[info] Using makefile-style concurrent boot in runlevel 2. [ 66.236313][ T26] audit: type=1800 audit(1555062591.342:21): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 66.256881][ T26] audit: type=1800 audit(1555062591.342:22): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. 2019/04/12 09:50:05 fuzzer started 2019/04/12 09:50:08 dialing manager at 10.128.0.26:43643 2019/04/12 09:50:08 syscalls: 2408 2019/04/12 09:50:08 code coverage: enabled 2019/04/12 09:50:08 comparison tracing: enabled 2019/04/12 09:50:08 extra coverage: extra coverage is not supported by the kernel 2019/04/12 09:50:08 setuid sandbox: enabled 2019/04/12 09:50:08 namespace sandbox: enabled 2019/04/12 09:50:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/12 09:50:08 fault injection: enabled 2019/04/12 09:50:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/12 09:50:08 net packet injection: enabled 2019/04/12 09:50:08 net device setup: enabled 09:51:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syzkaller login: [ 163.586011][ T9236] IPVS: ftp: loaded support on port[0] = 21 [ 163.666667][ T9236] chnl_net:caif_netlink_parms(): no params data found [ 163.702390][ T9236] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.710082][ T9236] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) [ 163.717961][ T9236] device bridge_slave_0 entered promiscuous mode [ 163.726141][ T9236] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.745414][ T9236] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.753637][ T9236] device bridge_slave_1 entered promiscuous mode [ 163.806407][ T9236] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.816503][ T9236] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.839128][ T9239] IPVS: ftp: loaded support on port[0] = 21 [ 163.851947][ T9236] team0: Port device team_slave_0 added [ 163.872369][ T9236] team0: Port device team_slave_1 added 09:51:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup2(r0, r0) read$rfkill(r1, &(0x7f0000000040), 0x8) [ 163.957736][ T9236] device hsr_slave_0 entered promiscuous mode [ 163.986167][ T9236] device hsr_slave_1 entered promiscuous mode [ 164.044100][ T9236] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.051249][ T9236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.058755][ T9236] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.065873][ T9236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.082750][ T9241] IPVS: ftp: loaded support on port[0] = 21 09:51:29 executing program 3: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = open(&(0x7f0000000240)='./bus\x00', 0x100141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='o'], 0x1) [ 164.193080][ T9236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.207905][ T9239] chnl_net:caif_netlink_parms(): no params data found [ 164.293428][ T9236] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.328531][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.337572][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.357070][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.366677][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 164.398070][ T9241] chnl_net:caif_netlink_parms(): no params data found [ 164.419388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.429551][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.436781][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 164.444874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.454336][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.461479][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.474394][ T9245] IPVS: ftp: loaded support on port[0] = 21 [ 164.476057][ T9239] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.491628][ T9239] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.500299][ T9239] device bridge_slave_0 entered promiscuous mode [ 164.522467][ T9236] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.534566][ T9236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.549121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.558601][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.568782][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.578094][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.596898][ T9239] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.603999][ T9239] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.614255][ T9239] device bridge_slave_1 entered promiscuous mode [ 164.641647][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.652244][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.711934][ T9236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.712311][ T9249] IPVS: ftp: loaded support on port[0] = 21 [ 164.739533][ T9239] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.752513][ T9239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.762959][ T9241] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.770506][ T9241] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.778555][ T9241] device bridge_slave_0 entered promiscuous mode [ 164.805475][ T9241] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.812583][ T9241] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.832203][ T9241] device bridge_slave_1 entered promiscuous mode 09:51:30 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 164.861465][ T9239] team0: Port device team_slave_0 added [ 164.920720][ T9239] team0: Port device team_slave_1 added [ 