[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 68.010066][ T27] audit: type=1800 audit(1574019532.690:25): pid=8783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 68.044448][ T27] audit: type=1800 audit(1574019532.690:26): pid=8783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 68.075486][ T27] audit: type=1800 audit(1574019532.690:27): pid=8783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.141' (ECDSA) to the list of known hosts. 2019/11/17 19:39:01 fuzzer started 2019/11/17 19:39:03 dialing manager at 10.128.0.26:44591 2019/11/17 19:39:03 syscalls: 2566 2019/11/17 19:39:03 code coverage: enabled 2019/11/17 19:39:03 comparison tracing: enabled 2019/11/17 19:39:03 extra coverage: enabled 2019/11/17 19:39:03 setuid sandbox: enabled 2019/11/17 19:39:03 namespace sandbox: enabled 2019/11/17 19:39:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/17 19:39:03 fault injection: enabled 2019/11/17 19:39:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/17 19:39:03 net packet injection: enabled 2019/11/17 19:39:03 net device setup: enabled 2019/11/17 19:39:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/17 19:39:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 19:41:13 executing program 0: 19:41:13 executing program 1: syzkaller login: [ 208.531301][ T8950] IPVS: ftp: loaded support on port[0] = 21 [ 208.721253][ T8953] IPVS: ftp: loaded support on port[0] = 21 [ 208.729673][ T8950] chnl_net:caif_netlink_parms(): no params data found 19:41:13 executing program 2: [ 208.822531][ T8950] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.831618][ T8950] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.840324][ T8950] device bridge_slave_0 entered promiscuous mode [ 208.861636][ T8950] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.870997][ T8950] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.880870][ T8950] device bridge_slave_1 entered promiscuous mode [ 208.969642][ T8950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.991392][ T8953] chnl_net:caif_netlink_parms(): no params data found [ 209.008669][ T8950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 19:41:13 executing program 3: [ 209.086510][ T8950] team0: Port device team_slave_0 added [ 209.102540][ T8957] IPVS: ftp: loaded support on port[0] = 21 [ 209.121960][ T8950] team0: Port device team_slave_1 added [ 209.150387][ T8953] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.160711][ T8953] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.185478][ T8953] device bridge_slave_0 entered promiscuous mode [ 209.215576][ T8953] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.222739][ T8953] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.242668][ T8953] device bridge_slave_1 entered promiscuous mode 19:41:14 executing program 4: [ 209.317650][ T8950] device hsr_slave_0 entered promiscuous mode [ 209.374793][ T8950] device hsr_slave_1 entered promiscuous mode [ 209.460533][ T8959] IPVS: ftp: loaded support on port[0] = 21 [ 209.488187][ T8953] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.542869][ T8953] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.556643][ T8950] netdevsim netdevsim0 netdevsim0: renamed from eth0 19:41:14 executing program 5: [ 209.648048][ T8950] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 209.699871][ T8950] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 209.749804][ T8950] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 209.826955][ T8961] IPVS: ftp: loaded support on port[0] = 21 [ 209.871707][ T8953] team0: Port device team_slave_0 added [ 209.882651][ T8963] IPVS: ftp: loaded support on port[0] = 21 [ 209.882875][ T8953] team0: Port device team_slave_1 added [ 210.017800][ T8953] device hsr_slave_0 entered promiscuous mode [ 210.075224][ T8953] device hsr_slave_1 entered promiscuous mode [ 210.144512][ T8953] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.207835][ T8957] chnl_net:caif_netlink_parms(): no params data found [ 210.361689][ T8959] chnl_net:caif_netlink_parms(): no params data found [ 210.407601][ T8953] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 210.470796][ T8953] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 210.541867][ T8961] chnl_net:caif_netlink_parms(): no params data found [ 210.552880][ T8957] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.560126][ T8957] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.570420][ T8957] device bridge_slave_0 entered promiscuous mode [ 210.577872][ T8953] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 210.629613][ T8953] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 210.692587][ T8950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.703245][ T8957] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.711247][ T8957] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.719294][ T8957] device bridge_slave_1 entered promiscuous mode [ 210.777053][ T8959] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.784227][ T8959] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.792182][ T8959] device bridge_slave_0 entered promiscuous mode [ 210.801963][ T8959] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.809142][ T8959] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.818208][ T8959] device bridge_slave_1 entered promiscuous mode [ 210.838618][ T8957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.848684][ T8963] chnl_net:caif_netlink_parms(): no params data found [ 210.873944][ T8961] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.885687][ T8961] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.894261][ T8961] device bridge_slave_0 entered promiscuous mode [ 210.903792][ T8961] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.911282][ T8961] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.919527][ T8961] device bridge_slave_1 entered promiscuous mode [ 210.928244][ T8957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.948150][ T8950] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.969785][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.978962][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.999148][ T8959] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.010280][ T8959] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.031734][ T8963] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.039099][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.046993][ T8963] device bridge_slave_0 entered promiscuous mode [ 211.061032][ T8963] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.069124][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.076989][ T8963] device bridge_slave_1 entered promiscuous mode [ 211.105753][ T8961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.117872][ T8957] team0: Port device team_slave_0 added [ 211.125267][ T8961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.140626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.149288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.157976][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.165258][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.178543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.193643][ T8959] team0: Port device team_slave_0 added [ 211.201278][ T8957] team0: Port device team_slave_1 added [ 211.235144][ T8959] team0: Port device team_slave_1 added [ 211.243144][ T8963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.255434][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.263972][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.272833][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.279956][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.287965][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.318568][ T8961] team0: Port device team_slave_0 added [ 211.330868][ T8961] team0: Port device team_slave_1 added [ 211.337893][ T8963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.361896][ T8963] team0: Port device team_slave_0 added [ 211.416526][ T8957] device hsr_slave_0 entered promiscuous mode [ 211.454766][ T8957] device hsr_slave_1 entered promiscuous mode [ 211.524515][ T8957] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.569052][ T8963] team0: Port device team_slave_1 added [ 211.583504][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.592734][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.601692][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.657702][ T8961] device hsr_slave_0 entered promiscuous mode [ 211.704883][ T8961] device hsr_slave_1 entered promiscuous mode [ 211.754437][ T8961] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.817774][ T8959] device hsr_slave_0 entered promiscuous mode [ 211.854910][ T8959] device hsr_slave_1 entered promiscuous mode [ 211.894502][ T8959] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.910765][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.922768][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.931492][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.007891][ T8963] device hsr_slave_0 entered promiscuous mode [ 212.044919][ T8963] device hsr_slave_1 entered promiscuous mode [ 212.084527][ T8963] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.098964][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.107808][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.125553][ T8957] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 212.157954][ T8957] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 212.216319][ T8957] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 212.247442][ T8961] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 212.310713][ T8953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.333752][ T8957] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 212.367334][ T8961] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 212.430210][ T8961] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 212.487102][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.496134][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.504933][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.513004][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.523079][ T8953] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.536135][ T8961] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 212.597476][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.618623][ T8959] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 212.657486][ T8959] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 212.717064][ T8959] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 212.760999][ T8959] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 212.826481][ T8963] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 212.869992][ T8963] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 212.915874][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.928216][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.936684][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.943748][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.951650][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.960224][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.968749][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.975881][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.983883][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.992822][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.016659][ T8963] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 213.064378][ T8963] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 213.155075][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.164167][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.172009][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.186026][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.195356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.210973][ T8950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.227551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.259296][ T8957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.314764][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.327093][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.335755][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.343700][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.352708][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.361483][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.369915][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.378593][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.394482][ T8957] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.402000][ T8953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.415643][ T8961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.462509][ T8959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.470071][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.482225][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.491709][ T8964] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.498831][ T8964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.529776][ T8953] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.538634][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.549940][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.565426][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 19:41:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000c, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x240, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x103500, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="84000000", @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20002090}, 0x4000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0}) ppoll(&(0x7f0000000240)=[{r5, 0x4}, {r2}], 0x2, &(0x7f0000000380)={r6}, 0x0, 0x0) [ 213.573930][ T8964] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.581088][ T8964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.604746][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.612684][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.621366][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.630304][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.644945][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.653691][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.673658][ T8961] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.718656][ T8959] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.735687][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.751448][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.760466][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 19:41:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 213.778364][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.798130][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.822538][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:41:18 executing program 0: r0 = socket$inet6(0xa, 0x20000000080002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x0) [ 213.855694][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.864504][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.880200][ T8957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.905624][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.968274][ T8963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.991945][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 19:41:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x6c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff5, &(0x7f000062b000)=""/4085, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 214.016043][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.025461][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.033893][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.038217][ T8991] BPF:hdr_len not found 19:41:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000380)=""/8, 0x8) [ 214.063960][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:41:18 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_names\x00') [ 214.089284][ T8969] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.096444][ T8969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.104802][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.115238][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.124990][ T8969] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.132063][ T8969] bridge0: port 2(bridge_slave_1) entered forwarding state 19:41:18 executing program 1: creat(&(0x7f0000000200)='./file0/bus\x00', 0x0) 19:41:18 executing program 0: write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000001300)=""/4096) [ 214.182437][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.200486][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.223584][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.243622][ T8969] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.250775][ T8969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.266757][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.275740][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.284780][ T8969] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.291853][ T8969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.312038][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.328566][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.350912][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.359664][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.394126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.418741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.428246][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.436252][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.443898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.456356][ T8963] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.474177][ T8959] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.486249][ T8959] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.504899][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.513867][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.521488][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.529882][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.539090][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.547602][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.556186][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.564668][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.573025][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.581788][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.590707][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.599329][ T8970] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.606433][ T8970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.614030][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.621851][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.656677][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.666748][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.676069][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.686554][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.695710][ T8955] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.702909][ T8955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.710676][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.719662][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.727264][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.734789][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.743453][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.760740][ T8957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.770761][ T8959] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.779435][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.789284][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.798101][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.806817][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.827377][ T8963] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.838053][ T8963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.859027][ T8961] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.870962][ T8961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.887075][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.895725][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.904715][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.913232][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.921805][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.930430][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.939270][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.947921][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.957056][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.965648][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.974174][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.983222][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.991170][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.028597][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.038669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.063067][ T8963] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.076266][ T8961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.094906][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.102472][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 19:41:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x67}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff5, &(0x7f000062b000)=""/4085, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:41:20 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x7001, 0x0) syz_open_dev$vbi(0x0, 0x2, 0x2) creat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$get_persistent(0x10, 0x0, r1) getgroups(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000056c0), 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 19:41:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 19:41:20 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000001300)=""/4096) 19:41:20 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RLOCK(r0, &(0x7f0000000100)={0x8}, 0x8) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:41:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r3, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x400c744d, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 215.596698][ T9049] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:41:20 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 19:41:20 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x8) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x200, 0x0, 0xfffffffd, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 19:41:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x74}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff5, &(0x7f000062b000)=""/4085, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:41:20 executing program 2: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x36a) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f8b6) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040), 0x4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) 19:41:20 executing program 4: 19:41:20 executing program 5: [ 215.924343][ C1] hrtimer: interrupt took 51890 ns 19:41:20 executing program 1: 19:41:20 executing program 4: 19:41:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="abeb95f1a0a0fd1748039897cd5bb4527fd9397326f9fcef4a0f1078b03a75d814fd0dd45da37c00fbe5996adf4f5f0761e5e495cbad0929edafbdb7a3396304fb5cf60900000011588cfdc7ce24b2e742b959c55ac22618762cbc654636c8e472b37ced3654"], 0x66) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x200}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/161, 0xa1}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) shutdown(0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='\x00', 0x1) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/psched\x00') socket$netlink(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001280)) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00'/24, @ANYRES32=0x0, @ANYBLOB], 0x1c}}], 0x1, 0x0) [ 216.320170][ T9081] device nr0 entered promiscuous mode 19:41:21 executing program 3: 19:41:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x7001, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syz_open_dev$vbi(0x0, 0x2, 0x2) close(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000056c0), 0x0) socket$inet6(0xa, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_persistent(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:41:21 executing program 4: 19:41:21 executing program 5: 19:41:21 executing program 0: 19:41:21 executing program 4: 19:41:21 executing program 2: 19:41:21 executing program 5: 19:41:21 executing program 3: 19:41:21 executing program 1: 19:41:21 executing program 5: 19:41:21 executing program 4: 19:41:22 executing program 3: 19:41:22 executing program 2: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d2d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:41:22 executing program 0: 19:41:22 executing program 1: 19:41:22 executing program 5: 19:41:22 executing program 4: 19:41:22 executing program 3: 19:41:22 executing program 1: [ 217.531874][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 217.531887][ T27] audit: type=1804 audit(1574019682.210:31): pid=9150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir620881031/syzkaller.d6pTdq/5/bus" dev="sda1" ino=16530 res=1 19:41:22 executing program 0: 19:41:22 executing program 4: 19:41:22 executing program 2: 19:41:22 executing program 5: [ 217.717435][ T27] audit: type=1804 audit(1574019682.260:32): pid=9147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir620881031/syzkaller.d6pTdq/5/bus" dev="sda1" ino=16530 res=1 19:41:22 executing program 0: 19:41:22 executing program 1: 19:41:22 executing program 3: [ 217.847393][ T27] audit: type=1804 audit(1574019682.290:33): pid=9150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir620881031/syzkaller.d6pTdq/5/bus" dev="sda1" ino=16530 res=1 19:41:22 executing program 4: 19:41:22 executing program 2: 19:41:22 executing program 5: 19:41:22 executing program 3: 19:41:22 executing program 1: 19:41:22 executing program 0: 19:41:22 executing program 4: 19:41:22 executing program 2: 19:41:22 executing program 3: 19:41:22 executing program 1: 19:41:22 executing program 0: 19:41:22 executing program 4: 19:41:23 executing program 5: 19:41:23 executing program 2: 19:41:23 executing program 3: 19:41:23 executing program 0: 19:41:23 executing program 5: 19:41:23 executing program 1: 19:41:23 executing program 2: 19:41:23 executing program 4: 19:41:23 executing program 3: 19:41:23 executing program 0: 19:41:23 executing program 5: 19:41:23 executing program 2: 19:41:23 executing program 1: 19:41:23 executing program 0: 19:41:23 executing program 4: 19:41:23 executing program 3: 19:41:23 executing program 5: 19:41:23 executing program 2: 19:41:23 executing program 1: 19:41:23 executing program 0: 19:41:23 executing program 4: 19:41:23 executing program 5: 19:41:23 executing program 3: 19:41:23 executing program 2: 19:41:23 executing program 1: 19:41:23 executing program 0: 19:41:23 executing program 4: 19:41:24 executing program 5: 19:41:24 executing program 3: 19:41:24 executing program 2: 19:41:24 executing program 1: 19:41:24 executing program 0: 19:41:24 executing program 4: 19:41:24 executing program 5: 19:41:24 executing program 2: 19:41:24 executing program 3: 19:41:24 executing program 1: 19:41:24 executing program 0: 19:41:24 executing program 2: 19:41:24 executing program 5: 19:41:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x400) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0xc, 0x0, 0x0) 19:41:24 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) dup2(r0, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x29800, 0x8404}) 19:41:24 executing program 5: 19:41:24 executing program 1: 19:41:24 executing program 0: 19:41:24 executing program 2: 19:41:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x50}, {0x80000006}]}, 0x10) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setregid(0x0, 0x0) r1 = socket(0x10, 0x200080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 219.914728][ T9282] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 220.027014][ T9282] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 19:41:24 executing program 1: unshare(0x400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) 19:41:24 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0x0, 0x2}) 19:41:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x400) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) [ 220.098818][ T9291] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO 19:41:24 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x6, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @dev}, {0x0, @remote}, 0x10, {0x2, 0x0, @empty}, 'teql0\x00'}) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 220.179483][ T9291] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 19:41:24 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, @pix_mp={0x0, 0x7fffffff, 0x0, 0x0, 0x0, [{}, {0x954}, {}, {}, {}, {}, {}, {0x2000}]}}}) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) read$FUSE(r3, 0x0, 0x0) [ 220.276315][ T9307] ion_ioctl: ioctl validate failed 19:41:25 executing program 0: 19:41:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x400) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) 19:41:25 executing program 1: 19:41:25 executing program 3: 19:41:25 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000005ffffa6fffff7", @ANYRES32, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400c9435303000000000000004c72cc", @ANYRES32=r4], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:41:25 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) read$usbmon(r0, &(0x7f0000000080)=""/246, 0xf6) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x2, {0xb, @pix_mp}}) 19:41:25 executing program 1: unshare(0x400) r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)) 19:41:25 executing program 5: 19:41:25 executing program 3: [ 220.672265][ T9335] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.4'. 19:41:25 executing program 1: [ 370.974517][ T1081] INFO: task :9310 can't die for more than 143 seconds. [ 370.981723][ T1081] R running task 28144 9310 8957 0x00004006 [ 371.001071][ T1081] Call Trace: [ 371.005847][ T1081] __schedule+0x8e9/0x1f30 [ 371.010811][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.021821][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.028790][ T1081] ? lockdep_hardirqs_on+0x421/0x5e0 [ 371.039941][ T1081] ? retint_kernel+0x2b/0x2b [ 371.046001][ T1081] ? trace_hardirqs_on_caller+0x6a/0x240 [ 371.051631][ T1081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.064414][ T1081] ? __this_cpu_preempt_check+0x8a/0x190 [ 371.070051][ T1081] ? __this_cpu_preempt_check+0x35/0x190 [ 371.081189][ T1081] ? retint_kernel+0x2b/0x2b [ 371.086606][ T1081] ? irq_work_sync+0xe5/0x1d0 [ 371.091278][ T1081] ? __sanitizer_cov_trace_const_cmp4+0x5/0x20 [ 371.102958][ T1081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.109495][ T1081] ? irq_work_sync+0xd1/0x1d0 [ 371.114160][ T1081] ? _free_event+0x89/0x13b0 [ 371.123368][ T1081] ? __kasan_check_write+0x14/0x20 [ 371.128738][ T1081] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 371.138716][ T1081] ? mark_held_locks+0xa4/0xf0 [ 371.143478][ T1081] ? ring_buffer_attach+0x650/0x650 [ 371.148961][ T1081] ? wait_for_completion+0x440/0x440 [ 371.154237][ T1081] ? put_event+0x47/0x60 [ 371.163043][ T1081] ? perf_event_release_kernel+0x6d5/0xd70 [ 371.169299][ T1081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.180144][ T1081] ? __perf_event_exit_context+0x170/0x170 [ 371.186285][ T1081] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 371.192620][ T1081] ? perf_release+0x37/0x50 [ 371.201565][ T1081] ? __fput+0x2ff/0x890 [ 371.207173][ T1081] ? perf_event_release_kernel+0xd70/0xd70 [ 371.213065][ T1081] ? ____fput+0x16/0x20 [ 371.221661][ T1081] ? task_work_run+0x145/0x1c0 [ 371.226662][ T1081] ? exit_to_usermode_loop+0x316/0x380 [ 371.232126][ T1081] ? do_syscall_64+0x676/0x790 [ 371.241356][ T1081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.247676][ T1081] [ 371.247676][ T1081] Showing all locks held in the system: [ 