[ 52.865983][ T27] audit: type=1800 audit(1555067439.639:23): pid=8771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2442 res=0 [ 52.886522][ T27] audit: type=1800 audit(1555067439.639:24): pid=8771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. 2019/04/12 11:10:51 fuzzer started 2019/04/12 11:10:54 dialing manager at 10.128.0.26:43643 2019/04/12 11:10:54 syscalls: 2408 2019/04/12 11:10:54 code coverage: enabled 2019/04/12 11:10:54 comparison tracing: enabled 2019/04/12 11:10:54 extra coverage: extra coverage is not supported by the kernel 2019/04/12 11:10:54 setuid sandbox: enabled 2019/04/12 11:10:54 namespace sandbox: enabled 2019/04/12 11:10:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/12 11:10:54 fault injection: enabled 2019/04/12 11:10:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/12 11:10:54 net packet injection: enabled 2019/04/12 11:10:54 net device setup: enabled 11:12:05 executing program 0: syzkaller login: [ 139.235346][ T8955] IPVS: ftp: loaded support on port[0] = 21 11:12:06 executing program 1: [ 139.319850][ T8955] chnl_net:caif_netlink_parms(): no params data found [ 139.382825][ T8955] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.395685][ T8955] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.403771][ T8955] device bridge_slave_0 entered promiscuous mode [ 139.411895][ T8955] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.419462][ T8955] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.427954][ T8955] device bridge_slave_1 entered promiscuous mode [ 139.444843][ T8955] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 139.460012][ T8955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 139.473766][ T8958] IPVS: ftp: loaded support on port[0] = 21 11:12:06 executing program 2: [ 139.494415][ T8955] team0: Port device team_slave_0 added [ 139.513503][ T8955] team0: Port device team_slave_1 added [ 139.591119][ T8955] device hsr_slave_0 entered promiscuous mode 11:12:06 executing program 3: [ 139.687262][ T8955] device hsr_slave_1 entered promiscuous mode [ 139.743811][ T8955] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.750934][ T8955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.758279][ T8955] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.765332][ T8955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.792598][ T8963] IPVS: ftp: loaded support on port[0] = 21 [ 139.801621][ T8960] IPVS: ftp: loaded support on port[0] = 21 11:12:06 executing program 4: [ 139.900253][ T8955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.913056][ T8958] chnl_net:caif_netlink_parms(): no params data found [ 139.945253][ T8955] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.959766][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.969523][ T2988] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.994373][ T2988] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.002652][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 140.036257][ T8966] IPVS: ftp: loaded support on port[0] = 21 11:12:06 executing program 5: [ 140.085435][ T8955] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 140.098859][ T8955] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 140.112731][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.122824][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.129940][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.138973][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.147450][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.154504][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.164186][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.172662][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.181066][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.189232][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.198781][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.206255][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.242135][ T8963] chnl_net:caif_netlink_parms(): no params data found [ 140.265738][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.273088][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.280683][ T8958] device bridge_slave_0 entered promiscuous mode [ 140.288851][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.295897][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.303589][ T8958] device bridge_slave_1 entered promiscuous mode [ 140.328891][ T8970] IPVS: ftp: loaded support on port[0] = 21 [ 140.348206][ T8960] chnl_net:caif_netlink_parms(): no params data found [ 140.363604][ T8963] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.371415][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.379182][ T8963] device bridge_slave_0 entered promiscuous mode [ 140.394813][ T8958] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 140.405340][ T8958] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 140.417434][ T8963] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.424529][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.432159][ T8963] device bridge_slave_1 entered promiscuous mode [ 140.454690][ T8955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.493210][ T8963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 140.505388][ T8963] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 140.514757][ T8958] team0: Port device team_slave_0 added [ 140.521725][ T8958] team0: Port device team_slave_1 added [ 140.557908][ T8963] team0: Port device team_slave_0 added [ 140.565674][ T8963] team0: Port device team_slave_1 added [ 140.598801][ T8958] device hsr_slave_0 entered promiscuous mode [ 140.637164][ T8958] device hsr_slave_1 entered promiscuous mode [ 140.694199][ T8960] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.701364][ T8960] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.708984][ T8960] device bridge_slave_0 entered promiscuous mode [ 140.716293][ T8960] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.723556][ T8960] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.731072][ T8960] device bridge_slave_1 entered promiscuous mode 11:12:07 executing program 0: sched_setaffinity(0x0, 0x2, &(0x7f0000000140)=0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 140.772339][ T8960] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 140.785803][ T8966] chnl_net:caif_netlink_parms(): no params data found [ 140.798725][ T8960] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 140.859153][ T8963] device hsr_slave_0 entered promiscuous mode [ 140.897327][ T8963] device hsr_slave_1 entered promiscuous mode 11:12:07 executing program 0: 11:12:07 executing program 0: [ 140.954462][ T8960] team0: Port device team_slave_0 added [ 140.961402][ T8960] team0: Port device team_slave_1 added [ 140.982801][ T8963] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.989896][ T8963] bridge0: port 2(bridge_slave_1) entered forwarding state 11:12:07 executing program 0: 11:12:07 executing program 0: 11:12:07 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") write(r0, &(0x7f0000000080)="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", 0xfc) [ 141.051823][ T8960] device hsr_slave_0 entered promiscuous mode [ 141.087566][ T8960] device hsr_slave_1 entered promiscuous mode [ 141.135092][ T8970] chnl_net:caif_netlink_parms(): no params data found [ 141.147727][ T8966] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.154932][ T8966] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.162707][ T8966] device bridge_slave_0 entered promiscuous mode 11:12:08 executing program 0: setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x1ff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x3a, 0x2, 0x0, "c7a272a1a786e79180e42a551baa0977", "94920e06581516cb23c6500444fc8b6dcdd8111fcb03b2c8cf2d8c20c57037e79af2228609"}, 0x3a, 0x2) memfd_create(0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000240)=0x1000000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x1, 0x0) memfd_create(&(0x7f0000000380)='^\xc4(proc\x00', 0x4) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000200)=0x2) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000001c0)=0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 141.181815][ T8966] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.189731][ T8966] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.197718][ T8966] device bridge_slave_1 entered promiscuous mode [ 141.234895][ T8970] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.243412][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.251718][ T8970] device bridge_slave_0 entered promiscuous mode [ 141.266901][ C0] hrtimer: interrupt took 41078 ns [ 141.273038][ T8958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 141.283371][ T8960] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.290478][ T8960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.297789][ T8960] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.304818][ T8960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.318339][ T8966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.329098][ T8966] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.338888][ T8970] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.345933][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.365007][ T8970] device bridge_slave_1 entered promiscuous mode [ 141.383291][ T8958] 8021q: adding VLAN 0 to HW filter on device team0 [ 141.404095][ T8966] team0: Port device team_slave_0 added [ 141.411382][ T8966] team0: Port device team_slave_1 added [ 141.418877][ T8962] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.426596][ T8962] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 141.435496][ T8962] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.444026][ T8962] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.453924][ T8962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.461622][ T8962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.478073][ T8970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.493614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.502377][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.511088][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.518158][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.525701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.534231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.542876][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.549937][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.557447][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.565879][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.574496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.582945][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.591159][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.599573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.607936][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.616154][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.624599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.632544][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.641746][ T8958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 141.654206][ T8958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.669710][ T8970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.683613][ T8963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 141.692812][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.701312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.717046][ T8958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 141.759251][ T8966] device hsr_slave_0 entered promiscuous mode [ 141.807145][ T8966] device hsr_slave_1 entered promiscuous mode 11:12:08 executing program 1: [ 141.874290][ T8963] 8021q: adding VLAN 0 to HW filter on device team0 [ 141.893334][ T8970] team0: Port device team_slave_0 added [ 141.903627][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.912211][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.933849][ T8960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 141.945724][ T8970] team0: Port device team_slave_1 added [ 141.952371][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.961154][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.970482][ T3535] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.977583][ T3535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.003933][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.014297][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.029519][ T8998] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.036586][ T8998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.046219][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.061071][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.072172][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 142.081163][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 142.089816][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 142.098287][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 142.106459][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.114844][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.123268][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 142.132921][ T8963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 142.144352][ T8963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 142.218739][ T8970] device hsr_slave_0 entered promiscuous mode [ 142.267333][ T8970] device hsr_slave_1 entered promiscuous mode [ 142.307884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.316189][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.329839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.338069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.358773][ T8960] 8021q: adding VLAN 0 to HW filter on device team0 [ 142.370942][ T8963] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.379107][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.387900][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.396193][ T3534] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.403343][ T3534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.421759][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.430679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.439140][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.448136][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.456009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.464846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.477262][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 142.485585][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 142.494362][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 142.502924][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 142.517145][ T8970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.524018][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 142.535639][ T8960] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 142.557049][ T8960] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 142.580189][ T8966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.589222][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.597620][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.605844][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.614460][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.623237][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 142.634186][ T8966] 8021q: adding VLAN 0 to HW filter on device team0 [ 142.649741][ T8970] 8021q: adding VLAN 0 to HW filter on device team0 [ 142.657529][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.665106][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.673447][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.682155][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.690714][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.697777][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.705415][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.713914][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.722207][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.729247][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.736722][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.744341][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.752264][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.771488][ T8970] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 142.782083][ T8970] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 142.800798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.809258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.820426][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.827523][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.835359][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.844198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.853008][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.860073][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.868008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.876383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.885012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 142.893372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 