[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.515928][ T27] audit: type=1800 audit(1571803163.574:25): pid=8491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.543723][ T27] audit: type=1800 audit(1571803163.574:26): pid=8491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.591732][ T27] audit: type=1800 audit(1571803163.574:27): pid=8491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. 2019/10/23 03:59:33 fuzzer started 2019/10/23 03:59:35 dialing manager at 10.128.0.26:45337 2019/10/23 03:59:35 syscalls: 2525 2019/10/23 03:59:35 code coverage: enabled 2019/10/23 03:59:35 comparison tracing: enabled 2019/10/23 03:59:35 extra coverage: extra coverage is not supported by the kernel 2019/10/23 03:59:35 setuid sandbox: enabled 2019/10/23 03:59:35 namespace sandbox: enabled 2019/10/23 03:59:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/23 03:59:35 fault injection: enabled 2019/10/23 03:59:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/23 03:59:35 net packet injection: enabled 2019/10/23 03:59:35 net device setup: enabled 2019/10/23 03:59:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 03:59:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x7843c471) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 03:59:36 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20008010) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r4, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0xfd2b) syzkaller login: [ 70.347296][ T8658] IPVS: ftp: loaded support on port[0] = 21 [ 70.511545][ T8658] chnl_net:caif_netlink_parms(): no params data found [ 70.561542][ T8658] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.583129][ T8658] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.595246][ T8658] device bridge_slave_0 entered promiscuous mode 03:59:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 70.613094][ T8661] IPVS: ftp: loaded support on port[0] = 21 [ 70.620471][ T8658] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.627988][ T8658] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.641473][ T8658] device bridge_slave_1 entered promiscuous mode [ 70.713365][ T8658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.735370][ T8658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.780439][ T8658] team0: Port device team_slave_0 added [ 70.798596][ T8658] team0: Port device team_slave_1 added 03:59:36 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) pipe(0x0) r1 = socket$packet(0x11, 0x0, 0x300) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000180)=@can, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0x6dd834b991cb4f75}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000740)={0x0, {{0xa, 0x4e21, 0x0, @remote, 0xfffffff9}}}, 0x88) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x0, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f4ed2d344dc7f0d330cdd6380d9a9d640872c6b434e1e6b823ea9e9ef8a0cd7b2e805740d4a2aa1ca93b192e47938d5a319fa3278226b51abbcae10d4d926d143499335b8d94ce35f36b0a2f94bcd3dc42ef47fc355c13bf18188f69a00d686a33", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 70.968618][ T8658] device hsr_slave_0 entered promiscuous mode [ 71.035790][ T8658] device hsr_slave_1 entered promiscuous mode [ 71.099474][ T8663] IPVS: ftp: loaded support on port[0] = 21 03:59:37 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 71.147106][ T8658] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.154573][ T8658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.162887][ T8658] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.170136][ T8658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.190721][ T8665] IPVS: ftp: loaded support on port[0] = 21 [ 71.272869][ T8661] chnl_net:caif_netlink_parms(): no params data found [ 71.457353][ T8668] IPVS: ftp: loaded support on port[0] = 21 [ 71.471277][ T8661] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.482321][ T8661] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.491009][ T8661] device bridge_slave_0 entered promiscuous mode 03:59:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) [ 71.516198][ T2981] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.539671][ T2981] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.597644][ T8661] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.605756][ T8661] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.614535][ T8661] device bridge_slave_1 entered promiscuous mode [ 71.642449][ T8661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.692654][ T8661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.710162][ T8665] chnl_net:caif_netlink_parms(): no params data found [ 71.743206][ T8658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.763217][ T8661] team0: Port device team_slave_0 added [ 71.771804][ T8672] IPVS: ftp: loaded support on port[0] = 21 [ 71.773900][ T8661] team0: Port device team_slave_1 added [ 71.849453][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.857883][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.926891][ T8661] device hsr_slave_0 entered promiscuous mode [ 71.973994][ T8661] device hsr_slave_1 entered promiscuous mode [ 72.043685][ T8661] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.053210][ T8658] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.102422][ T8665] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.109977][ T8665] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.117985][ T8665] device bridge_slave_0 entered promiscuous mode [ 72.129871][ T8663] chnl_net:caif_netlink_parms(): no params data found [ 72.143176][ T8665] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.150527][ T8665] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.158816][ T8665] device bridge_slave_1 entered promiscuous mode [ 72.180549][ T8665] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.192778][ T8665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.218208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.228207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.236924][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.244035][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.263288][ T8668] chnl_net:caif_netlink_parms(): no params data found [ 72.309112][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.318863][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.328427][ T3751] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.335780][ T3751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.349236][ T8665] team0: Port device team_slave_0 added [ 72.378311][ T8668] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.385753][ T8668] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.394870][ T8668] device bridge_slave_0 entered promiscuous mode [ 72.404620][ T8668] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.411696][ T8668] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.419650][ T8668] device bridge_slave_1 