371.259778][ T1081] 1 lock held by khungtaskd/1081: [ 371.265107][ T1081] #0: ffffffff88faccc0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 371.278995][ T1081] 1 lock held by rsyslogd/8821: [ 371.283833][ T1081] #0: ffff88809a6ece20 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 371.292773][ T1081] 2 locks held by getty/8911: [ 371.302365][ T1081] #0: ffff888085c7b090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.311579][ T1081] #1: ffffc90005f452e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.326743][ T1081] 2 locks held by getty/8912: [ 371.331411][ T1081] #0: ffff88809e40a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.343847][ T1081] #1: ffffc90005f492e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.358177][ T1081] 2 locks held by getty/8913: [ 371.362868][ T1081] #0: ffff888093916090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.372054][ T1081] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.387500][ T1081] 2 locks held by getty/8914: [ 371.392177][ T1081] #0: ffff888099c9d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.402027][ T1081] #1: ffffc90005f532e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.416347][ T1081] 2 locks held by getty/8915: [ 371.421035][ T1081] #0: ffff8880985ac090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.432447][ T1081] #1: ffffc90005f4f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.448077][ T1081] 2 locks held by getty/8916: [ 371.452769][ T1081] #0: ffff8880997f6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.463478][ T1081] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.477492][ T1081] 2 locks held by getty/8917: [ 371.482162][ T1081] #0: ffff888094d55090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 371.492047][ T1081] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 371.506318][ T1081] [ 371.508657][ T1081] ============================================= [ 371.508657][ T1081] [ 371.520256][ T1081] NMI backtrace for cpu 1 [ 371.524709][ T1081] CPU: 1 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 371.533276][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.543316][ T1081] Call Trace: [ 371.546666][ T1081] dump_stack+0x197/0x210 [ 371.550986][ T1081] nmi_cpu_backtrace.cold+0x70/0xb2 [ 371.556169][ T1081] ? vprintk_func+0x86/0x189 [ 371.560744][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 371.566360][ T1081] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 371.572331][ T1081] arch_trigger_cpumask_backtrace+0x14/0x20 [ 371.578233][ T1081] watchdog+0xc8f/0x1350 [ 371.582475][ T1081] kthread+0x361/0x430 [ 371.586531][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 371.592060][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 371.597767][ T1081] ret_from_fork+0x24/0x30 [ 371.602374][ T1081] Sending NMI from CPU 1 to CPUs 0: [ 371.608047][ C0] NMI backtrace for cpu 0 [ 371.608053][ C0] CPU: 0 PID: 840 Comm: kworker/u4:5 Not tainted 5.4.0-rc7-next-20191115 #0 [ 371.608059][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.608062][ C0] Workqueue: bat_events batadv_nc_worker [ 371.608069][ C0] RIP: 0010:mark_held_locks+0x98/0xf0 [ 371.608079][ C0] Code: f8 48 89 fa 48 c1 e8 03 83 e2 07 42 0f b6 04 30 38 d0 7f 04 84 c0 75 4c 0f b6 46 22 89 c2 83 e2 03 80 fa 01 44 89 e2 83 da ff 04 74 0c 4c 89 ef e8 3c ed ff ff 85 c0 74 11 83 c3 01 41 39 9d [ 371.608082][ C0] RSP: 0018:ffff8880a838fb80 EFLAGS: 00000017 [ 371.608089][ C0] RAX: 0000000000000004 RBX: 0000000000000001 RCX: 0000000000000006 [ 371.608093][ C0] RDX: 0000000000000006 RSI: ffff8880a8380948 RDI: ffff8880a838096a [ 371.608098][ C0] RBP: ffff8880a838fbb0 R08: 1ffffffff14f4b4a R09: fffffbfff14f4b4b [ 371.608102][ C0] R10: fffffbfff14f4b4a R11: ffffffff8a7a5a57 R12: 0000000000000006 [ 371.608107][ C0] R13: ffff8880a8380080 R14: dffffc0000000000 R15: ffff8880a8380920 [ 371.608111][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 371.608115][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.608120][ C0] CR2: 00007fa3b3b5b000 CR3: 000000009fca8000 CR4: 00000000001406f0 [ 371.608124][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.608129][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.608131][ C0] Call Trace: [ 371.608135][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 371.608138][ C0] ? _raw_spin_unlock_bh+0x2c/0x30 [ 371.608141][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 371.608144][ C0] lockdep_hardirqs_on+0x421/0x5e0 [ 371.608148][ C0] ? batadv_nc_purge_paths+0x265/0x370 [ 371.608151][ C0] trace_hardirqs_on+0x67/0x240 [ 371.608154][ C0] ? batadv_nc_purge_paths+0x265/0x370 [ 371.608158][ C0] ? batadv_nc_purge_orig_nc_nodes+0x260/0x260 [ 371.608161][ C0] __local_bh_enable_ip+0x15a/0x270 [ 371.608164][ C0] _raw_spin_unlock_bh+0x2c/0x30 [ 371.608168][ C0] batadv_nc_purge_paths+0x265/0x370 [ 371.608171][ C0] batadv_nc_worker+0x2ca/0x760 [ 371.608175][ C0] process_one_work+0x9af/0x1740 [ 371.608178][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 371.608181][ C0] ? lock_acquire+0x190/0x410 [ 371.608184][ C0] worker_thread+0x98/0xe40 [ 371.608188][ C0] ? trace_hardirqs_on+0x67/0x240 [ 371.608191][ C0] kthread+0x361/0x430 [ 371.608194][ C0] ? process_one_work+0x1740/0x1740 [ 371.608197][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 371.608200][ C0] ret_from_fork+0x24/0x30 [ 371.610637][ T1081] Kernel panic - not syncing: hung_task: blocked tasks [ 371.864087][ T1081] CPU: 1 PID: 1081 Comm: khungtaskd Not tainted 5.4.0-rc7-next-20191115 #0 [ 371.872651][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.882705][ T1081] Call Trace: [ 371.886003][ T1081] dump_stack+0x197/0x210 [ 371.890324][ T1081] panic+0x2e3/0x75c [ 371.894203][ T1081] ? add_taint.cold+0x16/0x16 [ 371.898862][ T1081] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 371.904487][ T1081] ? ___preempt_schedule+0x16/0x18 [ 371.909596][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 371.915993][ T1081] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 371.922141][ T1081] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 371.928284][ T1081] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 371.934433][ T1081] watchdog+0xca0/0x1350 [ 371.938685][ T1081] kthread+0x361/0x430 [ 371.942736][ T1081] ? reset_hung_task_detector+0x30/0x30 [ 371.948267][ T1081] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 371.953979][ T1081] ret_from_fork+0x24/0x30 [ 371.959952][ T1081] Kernel Offset: disabled [ 371.964306][ T1081] Rebooting in 86400 seconds..