142.901745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 142.910299][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 142.918808][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.926999][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.935126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.943998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.952339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.961678][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.969662][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 142.977754][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 142.985701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.007902][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.016257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.026034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.035482][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.043937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.052155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.061842][ T8970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.074005][ T8960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.082005][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.093597][ T8966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.105811][ T8966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.123205][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.154007][ T8998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.172895][ T8966] 8021q: adding VLAN 0 to HW filter on device batadv0 11:12:10 executing program 2: 11:12:10 executing program 1: 11:12:10 executing program 0: setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x1ff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x3a, 0x2, 0x0, "c7a272a1a786e79180e42a551baa0977", "94920e06581516cb23c6500444fc8b6dcdd8111fcb03b2c8cf2d8c20c57037e79af2228609"}, 0x3a, 0x2) memfd_create(0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000240)=0x1000000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x1, 0x0) memfd_create(&(0x7f0000000380)='^\xc4(proc\x00', 0x4) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000200)=0x2) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000001c0)=0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 11:12:10 executing program 3: 11:12:10 executing program 5: 11:12:10 executing program 4: 11:12:10 executing program 3: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x13f, 0xb}}, 0x20) 11:12:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x70b002) 11:12:10 executing program 1: 11:12:10 executing program 2: 11:12:10 executing program 4: 11:12:10 executing program 2: 11:12:10 executing program 3: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x13f, 0xb}}, 0x20) 11:12:10 executing program 1: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 11:12:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = dup(0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000003c0)={'filter\x00', 0x0, 0x3, 0x67, [], 0x1, &(0x7f0000000300)=[{}], &(0x7f0000000340)=""/103}, &(0x7f0000000440)=0x78) r2 = socket(0x11, 0x802, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 11:12:10 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0xd, 0x0, 0xe1c20afdb573eb44, 0x0, 'syz0\x00', 0x0, 0x2ba}) 11:12:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x70b002) 11:12:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x70b002) 11:12:10 executing program 0: setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x1ff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x3a, 0x2, 0x0, "c7a272a1a786e79180e42a551baa0977", "94920e06581516cb23c6500444fc8b6dcdd8111fcb03b2c8cf2d8c20c57037e79af2228609"}, 0x3a, 0x2) memfd_create(0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000240)=0x1000000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x1, 0x0) memfd_create(&(0x7f0000000380)='^\xc4(proc\x00', 0x4) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000200)=0x2) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000001c0)=0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 11:12:10 executing program 1: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 11:12:10 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 144.127215][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 144.133011][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:12:11 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 11:12:11 executing program 1: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 144.312534][ T9096] device team0 entered promiscuous mode [ 144.330788][ T9096] device team_slave_0 entered promiscuous mode [ 144.360918][ T9096] device team_slave_1 entered promiscuous mode 11:12:11 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 11:12:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x70b002) [ 144.410174][ T9096] 8021q: adding VLAN 0 to HW filter on device team0 11:12:11 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "bbb25b9880e61c0238e9ec8723dd38be0c967c4a4745f717d82d1959deee0496c4c4d127ccffea896c25ca75f2fdc7f45b38ca93ae443ec3bf521440795a4b9639cbda751719982f0b4bbf666a6ff4add7ef18df1486e515e66fa6c40140cc6c0d5d4223dd0b4c4b5bb89c548a0d6a2b7c1709cc4b74598596a370c0a3d998add17aa669d87f1bb760c47c2608b1ec63dfe3b2c9c102505c3f34f5b11680259c2f06348f4171b2dc3801fbec81806c627a4fbad00ed9525da4c9dc945b23aa31970e4eb801d5ed1cea721e037bb8295cba6608b5891346ad39d4d6be1e806be2ac104a4bd789fe838e6bf622cdff970128fce1fc818af6cf705f1b7c92dfb583", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 144.531182][ T9084] device team0 left promiscuous mode [ 144.544794][ T9084] device team_slave_0 left promiscuous mode [ 144.572978][ T9084] device team_slave_1 left