entered promiscuous mode [ 72.428546][ T8665] team0: Port device team_slave_1 added [ 72.436208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.446925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.456219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.465250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.474055][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.481113][ T8663] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.489056][ T8663] device bridge_slave_0 entered promiscuous mode [ 72.528840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.537236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.546074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.554631][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.562907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.571665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.580080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.588382][ T8663] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.598382][ T8663] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.606450][ T8663] device bridge_slave_1 entered promiscuous mode [ 72.638301][ T8668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.685710][ T8665] device hsr_slave_0 entered promiscuous mode [ 72.734214][ T8665] device hsr_slave_1 entered promiscuous mode [ 72.773785][ T8665] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.787677][ T8663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.800466][ T8663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.813331][ T8668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.825535][ T8658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.859911][ T8663] team0: Port device team_slave_0 added [ 72.868722][ T8663] team0: Port device team_slave_1 added [ 72.890046][ T8668] team0: Port device team_slave_0 added [ 72.899997][ T8668] team0: Port device team_slave_1 added [ 72.955612][ T8663] device hsr_slave_0 entered promiscuous mode [ 73.024297][ T8663] device hsr_slave_1 entered promiscuous mode [ 73.093939][ T8663] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.105028][ T8661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.206915][ T8668] device hsr_slave_0 entered promiscuous mode [ 73.244332][ T8668] device hsr_slave_1 entered promiscuous mode [ 73.283771][ T8668] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.310578][ T8658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.322908][ T8661] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.349902][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.358705][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.394064][ T8672] chnl_net:caif_netlink_parms(): no params data found [ 73.435082][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.447358][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.460114][ T3751] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.467251][ T3751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.481806][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.504982][ T8665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.528804][ T8665] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.544358][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.551470][ T8672] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.562865][ T8672] device bridge_slave_0 entered promiscuous mode [ 73.594800][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.602575][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.611679][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.620489][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.629354][ T8669] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.636507][ T8669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.659038][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.669601][ T8672] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.681661][ T8672] device bridge_slave_1 entered promiscuous mode [ 73.712027][ T8668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.730633][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.741065][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.749660][ T8674] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.756860][ T8674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.765281][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.774241][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.783260][ T8674] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.790384][ T8674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.798443][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.807388][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.840798][ T8672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.852137][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.861957][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.871261][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.880481][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.889458][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.898718][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.907751][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.917142][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.926798][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.935581][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.943409][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.956160][ T8672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.972261][ T8663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.988176][ T8661] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 73.999363][ T8661] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.011349][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.020406][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.029330][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.038152][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.047060][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.055695][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.064242][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.087356][ T8668] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.109254][ T8665] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 74.120899][ T8665] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.132442][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.141689][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.149732][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.159217][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.168727][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.178215][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.186942][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.195712][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.204635][ T8672] team0: Port device team_slave_0 added [ 