_spin_unlock+0x57/0x270 [ 214.658367][ T616] ? _raw_spin_unlock+0x28/0x40 [ 214.663211][ T616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 214.669488][ T616] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 214.675467][ T616] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 214.681989][ T616] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 214.688729][ T616] ? lockdep_hardirqs_on+0x421/0x5e0 [ 214.694006][ T616] filemap_flush+0x24/0x30 [ 214.698492][ T616] collapse_file+0x36b1/0x41a0 [ 214.703257][ T616] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 214.709531][ T616] ? khugepaged+0x21c0/0x4360 [ 214.714208][ T616] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 214.722344][ T616] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 214.728109][ T616] ? khugepaged_find_target_node+0x142/0x180 [ 214.734095][ T616] khugepaged+0x2da9/0x4360 [ 214.738668][ T616] ? __kasan_check_read+0x11/0x20 [ 214.743797][ T616] ? __lock_acquire+0x16f2/0x4a00 [ 214.748871][ T616] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 214.754500][ T616] ? lock_downgrade+0x920/0x920 [ 214.759753][ T616] ? finish_wait+0x260/0x260 [ 214.764353][ T616] ? lockdep_hardirqs_on+0x421/0x5e0 [ 214.770218][ T616] ? trace_hardirqs_on+0x67/0x240 [ 214.775251][ T616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 214.781543][ T616] ? __kthread_parkme+0x108/0x1c0 [ 214.786608][ T616] ? __kasan_check_read+0x11/0x20 [ 214.791653][ T616] kthread+0x361/0x430 [ 214.795796][ T616] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 214.801422][ T616] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 214.807206][ T616] ret_from_fork+0x24/0x30 [ 214.811731][ T616] [ 214.811731][ T616] Showing all locks held in the system: [ 214.815751][ T8860] debugfs: Directory 'hsr0' with parent '/' already present! [ 214.820311][ T616] 3 locks held by kworker/1:1/47: [ 214.831897][ T616] #0: ffff888216039128 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 214.838434][ T8859] kobject: 'veth1_to_hsr' (0000000001254f53): kobject_add_internal: parent: 'net', set: 'devices' [ 214.843192][ T616] #1: ffff8880a9ac7dc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 214.865963][ T616] #2: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 214.872879][ T8859] kobject: 'veth1_to_hsr' (0000000001254f53): kobject_uevent_env [ 214.874046][ T616] 4 locks held by kworker/u4:3/171: [ 214.884834][ T8859] kobject: 'veth1_to_hsr' (0000000001254f53): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr' [ 214.886999][ T616] #0: ffff8880a8261928 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 [ 214.887035][ T616] #1: ffff8880a94c7dc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 214.887063][ T616] #2: ffff8882158920d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 214.887094][ T616] #3: ffff888215894990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 214.887126][ T616] 5 locks held by kworker/u4:4/217: [ 214.887131][ T616] #0: ffff88821b6bd928 ((wq_completion)netns){+.+.}, at: process_one_work+0x88b/0x1740 [ 214.906952][ T8859] kobject: 'queues' (000000006b4b153e): kobject_add_internal: parent: 'veth1_to_hsr', set: '' [ 214.908550][ T616] #1: ffff8880a9797dc0 (net_cleanup_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 214.929086][ T8859] kobject: 'queues' (000000006b4b153e): kobject_uevent_env [ 214.929965][ T616] #2: ffffffff899ace48 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0xaf0 [ 214.947987][ T8859] kobject: 'queues' (000000006b4b153e): kobject_uevent_env: filter function caused the event to drop! [ 214.955264][ T616] #3: ffffffff899d6560 (devlink_mutex){+.+.