promiscuous mode 11:12:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = dup(0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000003c0)={'filter\x00', 0x0, 0x3, 0x67, [], 0x1, &(0x7f0000000300)=[{}], &(0x7f0000000340)=""/103}, &(0x7f0000000440)=0x78) r2 = socket(0x11, 0x802, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 11:12:11 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) getegid() ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x0, 0xb}}, 0x20) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) 11:12:11 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) socket$inet6(0xa, 0x80000, 0x7fff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f") perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x8000) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 144.692237][ T9096] device team0 entered promiscuous mode [ 144.707003][ T9096] device team_slave_0 entered promiscuous mode [ 144.714473][ T9096] device team_slave_1 entered promiscuous mode [ 144.732345][ T9096] 8021q: adding VLAN 0 to HW filter on device team0 11:12:11 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)=')^') socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x0, 0x7fff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) ftruncate(0xffffffffffffffff, 0x9) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getegid() r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x0, 0x0, 0x1f, 0x79, 0x1ff8000000000000, 0x5}}}, 0x120) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 144.857185][ T9151] device team0 left promiscuous mode [ 144.866017][ T9151] device team_slave_0 left promiscuous mode [ 144.878402][ T9151] device team_slave_1 left promiscuous mode 11:12:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x9a, 0x4, 0x70, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x3c) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) [ 145.079350][ T9152] device team0 entered promiscuous mode [ 145.087130][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 145.092913][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 145.096929][ T9152] device team_slave_0 entered promiscuous mode [ 145.109454][ T9152] device team_slave_1 entered promiscuous mode [ 145.120962][ T9152] 8021q: adding VLAN 0 to HW filter on device team0 11:12:11 executing program 3: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff}) tee(r1, r0, 0x3, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 11:12:12 executing program 3: syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0xfffffffffffffffc) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:12:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c4e1f9e776396f") ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="fd78c4c8cd916fbadb9aee7b227a1a48", 0x10) 11:12:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x70b002) 11:12:12 executing program 3: r0 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0xa2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000300)={0x9, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="a8342e25de569e5b3a7d19ad3cdba008"}}}, 0x108) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 11:12:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0xfffffffffffffffc) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:12:12 executing program 3: r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) r5 = dup2(r4, r3) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000004e00)={0x0, 0x0, &(0x7f0000004dc0)={0x0}}, 0x0) 11:12:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000000000050000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) [ 296.367237][ T1042] INFO: task syz-executor.4:9145 blocked for more than 143 seconds. [ 296.375754][ T1042] Not tainted 5.1.0-rc4-next-20190411 #23 [ 296.382095][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 296.390803][ T1042] syz-executor.4 D28520 9145 8966 0x00000004 [ 296.397157][ T1042] Call Trace: [ 296.400451][ T1042] __schedule+0x817/0x1cc0 [ 296.404852][ T1042] ? __sched_text_start+0x8/0x8 [ 296.409740][ T1042] ? __mutex_lock+0x527/0x1310 [ 296.414680][ T1042] schedule+0x92/0x180 [ 296.418789][ T1042] schedule_preempt_disabled+0x13/0x20 [ 296.424367][ T1042] __mutex_lock+0x726/0x1310 [ 296.429120][ T1042] ? odev_release+0x4c/0x80 [ 296.433720][ T1042] ? locks_remove_posix+0x284/0x530 [ 296.438953][ T1042] ? mutex_trylock+0x1e0/0x1e0 [ 296.443716][ T1042] ? vfs_lock_file+0xf0/0xf0 [ 296.448347][ T1042] ? fsnotify+0x811/0xbc0 [ 296.452669][ T1042] ? locks_remove_file+0x305/0x4a0 [ 296.457977][ T1042] ? fsnotify_first_mark+0x210/0x210 [ 296.463328][ T1042] ? fcntl_setlk+0xcd0/0xcd0 [ 296.467974][ T1042] ? snd_seq_info_done+0x30/0x30 [ 296.472907][ T1042] mutex_lock_nested+0x16/0x20 [ 296.477799][ T1042] ? mutex_lock_nested+0x16/0x20 [ 296.482741][ T1042] odev_release+0x4c/0x80 [ 296.487126][ T1042] __fput+0x2e5/0x8d0 [ 296.491091][ T1042] ____fput+0x16/0x20 [ 296.495065][ T1042] task_work_run+0x14a/0x1c0 [ 296.499773][ T1042] exit_to_usermode_loop+0x273/0x2c0 [ 296.505071][ T1042] do_syscall_64+0x52d/0x610 [ 296.509847][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.515750][ T1042] RIP: 0033:0x4129e1 [ 296.519676][ T1042] Code: e8 34 99 01 00 e9 45 fe ff ff 4c 8b 86 80 00 00 00 4c 39 c3 72 08 48 85 f6 e9 32 fd ff ff 44 0f b6 46 64 41 80 f8 01 74 08 48 <85> f6 e9 1f fd ff ff 0f b7 56 5e 66 85 d2 74 6a 48 29 fb 0f b7 d2 [ 296.539539][ T1042] RSP: 002b:00007ffeee79f450 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 296.548266][ T1042] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004129e1 [ 296.556243][ T1042] RDX: 0000001b2c120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 296.564281][ T1042] RBP: 0000000000741048 R08: 00000000adf569bf R09: 00000000adf569c3 [ 