164.945237][ C1] hrtimer: interrupt took 35895 ns [ 164.951292][ T9241] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.019125][ T9241] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.049965][ T9239] device hsr_slave_0 entered promiscuous mode [ 165.057773][ T9239] device hsr_slave_1 entered promiscuous mode [ 165.064437][ T9245] chnl_net:caif_netlink_parms(): no params data found [ 165.105172][ T9257] IPVS: ftp: loaded support on port[0] = 21 [ 165.107812][ T9241] team0: Port device team_slave_0 added [ 165.118811][ T9241] team0: Port device team_slave_1 added 09:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 165.268615][ T9241] device hsr_slave_0 entered promiscuous mode [ 165.278192][ T9241] device hsr_slave_1 entered promiscuous mode [ 165.304623][ T9245] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.311957][ T9245] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.319899][ T9245] device bridge_slave_0 entered promiscuous mode [ 165.341808][ T9239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.350502][ T9245] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.358451][ T9245] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.366184][ T9245] device bridge_slave_1 entered promiscuous mode [ 165.381844][ T9241] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.388975][ T9241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.400628][ T9249] chnl_net:caif_netlink_parms(): no params data found [ 165.477828][ T9239] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.494884][ T9245] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.504878][ T9246] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.514972][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 09:51:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 165.530014][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.538151][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.578343][ T9245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.612595][ T9257] chnl_net:caif_netlink_parms(): no params data found [ 165.654076][ T9245] team0: Port device team_slave_0 added [ 165.671959][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.680907][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.690843][ T9246] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.698002][ T9246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.706455][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.715931][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.724229][ T9246] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.731341][ T9246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.750408][ T9241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.762813][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 165.771012][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.783234][ T9245] team0: Port device team_slave_1 added [ 165.818824][ T9249] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.826262][ T9249] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.827052][ T9249] device bridge_slave_0 entered promiscuous mode [ 165.860299][ T9241] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.870618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.879983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.891100][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.891669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.892215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.892863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.893447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.893871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.894272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.894681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:51:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 165.979680][ T9249] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.987050][ T9249] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.998494][ T9249] device bridge_slave_1 entered promiscuous mode [ 166.029191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.042524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.051342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.060412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.069260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.069548][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.069576][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.069945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.070363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.070649][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.085723][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.089111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.142541][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.164312][ T9245] device hsr_slave_0 entered promiscuous mode [ 166.171007][ T9245] device hsr_slave_1 entered promiscuous mode [ 166.179622][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.192580][ T9257] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.199964][ T9257] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.208520][ T9257] device bridge_slave_0 entered promiscuous mode [ 166.217058][ T9257] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.224219][ T9257] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.232653][ T9257] device bridge_slave_1 entered promiscuous mode [ 166.253679][ T9239] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.263695][ T9249] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.274286][ T9249] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:51:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 166.327670][ T9257] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.363323][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.376340][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.393269][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.411563][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.420249][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.431768][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.440530][ T9285] input: syz1 as /devices/virtual/input/input5 [ 166.450920][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.466516][ T9241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.482317][ T9241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.498650][ T9257] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.507925][ T9288] input: syz1 as /devices/virtual/input/input6 [ 166.511777][ T9249] team0: Port device team_slave_0 added [ 166.522158][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.533704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:51:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 166.581081][ T9249] team0: Port device team_slave_1 added [ 166.616840][ T9241] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.642457][ T9257] team0: Port device team_slave_0 added [ 166.666684][ T9257] team0: Port device team_slave_1 added [ 166.675659][ T9249] device hsr_slave_0 entered promiscuous mode [ 166.682289][ T9249] device hsr_slave_1 entered promiscuous mode 09:51:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 166.753524][ T9245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.788229][ T9257] device hsr_slave_0 entered promiscuous mode 09:51:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0xffffffffffffffd4, &(0x7f0000000800)}) [ 166.798685][ T9257] device hsr_slave_1 entered promiscuous mode 09:51:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0xffffffffffffffd4, &(0x7f0000000800)}) [ 166.840009][ T9245] 8021q: adding VLAN 0 to HW filter on device team0 09:51:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000006440)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 166.886250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.894332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.923997][ T9249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.978022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.987144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.996367][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.003497][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.011618][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.021277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.032804][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.040050][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.052122][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.061681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.073519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.083037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.096808][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.122475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.134249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.142798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.162235][ T9249] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.176698][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.184695][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.194027][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.203136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.211642][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.220060][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.246657][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.256573][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.265092][ T9273] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.272194][ T9273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.280537][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.289235][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.297541][ T9273] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.304608][ T9273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.312289][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.322090][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.331032][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.341038][ T9245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.360037][ T9257] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.395006][ T9249] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.406534][ T9249] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.427119][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.436766][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.445135][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.456132][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.464515][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.473341][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.481960][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.490391][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.499360][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.507308][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.519420][ T9245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.540115][ T9257] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.551621][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.564541][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.579988][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.589111][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.597614][ T9246] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.604679][ T9246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.612610][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:51:32 executing program 3: openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) r1 = gettid() ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000740)=""/4096) fcntl$setown(0xffffffffffffffff, 0x8, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000429000/0x1000)=nil, 0x1000, 0x2000002, 0x20110, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x10000004d) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1b) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x81) fcntl$lock(r2, 0x24, &(0x7f0000000000)={0x1, 0x3, 0x0, 0x3, r1}) futex(0x0, 0x4, 0x0, 0x0, &(0x7f0000048000), 0x4) ioctl$KDMKTONE(r0, 0x4b30, 0x10000) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) write$P9_RSYMLINK(r4, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x0, 0x1, 0x4}}, 0x14) ioctl$EVIOCGUNIQ(r3, 0x80404508, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) r5 = open(&(0x7f0000000280)='./bus\x00', 0x2202, 0x0) write$P9_RCREATE(r5, &(0x7f00000000c0)={0xfffffffffffffef6, 0x73, 0x0, {{0x200000000000024, 0x1, 0xffffffffffffffff}}}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x20882) [ 167.641886][ T9249] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.649790][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.660520][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.669926][ T9246] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.677065][ T9246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.677604][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.697368][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.707030][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.715787][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.724283][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.733111][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.742007][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.764973][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.777156][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.794398][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.810668][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.821640][ T9257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.856989][ T9257] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.908391][ T9328] input: syz1 as /devices/virtual/input/input7 09:51:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="020100090e00000003000000d200000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000ff0100fd000005000500000000000a004872bbb6896209000000000000009aec7f3f7710aa510501704200000100"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x0, 0x0, 0xffffffffffffffd4, &(0x7f0000000800)}) 09:51:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:33 executing program 1: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x1000, &(0x7f0000000040), 0x0) 09:51:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1) 09:51:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 09:51:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="020100090e00000003000000d200000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000ff0100fd000005000500000000000a004872bbb6896209000000000000009aec7f3f7710aa510501704200000100"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="10000300000000002000040000000000"], 0x1, 0x3) 09:51:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcb, &(0x7f0000000040)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty={[0x4]}}}, 0x5c) 09:51:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="020100090e00000003000000d200000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000ff0100fd000005000500000000000a004872bbb6896209000000000000009aec7f3f7710aa510501704200000100"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 09:51:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000b00)={'s\x00', 0x420000014ffd}) write$tun(r0, &(0x7f0000000340)={@void, @void, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0x40) 09:51:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) r0 = memfd_create(&(0x7f0000000400)='\x00', 0x5) fallocate(r0, 0x0, 0x0, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) flistxattr(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000040)=ANY=[], 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x3f}, 0x4) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x7fffffff, @dev={0xfe, 0x80, [], 0x17}, 0x5}}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="bd6d3c29"], 0x4) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x9, 0x3, 0x6, 0x800]}) 09:51:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="020100090e00000003000000d200000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000ff0100fd000005000500000000000a004872bbb6896209000000000000009aec7f3f7710aa510501704200000100"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:34 