74.212149][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.238483][ T8663] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.247865][ T8672] team0: Port device team_slave_1 added [ 74.258857][ T8661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.270599][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.286996][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.301456][ T8669] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.308588][ T8669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.317136][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.325902][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.334582][ T8669] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.341619][ T8669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.349429][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.358964][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.367990][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.376745][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.419333][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.427902][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.436446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.445849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.455796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.465133][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.473323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.481843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.490540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.499470][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.508038][ T12] bridge0: port 1(bridge_slave_0) entered blocking state 03:59:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x7843c471) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 74.515143][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.523230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.541013][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.549672][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.556836][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.564721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.573989][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.598650][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.676703][ T8672] device hsr_slave_0 entered promiscuous mode [ 74.734315][ T8672] device hsr_slave_1 entered promiscuous mode [ 74.774009][ T8672] debugfs: Directory 'hsr0' with parent '/' already present! [ 74.787390][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.800983][ T8665] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.821758][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.837378][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.880246][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.895154][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.922034][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.934992][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.947877][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.960293][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.961760][ C0] hrtimer: interrupt took 44553 ns [ 74.972724][ T3751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.985186][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.997357][ T8668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.109432][ T8663] 8021q: adding VLAN 0 to HW filter on device batadv0 03:59:41 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20008010) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r4, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0xfd2b) [ 75.261623][ T8672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.324660][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.339511][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.365847][ T8672] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.390734][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 03:59:41 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) pipe(0x0) r1 = socket$packet(0x11, 0x0, 0x300) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000180)=@can, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0x6dd834b991cb4f75}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000740)={0x0, {{0xa, 0x4e21, 0x0, @remote, 0xfffffff9}}}, 0x88) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x0, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f4ed2d344dc7f0d330cdd6380d9a9d640872c6b434e1e6b823ea9e9ef8a0cd7b2e805740d4a2aa1ca93b192e47938d5a319fa3278226b51abbcae10d4d926d143499335b8d94ce35f36b0a2f94bcd3dc42ef47fc355c13bf18188f69a00d686a33", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 75.409866][ T8669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 03:59:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x7843c471) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 75.445740][ T8669] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.452898][ T8669] bridge0: port 1(bridge_slave_0) entered forwarding state 03:59:41 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:41 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 75.613665][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.621777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.642109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.658516][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.665710][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.674401][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.684632][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:59:41 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20008010) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r4, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0xfd2b) 03:59:41 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:41 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 03:59:41 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 03:59:42 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 75.984204][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.993151][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.027219][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.071104][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.086271][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.098070][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.117435][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.156079][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.178627][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.196336][ T8672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.242425][ T8672] 8021q: adding VLAN 0 to HW filter on device batadv0 03:59:42 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 03:59:42 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 03:59:42 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20008010) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r4, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0xfd2b) 