296.572427][ T1042] R10: 00007ffeee79f520 R11: 0000000000000293 R12: 0000000000000001 [ 296.580436][ T1042] R13: 0000000000023593 R14: 00000000000235c0 R15: 000000000073bf0c [ 296.588438][ T1042] INFO: task syz-executor.1:9146 blocked for more than 143 seconds. [ 296.596392][ T1042] Not tainted 5.1.0-rc4-next-20190411 #23 [ 296.602718][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 296.611410][ T1042] syz-executor.1 D28520 9146 8958 0x00000004 [ 296.617796][ T1042] Call Trace: [ 296.621078][ T1042] __schedule+0x817/0x1cc0 [ 296.625651][ T1042] ? retint_kernel+0x2d/0x2d [ 296.630288][ T1042] ? __sched_text_start+0x8/0x8 [ 296.635138][ T1042] ? __mutex_lock+0x527/0x1310 [ 296.639936][ T1042] schedule+0x92/0x180 [ 296.644002][ T1042] schedule_preempt_disabled+0x13/0x20 [ 296.649626][ T1042] __mutex_lock+0x726/0x1310 [ 296.654398][ T1042] ? snd_seq_kernel_client_ctl+0xe5/0x170 [ 296.660294][ T1042] ? mutex_trylock+0x1e0/0x1e0 [ 296.665279][ T1042] ? odev_release+0x54/0x80 [ 296.669824][ T1042] ? __fput+0x2e5/0x8d0 [ 296.673976][ T1042] ? ____fput+0x16/0x20 [ 296.678282][ T1042] ? exit_to_usermode_loop+0x273/0x2c0 [ 296.683738][ T1042] ? do_syscall_64+0x52d/0x610 [ 296.688538][ T1042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.694600][ T1042] ? lock_acquire+0x16f/0x3f0 [ 296.699307][ T1042] ? kasan_check_write+0x14/0x20 [ 296.704250][ T1042] ? do_raw_spin_lock+0x12a/0x2e0 [ 296.709362][ T1042] mutex_lock_nested+0x16/0x20 [ 296.714134][ T1042] ? mutex_lock_nested+0x16/0x20 [ 296.719118][ T1042] snd_seq_kernel_client_ctl+0xe5/0x170 [ 296.724775][ T1042] snd_seq_oss_writeq_clear+0xe0/0x140 [ 296.730272][ T1042] ? snd_seq_oss_writeq_wakeup+0xc0/0xc0 [ 296.735984][ T1042] ? snd_seq_oss_timer_delete+0x5a/0x80 [ 296.741594][ T1042] ? create_port+0x250/0x250 [ 296.746186][ T1042] snd_seq_oss_writeq_delete+0x20/0x40 [ 296.751825][ T1042] free_devinfo+0x66/0xc0 [ 296.756172][ T1042] port_delete+0xe8/0x1c0 [ 296.760572][ T1042] snd_seq_delete_port+0x266/0x330 [ 296.765788][ T1042] snd_seq_ioctl_delete_port+0xba/0x190 [ 296.771463][ T1042] snd_seq_kernel_client_ctl+0x112/0x170 [ 296.777147][ T1042] ? snd_seq_info_done+0x30/0x30 [ 296.782087][ T1042] snd_seq_event_port_detach+0xba/0x100 [ 296.787689][ T1042] ? snd_seq_event_port_attach+0x220/0x220 [ 296.793561][ T1042] ? kasan_check_write+0x14/0x20 [ 296.798573][ T1042] ? kfree+0x1bf/0x230 [ 296.802654][ T1042] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 296.808411][ T1042] delete_port+0x87/0xd0 [ 296.812661][ T1042] snd_seq_oss_release+0xf5/0x150 [ 296.817852][ T1042] odev_release+0x54/0x80 [ 296.822183][ T1042] __fput+0x2e5/0x8d0 [ 296.826258][ T1042] ____fput+0x16/0x20 [ 296.830283][ T1042] task_work_run+0x14a/0x1c0 [ 296.834993][ T1042] exit_to_usermode_loop+0x273/0x2c0 [ 296.840350][ T1042] do_syscall_64+0x52d/0x610 [ 296.845048][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.851047][ T1042] RIP: 0033:0x4129e1 [ 296.854949][ T1042] Code: e8 34 99 01 00 e9 45 fe ff ff 4c 8b 86 80 00 00 00 4c 39 c3 72 08 48 85 f6 e9 32 fd ff ff 44 0f b6 46 64 41 80 f8 01 74 08 48 <85> f6 e9 1f fd ff ff 0f b7 56 5e 66 85 d2 74 6a 48 29 fb 0f b7 d2 [ 296.874899][ T1042] RSP: 002b:00007fff0d51cb50 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 296.883360][ T1042] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004129e1 [ 296.891416][ T1042] RDX: 0000001b33920000 RSI: 0000000000000000 RDI: 0000000000000003 [ 296.899519][ T1042] RBP: 00000000007412d8 R08: 00000000adf569bf R09: 00000000adf569c3 [ 296.907634][ T1042] R10: 00007fff0d51cc20 R11: 0000000000000293 R12: 0000000000000001 [ 296.915626][ T1042] R13: 0000000000023589 R14: 00000000000235b6 R15: 000000000073bf0c [ 296.923674][ T1042] INFO: lockdep is turned off. [ 296.928563][ T1042] NMI backtrace for cpu 1 [ 296.932877][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 296.941687][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.951825][ T1042] Call Trace: [ 296.955118][ T1042] dump_stack+0x172/0x1f0 [ 296.959438][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 296.964732][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 296.970365][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 296.976368][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 296.982244][ T1042] watchdog+0x9b7/0xec0 [ 296.986426][ T1042] kthread+0x357/0x430 [ 296.990492][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 296.996027][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 297.002263][ T1042] ret_from_fork+0x3a/0x50 [ 297.006761][ T1042] Sending NMI from CPU 1 to CPUs 0: [ 297.012044][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x2/0x10 [ 297.013005][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 297.027529][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 297.036194][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.046248][ T1042] Call Trace: [ 297.049575][ T1042] dump_stack+0x172/0x1f0 [ 297.054105][ T1042] panic+0x2cb/0x72b [ 297.057980][ T1042] ? __warn_printk+0xf3/0xf3 [ 297.062771][ T1042] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 297.068527][ T1042] ? printk_safe_flush+0xf2/0x140 [ 297.073545][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.079880][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 297.085610][ T1042] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 297.091942][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 297.098199][ T1042] watchdog+0x9c8/0xec0 [ 297.102725][ T1042] kthread+0x357/0x430 [ 297.106879][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 297.112423][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 297.118653][ T1042] ret_from_fork+0x3a/0x50 [ 297.124149][ T1042] Kernel Offset: disabled [ 297.128648][ T1042] Rebooting in 86400 seconds..