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) connect(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 09:51:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x29, 0x4, 0x0, 0x0) 09:51:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:34 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) r0 = memfd_create(&(0x7f0000000400)='\x00', 0x5) fallocate(r0, 0x0, 0x0, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) flistxattr(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000040)=ANY=[], 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x3f}, 0x4) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x7fffffff, @dev={0xfe, 0x80, [], 0x17}, 0x5}}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="bd6d3c29"], 0x4) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x9, 0x3, 0x6, 0x800]}) 09:51:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x14, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x4, 0xfffffffffffffd3e}}, 0xfffffdb8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 09:51:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x5e, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r2, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x2d, 0x1, @scatter={0x8, 0x0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}, {0x0}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08e990f9b506", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 09:51:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/124, 0x7c}], 0x1, 0x3) 09:51:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed130794ab9524429adc542cda10a0a4978d8d000df8b17d60450b7c333f3fe1462b00f600"], 0x41}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x16a, 0x0) 09:51:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x50, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 09:51:34 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 350.799369][ T1043] syz-executor.0 D26952 13366 9236 0x00000004 [ 350.805785][ T1043] Call Trace: [ 350.809134][ T1043] __schedule+0x817/0x1cc0 [ 350.813746][ T1043] ? __mutex_lock+0x721/0x1310 [ 350.818673][ T1043] ? __sched_text_start+0x8/0x8 [ 350.823550][ T1043] ? __mutex_lock+0x527/0x1310 [ 350.828487][ T1043] schedule+0x92/0x180 [ 350.832570][ T1043] schedule_preempt_disabled+0x13/0x20 [ 350.838229][ T1043] __mutex_lock+0x726/0x1310 [ 350.842973][ T1043] ? snd_seq_kernel_client_ctl+0xe5/0x170 [ 350.848806][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 350.853691][ T1043] ? odev_release+0x54/0x80 [ 350.858408][ T1043] ? __fput+0x2e5/0x8d0 [ 350.862585][ T1043] ? ____fput+0x16/0x20 [ 350.866802][ T1043] ? exit_to_usermode_loop+0x273/0x2c0 [ 350.872378][ T1043] ? do_syscall_64+0x52d/0x610 [ 350.877312][ T1043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.883582][ T1043] ? kasan_check_write+0x14/0x20 [ 350.888620][ T1043] ? do_raw_spin_lock+0x12a/0x2e0 [ 350.893720][ T1043] mutex_lock_nested+0x16/0x20 [ 350.898674][ T1043] ? mutex_lock_nested+0x16/0x20 [ 350.903633][ T1043] snd_seq_kernel_client_ctl+0xe5/0x170 [ 350.909434][ T1043] snd_seq_oss_writeq_clear+0xe0/0x140 [ 350.914987][ T1043] ? snd_seq_oss_writeq_wakeup+0xc0/0xc0 [ 350.921100][ T1043] ? snd_seq_oss_timer_delete+0x5a/0x80 [ 350.926979][ T1043] ? create_port+0x250/0x250 [ 350.931590][ T1043] snd_seq_oss_writeq_delete+0x20/0x40 [ 350.937265][ T1043] free_devinfo+0x66/0xc0 [ 350.941714][ T1043] port_delete+0xe8/0x1c0 [ 350.946117][ T1043] snd_seq_delete_port+0x266/0x330 [ 350.951384][ T1043] snd_seq_ioctl_delete_port+0xba/0x190 [ 350.957032][ T1043] snd_seq_kernel_client_ctl+0x112/0x170 [ 350.962909][ T1043] ? snd_seq_info_done+0x30/0x30 [ 350.968159][ T1043] snd_seq_event_port_detach+0xba/0x100 [ 350.973832][ T1043] ? snd_seq_event_port_attach+0x220/0x220 [ 350.979757][ T1043] ? kasan_check_write+0x14/0x20 [ 350.984812][ T1043] ? kfree+0x1bf/0x230 [ 350.988926][ T1043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 350.994808][ T1043] delete_port+0x87/0xd0 [ 350.999149][ T1043] snd_seq_oss_release+0xf5/0x150 [ 351.004198][ T1043] odev_release+0x54/0x80 [ 351.008719][ T1043] __fput+0x2e5/0x8d0 [ 351.012831][ T1043] ____fput+0x16/0x20 [ 351.016930][ T1043] task_work_run+0x14a/0x1c0 [ 351.021693][ T1043] exit_to_usermode_loop+0x273/0x2c0 [ 351.027043][ T1043] do_syscall_64+0x52d/0x610 [ 351.031645][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.037673][ T1043] RIP: 0033:0x458c29 [ 351.041727][ T1043] Code: cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 0f 86 df 00 00 00 48 83 ec 30 48 89 6c 24 28 48 8d 6c 24 28 48 8b 42 08 48 8b 48 70 <48> 89 4c 24 20 48 8b 10 48 89 54 24 18 48 8b 40 08 48 89 44 24 10 [ 351.062276][ T1043] RSP: 002b:00007f80a2632c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 351.070877][ T1043] RAX: ffffffffffffffea RBX: 0000000000000004 RCX: 0000000000458c29 [ 351.079389][ T1043] RDX: 0000000000105103 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 351.087430][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 351.095496][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a26336d4 [ 351.103722][ T1043] R13: 00000000004c5097 R14: 00000000004d8da0 R15: 00000000ffffffff [ 351.111892][ T1043] INFO: task syz-executor.0:13593 blocked for more than 143 seconds. [ 351.120191][ T1043] Not tainted 5.1.0-rc4-next-20190411 #23 [ 351.126922][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.135918][ T1043] syz-executor.0 D28344 13593 9236 0x00000004 [ 351.142369][ T1043] Call Trace: [ 351.145740][ T1043] __schedule+0x817/0x1cc0 [ 351.150167][ T1043] ? __sched_text_start+0x8/0x8 [ 351.155077][ T1043] ? __mutex_lock+0x527/0x1310 [ 351.160124][ T1043] schedule+0x92/0x180 [ 351.164205][ T1043] schedule_preempt_disabled+0x13/0x20 [ 351.169748][ T1043] __mutex_lock+0x726/0x1310 [ 351.174600][ T1043] ? odev_open+0x5f/0x90 [ 351.179081][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 351.183901][ T1043] ? mark_held_locks+0xf0/0xf0 [ 351.189074][ T1043] ? lock_downgrade+0x880/0x880 [ 351.193929][ T1043] ? soundcore_open+0xa8/0x610 [ 351.198852][ T1043] mutex_lock_nested+0x16/0x20 [ 351.203681][ T1043] ? mutex_lock_nested+0x16/0x20 [ 351.208967][ T1043] odev_open+0x5f/0x90 [ 351.213048][ T1043] ? odev_release+0x80/0x80 [ 351.217654][ T1043] soundcore_open+0x456/0x610 [ 351.222344][ T1043] ? sound_devnode+0x100/0x100 [ 351.227185][ T1043] chrdev_open+0x247/0x6b0 [ 351.231622][ T1043] ? cdev_put.part.0+0x50/0x50 [ 351.236663][ T1043] ? security_file_open+0x8d/0x300 [ 351.241799][ T1043] do_dentry_open+0x4e2/0x1250 [ 351.246637][ T1043] ? match_exception_partial+0x242/0x2d0 [ 351.252291][ T1043] ? cdev_put.part.0+0x50/0x50 [ 351.257332][ T1043] ? chown_common+0x5c0/0x5c0 [ 351.262114][ T1043] ? inode_permission+0xb4/0x570 [ 351.267118][ T1043] vfs_open+0xa0/0xd0 [ 351.271216][ T1043] path_openat+0x10e9/0x46e0 [ 351.275909][ T1043] ? save_stack+0x45/0xd0 [ 351.280268][ T1043] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 351.286160][ T1043] ? kasan_slab_alloc+0xf/0x20 [ 351.290953][ T1043] ? kmem_cache_alloc+0x11a/0x6f0 [ 351.296081][ T1043] ? getname_flags+0xd6/0x5b0 [ 351.300776][ T1043] ? getname+0x1a/0x20 [ 351.304839][ T1043] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 351.310284][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.316219][ T1043] do_filp_open+0x1a1/0x280 [ 351.320758][ T1043] ? may_open_dev+0x100/0x100 [ 351.325512][ T1043] ? kasan_check_read+0x11/0x20 [ 351.330559][ T1043] ? do_raw_spin_unlock+0x57/0x270 [ 351.335843][ T1043] do_sys_open+0x3fe/0x5d0 [ 351.340299][ T1043] ? filp_open+0x80/0x80 [ 351.344590][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.351157][ T1043] ? __x64_sys_clock_gettime+0x172/0x250 [ 351.357101][ T1043] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 351.363165][ T1043] __x64_sys_openat+0x9d/0x100 [ 351.368020][ T1043] do_syscall_64+0x103/0x610 [ 351.372751][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.378867][ T1043] RIP: 0033:0x458c29 [ 351.382866][ T1043] Code: cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 0f 86 df 00 00 00 48 83 ec 30 48 89 6c 24 28 48 8d 6c 24 28 48 8b 42 08 48 8b 48 70 <48> 89 4c 24 20 48 8b 10 48 89 54 24 18 48 8b 40 08 48 89 44 24 10 [ 351.402602][ T1043] RSP: 002b:00007f80a2611c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 351.411070][ T1043] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458c29 [ 351.419160][ T1043] RDX: 0000000000105103 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 351.427198][ T1043] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 351.435175][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a26126d4 [ 351.443299][ T1043] R13: 00000000004c5097 R14: 00000000004d8da0 R15: 00000000ffffffff [ 351.451643][ T1043] INFO: lockdep is turned off. [ 351.456644][ T1043] NMI backtrace for cpu 1 [ 351.461154][ T1043] CPU: 1 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 351.470130][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.480459][ T1043] Call Trace: [ 351.483803][ T1043] dump_stack+0x172/0x1f0 [ 351.488144][ T1043] nmi_cpu_backtrace.cold+0x63/0xa4 [ 351.493574][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 351.499224][ T1043] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 351.505331][ T1043] arch_trigger_cpumask_backtrace+0x14/0x20 [ 351.511229][ T1043] watchdog+0x9b7/0xec0 [ 351.515399][ T1043] kthread+0x357/0x430 [ 351.519454][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 351.525325][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 351.531570][ T1043] ret_from_fork+0x3a/0x50 [ 351.536105][ T1043] Sending NMI from CPU 1 to CPUs 0: [ 351.541523][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x2/0x10 [ 351.542460][ T1043] Kernel panic - not syncing: hung_task: blocked tasks [ 351.556636][ T1043] CPU: 1 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 351.565301][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.575616][ T1043] Call Trace: [ 351.578907][ T1043] dump_stack+0x172/0x1f0 [ 351.583263][ T1043] panic+0x2cb/0x72b [ 351.587158][ T1043] ? __warn_printk+0xf3/0xf3 [ 351.591813][ T1043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 351.597535][ T1043] ? printk_safe_flush+0xf2/0x140 [ 351.602566][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.608812][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 351.614555][ T1043] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 351.620928][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 351.627086][ T1043] watchdog+0x9c8/0xec0 [ 351.631369][ T1043] kthread+0x357/0x430 [ 351.635694][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 351.641242][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 351.647599][ T1043] ret_from_fork+0x3a/0x50 [ 351.653514][ T1043] Kernel Offset: disabled [ 351.657975][ T1043] Rebooting in 86400 seconds..