}, at: devlink_pernet_pre_exit+0x21/0x180 [ 214.973637][ T8859] kobject: 'rx-0' (000000006baf823a): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.974666][ T616] #4: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 214.990301][ T8859] kobject: 'rx-0' (000000006baf823a): kobject_uevent_env [ 214.990817][ T616] 1 lock held by khungtaskd/616: [ 215.010077][ T8859] kobject: 'rx-0' (000000006baf823a): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr/queues/rx-0' [ 215.011414][ T616] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 215.029736][ T8859] kobject: 'tx-0' (0000000085cc0c21): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.036612][ T616] 1 lock held by khugepaged/623: [ 215.049860][ T8859] kobject: 'tx-0' (0000000085cc0c21): kobject_uevent_env [ 215.053153][ T616] #0: ffff888215894990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 215.070728][ T8859] kobject: 'tx-0' (0000000085cc0c21): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr/queues/tx-0' [ 215.072622][ T616] 1 lock held by rsyslogd/8543: [ 215.086846][ T8859] kobject: 'batman_adv' (000000000693170d): kobject_add_internal: parent: 'veth1_to_hsr', set: '' [ 215.106549][ T616] #0: ffff8880a3bba660 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 215.106588][ T616] 2 locks held by getty/8633: [ 215.106593][ T616] #0: ffff8880a12a3090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.106622][ T616] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.106656][ T616] 2 locks held by getty/8634: [ 215.106660][ T616] #0: ffff8880a949e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.106686][ T616] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.106721][ T616] 2 locks held by getty/8635: [ 215.106725][ T616] #0: ffff888098aa2090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.106754][ T616] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.122047][ T8859] kobject: 'hsr_slave_1' (000000005745d2e5): kobject_add_internal: parent: 'net', set: 'devices' [ 215.122858][ T616] 2 locks held by getty/8636: [ 215.132469][ T8859] kobject: 'hsr_slave_1' (000000005745d2e5): kobject_uevent_env [ 215.136169][ T616] #0: ffff8880a8020090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.136208][ T616] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.153229][ T8859] kobject: 'hsr_slave_1' (000000005745d2e5): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1' [ 215.155016][ T616] 2 locks held by getty/8637: [ 215.168551][ T8859] kobject: 'queues' (00000000f68d25fc): kobject_add_internal: parent: 'hsr_slave_1', set: '' [ 215.215718][ T616] #0: ffff88809426a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.225009][ T8859] kobject: 'queues' (00000000f68d25fc): kobject_uevent_env [ 215.233425][ T616] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.243919][ T8859] kobject: 'queues' (00000000f68d25fc): kobject_uevent_env: filter function caused the event to drop! [ 215.254826][ T616] 2 locks held by getty/8638: [ 215.267250][ T8859] kobject: 'rx-0' (000000000a58d739): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.269721][ T616] #0: ffff8880981fe090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.278735][ T8859] kobject: 'rx-0' (000000000a58d739): kobject_uevent_env [ 215.286029][ T616] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.295919][ T8859] kobject: 'rx-0' (000000000a58d739): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1/queues/rx-0' [ 215.306759][ T616] 2 locks held by getty/8639: [ 215.319625][ T8859] kobject: 'tx-0' (000000009578f44f): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.321640][ T616] #0: ffff88809b251090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 215.339887][ T8859] kobject: 'tx-0' (000000009578f44f): kobject_uevent_env [ 215.347311][ T616] #1: ffffc90005f092e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 215.364275][ T8859] kobject: 'tx-0' (000000009578f44f): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1/queues/tx-0' [ 215.365924][ T616] 3 locks held by kworker/0:4/8688: [ 215.379982][ T8859] kobject: 'batman_adv' (00000000fe9a55d4): kobject_add_internal: parent: 'hsr_slave_1', set: '' [ 215.385877][ T616] #0: ffff888216039128 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 215.443880][ T616] #1: ffff888063f47dc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 215.455634][ T616] #2: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 215.463650][ T616] 3 locks held by kworker/1:4/8705: [ 215.468891][ T616] #0: ffff8880aa426d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 215.478801][ T616] #1: ffff888062a17dc0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 215.488732][ T616] #2: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 215.496772][ T616] 1 lock held by syz-executor.2/8859: [ 215.502121][ T616] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 215.511127][ T616] 1 lock held by syz-executor.0/8860: [ 215.517492][ T616] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 215.526417][ T616] 1 lock held by syz-executor.4/8868: [ 215.531777][ T616] #0: ffffffff88ff0980 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 215.540774][ T616] 1 lock held by syz-executor.4/8869: [ 215.546179][ T616] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 215.555069][ T616] [ 215.557812][ T616] ============================================= [ 215.557812][ T616] [ 215.566327][ T8859] kobject: 'hsr0' (00000000b6f253e8): kobject_add_internal: parent: 'net', set: 'devices' [ 215.567139][ T8859] kobject: 'hsr0' (00000000b6f253e8): kobject_uevent_env [ 215.576262][ T616] NMI backtrace for cpu 1 [ 215.576278][ T616] CPU: 1 PID: 616 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 215.576286][ T616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.576291][ T616] Call Trace: [ 215.576312][ T616] dump_stack+0x172/0x1f0 [ 215.576331][ T616] nmi_cpu_backtrace.cold+0x70/0xb2 [ 215.576343][ T616] ? vprintk_func+0x86/0x189 [ 215.576361][ T616] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 215.576378][ T616] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 215.591948][ T8859] kobject: 'hsr0' (00000000b6f253e8): fill_kobj_path: path = '/devices/virtual/net/hsr0' [ 215.596184][ T616] arch_trigger_cpumask_backtrace+0x14/0x20 [ 215.596202][ T616] watchdog+0xc8f/0x1350 [ 215.596224][ T616] kthread+0x361/0x430 [ 215.596239][ T616] ? reset_hung_task_detector+0x30/0x30 [ 215.606796][ T8859] kobject: 'queues' (00000000fc97fb7a): kobject_add_internal: parent: 'hsr0', set: '' [ 215.609581][ T616] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 215.609598][ T616] ret_from_fork+0x24/0x30 [ 215.609732][ T616] Sending NMI from CPU 1 to CPUs 0: [ 215.614298][ T8859] kobject: 'queues' (00000000fc97fb7a): kobject_uevent_env [ 215.620396][ C0] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.040 msecs [ 215.620437][ C0] NMI backtrace for cpu 0 [ 215.620442][ C0] CPU: 0 PID: 8859 Comm: syz-executor.2 Not tainted 5.4.0-rc5-next-20191031 #0 [ 215.620448][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.620451][ C0] RIP: 0010:update_load_avg+0x19d/0x1b10 [ 215.620461][ C0] Code: 00 00 74 0e 4c 89 ea 48 89 de 4c 89 f7 e8 3b 37 05 00 4c 8d 93 f8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 d2 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a1 12 00 00 8b bb f8 00 00 00 [ 215.620465][ C0] RSP: 0018:ffff8880ae809c80 EFLAGS: 00000806 [ 215.620472][ C0] RAX: dffffc0000000000 RBX: ffff8880ae834dc0 RCX: 0000000000000000 [ 215.620477][ C0] RDX: 1ffff11015d069d7 RSI: ffffffff88fab9c0 RDI: 0000000000000086 [ 215.620481][ C0] RBP: ffff8880ae809cd8 R08: 0000000000000000 R09: ffffed1015d06b7d [ 215.620486][ C0] R10: ffff8880ae834eb8 R11: ffff8880ae835be3 R12: 0000000000000000 [ 215.620490][ C0] R13: ffff88806f0102c0 R14: 000000303e298a28 R15: ffff8880ae834dc0 [ 215.620495][ C0] FS: 00000000026e0940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 215.620499][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 215.620503][ C0] CR2: ffffffffff600400 CR3: 000000006f4e9000 CR4: 00000000001406f0 [ 215.620507][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 215.620512][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 215.620514][ C0] Call Trace: [ 215.620516][ C0] [ 215.620519][ C0] ? update_curr+0x3f8/0x8d0 [ 215.620522][ C0] task_tick_fair+0xf5/0xea0 [ 215.620525][ C0] scheduler_tick+0xfb/0x3c0 [ 215.620529][ C0] update_process_times+0x51/0x70 [ 215.620532][ C0] tick_sched_handle+0xa2/0x190 [ 215.620535][ C0] tick_sched_timer+0x53/0x140 [ 215.620538][ C0] __hrtimer_run_queues+0x364/0xe40 [ 215.620541][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 215.620544][ C0] ? hrtimer_init+0x330/0x330 [ 215.620548][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 215.620551][ C0] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 215.620554][ C0] hrtimer_interrupt+0x314/0x770 [ 215.620558][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 215.620561][ C0] apic_timer_interrupt+0xf/0x20 [ 215.620563][ C0] [ 215.620567][ C0] RIP: 0010:vprintk_emit+0x5da/0x700 [ 215.620576][ C0] Code: 00 48 b8 00 00 00 00 00 fc ff df 41 80 3c 06 00 0f 85 f8 00 00 00 48 83 3d a2 3d 96 07 00 74 6a e8 4b 81 16 00 48 89 df 57 9d <0f> 1f 44 00 00 e9 06 ff ff ff e8 37 81 16 00 49 c1 ee 03 e8 7e 01 [ 215.620580][ C0] RSP: 0018:ffff88806f01eec0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 215.620587][ C0] RAX: ffff88806f010240 RBX: 0000000000000293 RCX: 0000000000000006 [ 215.620592][ C0] RDX: 0000000000000000 RSI: ffffffff815ce445 RDI: 0000000000000293 [ 215.620596][ C0] RBP: ffff88806f01ef08 R08: 1ffffffff14f3d37 R09: fffffbfff14f3d38 [ 215.620601][ C0] R10: fffffbfff14f3d37 R11: ffffffff8a79e9bf R12: 0000000000000038 [ 215.620605][ C0] R13: 0000000000000200 R14: 1ffffffff11e643c R15: ffff8880a8158100 [ 215.620608][ C0] ? vprintk_emit+0x5d5/0x700 [ 215.620611][ C0] vprintk_default+0x28/0x30 [ 215.620614][ C0] vprintk_func+0x7e/0x189 [ 215.620617][ C0] printk+0xba/0xed [ 215.620620][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 215.620624][ C0] ? kernfs_create_dir_ns+0x113/0x160 [ 215.620627][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.620631][ C0] ? sysfs_create_dir_ns+0x181/0x2a0 [ 215.620634][ C0] kobject_uevent_env+0xe2/0x1023 [ 215.620637][ C0] ? __kasan_check_write+0x14/0x20 [ 215.620640][ C0] ? kernfs_get.part.0+0x66/0x90 [ 215.620643][ C0] ? kernfs_get+0x25/0x30 [ 215.620646][ C0] kobject_uevent+0x20/0x26 [ 215.620649][ C0] kset_register+0x4e/0x70 [ 215.620652][ C0] kset_create_and_add+0x12f/0x1a0 [ 215.620656][ C0] netdev_register_kobject+0x1c1/0x3b0 [ 215.620659][ C0] register_netdevice+0x999/0x1020 [ 215.620662][ C0] ? netdev_change_features+0xb0/0xb0 [ 215.620665][ C0] ? hsr_get_max_mtu+0x1d6/0x2b0 [ 215.620668][ C0] ? hsr_add_port+0x4c7/0x620 [ 215.620671][ C0] hsr_dev_finalize+0x4fc/0x7dc [ 215.620674][ C0] hsr_newlink+0x26b/0x320 [ 215.620678][ C0] ? hsr_dev_change_mtu.cold+0x49/0x49 [ 215.620681][ C0] ? rtnl_create_link+0x192/0xab0 [ 215.620684][ C0] ? hsr_dev_change_mtu.cold+0x49/0x49 [ 215.620687][ C0] __rtnl_newlink+0x10a1/0x16e0 [ 215.620691][ C0] ? rtnl_link_unregister+0x250/0x250 [ 215.620694][ C0] ? is_bpf_text_address+0xce/0x160 [ 215.620701][ C0] ? kernel_text_address+0x73/0xf0 [ 215.620705][ C0] ? unwind_get_return_address+0x61/0xa0 [ 215.620708][ C0] ? profile_setup.cold+0xbb/0xbb [ 215.620711][ C0] ? arch_stack_walk+0x97/0xf0 [ 215.620714][ C0] ? stack_trace_save+0xac/0xe0 [ 215.620718][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 215.620721][ C0] ? mark_lock+0xc2/0x1220 [ 215.620724][ C0] ? save_stack+0x5c/0x90 [ 215.620727][ C0] ? save_stack+0x23/0x90 [ 215.620730][ C0] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 215.620733][ C0] ? kasan_kmalloc+0x9/0x10 [ 215.620737][ C0] ? kmem_cache_alloc_trace+0x158/0x790 [ 215.620740][ C0] ? rtnl_newlink+0x4b/0xa0 [ 215.620743][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 215.620747][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 215.620749][ C0] rtnl_newlink+0x69/0xa0 [ 215.620753][ C0] ? __rtnl_newlink+0x16e0/0x16e0 [ 215.620756][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 215.620759][ C0] ? rtnl_bridge_getlink+0x910/0x910 [ 215.620762][ C0] ? lock_downgrade+0x920/0x920 [ 215.620765][ C0] ? netlink_deliver_tap+0x228/0xbe0 [ 215.620768][ C0] ? find_held_lock+0x35/0x130 [ 