03:59:42 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) pipe(0x0) r1 = socket$packet(0x11, 0x0, 0x300) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000180)=@can, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0x6dd834b991cb4f75}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000740)={0x0, {{0xa, 0x4e21, 0x0, @remote, 0xfffffff9}}}, 0x88) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x0, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f4ed2d344dc7f0d330cdd6380d9a9d640872c6b434e1e6b823ea9e9ef8a0cd7b2e805740d4a2aa1ca93b192e47938d5a319fa3278226b51abbcae10d4d926d143499335b8d94ce35f36b0a2f94bcd3dc42ef47fc355c13bf18188f69a00d686a33", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 03:59:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x7843c471) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 03:59:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000740)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 03:59:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:42 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) pipe(0x0) r1 = socket$packet(0x11, 0x0, 0x300) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000180)=@can, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0x6dd834b991cb4f75}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000740)={0x0, {{0xa, 0x4e21, 0x0, @remote, 0xfffffff9}}}, 0x88) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x0, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f4ed2d344dc7f0d330cdd6380d9a9d640872c6b434e1e6b823ea9e9ef8a0cd7b2e805740d4a2aa1ca93b192e47938d5a319fa3278226b51abbcae10d4d926d143499335b8d94ce35f36b0a2f94bcd3dc42ef47fc355c13bf18188f69a00d686a33", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 03:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:43 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:43 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 03:59:43 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:59:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x44c00) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 77.734851][ T1080] ------------[ cut here ]------------ [ 77.740383][ T1080] WARNING: CPU: 1 PID: 1080 at mm/khugepaged.c:1643 collapse_file+0x1f9d/0x4170 [ 77.749437][ T1080] Kernel panic - not syncing: panic_on_warn set ... [ 77.756158][ T1080] CPU: 1 PID: 1080 Comm: khugepaged Not tainted 5.4.0-rc4-next-20191022 #0 [ 77.764746][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.774805][ T1080] Call Trace: [ 77.778111][ T1080] dump_stack+0x172/0x1f0 03:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) [ 77.782460][ T1080] ? collapse_file+0x1ef0/0x4170 [ 77.787492][ T1080] panic+0x2e3/0x75c [ 77.789230][ T3883] kobject: 'loop3' (000000008283b5cc): kobject_uevent_env [ 77.791391][ T1080] ? add_taint.cold+0x16/0x16 [ 77.791407][ T1080] ? printk+0xba/0xed [ 77.807235][ T1080] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 77.812733][ T1080] ? __warn.cold+0x14/0x35 [ 77.817155][ T1080] ? __warn+0xd9/0x1d0 [ 77.821228][ T1080] ? collapse_file+0x1f9d/0x4170 [ 77.826167][ T1080] __warn.cold+0x2f/0x35 [ 77.830416][ T1080] ? report_bug.cold+0x63/0xb2 03:59:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) [ 77.835183][ T1080] ? collapse_file+0x1f9d/0x4170 [ 77.840129][ T1080] report_bug+0x289/0x300 [ 77.844463][ T1080] do_error_trap+0x11b/0x200 [ 77.846748][ T3883] kobject: 'loop3' (000000008283b5cc): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 77.849668][ T1080] do_invalid_op+0x37/0x50 [ 77.849682][ T1080] ? collapse_file+0x1f9d/0x4170 [ 77.849699][ T1080] invalid_op+0x23/0x30 [ 77.873302][ T1080] RIP: 0010:collapse_file+0x1f9d/0x4170 03:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x182, 0x4) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) [ 77.878850][ T1080] Code: a1 c0 ff 31 c9 ba 01 00 00 00 4c 89 fe 48 8b bd c0 fe ff ff e8 e4 e9 ec ff e9 b4 fd ff ff 4c 8b bd 88 fe ff ff e8 93 a1 c0 ff <0f> 0b 4c 8b a3 50 ff ff ff c7 85 80 fe ff ff 00 00 00 00 e9 05 f6 [ 77.893996][ T3883] kobject: 'loop5' (00000000c39d0c16): kobject_uevent_env [ 77.899318][ T1080] RSP: 0018:ffff8880a7d17ad0 EFLAGS: 00010293 [ 77.899331][ T1080] RAX: ffff8880a7e74440 RBX: ffff8880a7d17c88 RCX: ffffffff81b2b688 [ 77.899339][ T1080] RDX: 0000000000000000 RSI: ffffffff81b2b9ad RDI: 0000000000000001 [ 77.899348][ T1080] RBP: ffff8880a7d17cb0 R08: ffff8880a7e74440 R09: fffff94000468069 [ 77.899355][ T1080] R10: fffff94000468068 R11: ffffea0002340347 R12: 0000000000000001 [ 77.899368][ T1080] R13: ffffea00024321c8 R14: 0000000000000000 R15: ffffea0001bb0000 [ 77.950310][ T3883] kobject: 'loop5' (00000000c39d0c16): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 77.952356][ T1080] ? collapse_file+0x1c78/0x4170 [ 77.952368][ T1080] ? collapse_file+0x1f9d/0x4170 [ 77.952388][ T1080] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 77.978536][ T1080] ? khugepaged+0x21d0/0x4360 [ 77.983223][ T1080] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 77.990863][ T3883] kobject: 'loop1' (00000000b2e88c73): kobject_uevent_env [ 77.991304][ T1080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 78.004093][ T1080] ? khugepaged_find_target_node+0x142/0x180 [ 78.010086][ T1080] khugepaged+0x2da9/0x4360 [ 78.014593][ T1080] ? __kasan_check_read+0x11/0x20 [ 78.015293][ T3883] kobject: 'loop1' (00000000b2e88c73): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 78.019616][ T1080] ? __lock_acquire+0x16f2/0x4a00 [ 78.019635][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 78.019649][ T1080] ? finish_task_switch+0x147/0x750 [ 78.019660][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 78.019676][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 78.047123][ T3883] kobject: 'loop0' (0000000088e17e2d): kobject_uevent_env [ 78.050379][ T1080] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 78.050401][ T1080] ? lock_downgrade+0x920/0x920 [ 78.055783][ T3883] kobject: 'loop0' (0000000088e17e2d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 78.062774][ T1080] ? finish_wait+0x260/0x260 [ 78.062792][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 78.062807][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 78.062828][ T1080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 78.078165][ T3883] kobject: 'loop1' (00000000b2e88c73): kobject_uevent_env [ 78.083414][ T1080] ? __kthread_parkme+0x108/0x1c0 [ 78.083429][ T1080] ? __kasan_check_read+0x11/0x20 [ 78.083442][ T1080] kthread+0x361/0x430 [ 78.083460][ T1080] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 78.094895][ T3883] kobject: 'loop1' (00000000b2e88c73): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 78.098344][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 78.098364][ T1080] ret_from_fork+0x24/0x30 [ 78.106007][ T1080] Kernel Offset: disabled [ 78.157419][ T1080] Rebooting in 86400 seconds..