215.620771][ C0] netlink_rcv_skb+0x177/0x450 [ 215.620775][ C0] ? rtnl_bridge_getlink+0x910/0x910 [ 215.620778][ C0] ? netlink_ack+0xb50/0xb50 [ 215.620781][ C0] ? __kasan_check_read+0x11/0x20 [ 215.620784][ C0] ? netlink_deliver_tap+0x24a/0xbe0 [ 215.620787][ C0] rtnetlink_rcv+0x1d/0x30 [ 215.620790][ C0] netlink_unicast+0x531/0x710 [ 215.620793][ C0] ? netlink_attachskb+0x7c0/0x7c0 [ 215.620797][ C0] ? _copy_from_iter_full+0x25d/0x8c0 [ 215.620800][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 215.620803][ C0] ? __check_object_size+0x3d/0x437 [ 215.620806][ C0] netlink_sendmsg+0x8cf/0xda0 [ 215.620809][ C0] ? netlink_unicast+0x710/0x710 [ 215.620813][ C0] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 215.620816][ C0] ? apparmor_socket_sendmsg+0x2a/0x30 [ 215.620820][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.620823][ C0] ? security_socket_sendmsg+0x8d/0xc0 [ 215.620826][ C0] ? netlink_unicast+0x710/0x710 [ 215.620829][ C0] sock_sendmsg+0xd7/0x130 [ 215.620832][ C0] __sys_sendto+0x262/0x380 [ 215.620836][ C0] ? __ia32_sys_getpeername+0xb0/0xb0 [ 215.620839][ C0] ? lock_downgrade+0x920/0x920 [ 215.620842][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.620846][ C0] ? __blkcg_punt_bio_submit+0x1e0/0x1e0 [ 215.620849][ C0] ? unlock_page_memcg+0x40/0x40 [ 215.620852][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.620856][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.620859][ C0] ? do_syscall_64+0x26/0x760 [ 215.620862][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.620865][ C0] __x64_sys_sendto+0xe1/0x1a0 [ 215.620868][ C0] do_syscall_64+0xfa/0x760 [ 215.620872][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.620875][ C0] RIP: 0033:0x413f13 [ 215.620884][ C0] Code: ff 0f 83 b0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d fd 40 66 00 00 75 17 49 89 ca b8 2c 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 87 fa ff ff [ 215.620887][ C0] RSP: 002b:00007ffd0482f3f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 215.620895][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000413f13 [ 215.620899][ C0] RDX: 0000000000000048 RSI: 0000000000a71df0 RDI: 0000000000000003 [ 215.620904][ C0] RBP: 0000000000000000 R08: 00007ffd0482f400 R09: 000000000000000c [ 215.620908][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 215.620912][ C0] R13: 0000000000000003 R14: 00007ffd0482f550 R15: 0000000000000006 [ 215.621212][ T616] Kernel panic - not syncing: hung_task: blocked tasks [ 215.639753][ T8859] kobject: 'queues' (00000000fc97fb7a): kobject_uevent_env: filter function caused the event to drop! [ 215.647163][ T616] CPU: 1 PID: 616 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 215.647172][ T616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.647177][ T616] Call Trace: [ 215.647203][ T616] dump_stack+0x172/0x1f0 [ 215.647221][ T616] panic+0x2e3/0x75c [ 215.647237][ T616] ? add_taint.cold+0x16/0x16 [ 215.653599][ T8859] kobject: 'rx-0' (0000000065b7ecf2): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.657339][ T616] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 215.657361][ T616] ? ___preempt_schedule+0x16/0x18 [ 215.657379][ T616] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 215.657390][ T616] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 215.657405][ T616] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 215.662549][ T8859] kobject: 'rx-0' (0000000065b7ecf2): kobject_uevent_env [ 215.666975][ T616] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 215.666994][ T616] watchdog+0xca0/0x1350 [ 215.667017][ T616] kthread+0x361/0x430 [ 215.667027][ T616] ? reset_hung_task_detector+0x30/0x30 [ 215.667044][ T616] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 215.677464][ T8859] kobject: 'rx-0' (0000000065b7ecf2): fill_kobj_path: path = '/devices/virtual/net/hsr0/queues/rx-0' [ 215.682778][ T616] ret_from_fork+0x24/0x30 [ 215.688485][ T616] Kernel Offset: disabled [ 216.624441][ T616] Rebooting in 86400 seconds..