[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.324660][ T26] audit: type=1800 audit(1572939432.249:25): pid=8674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.358062][ T26] audit: type=1800 audit(1572939432.259:26): pid=8674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.411010][ T26] audit: type=1800 audit(1572939432.259:27): pid=8674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2019/11/05 07:37:24 fuzzer started 2019/11/05 07:37:26 dialing manager at 10.128.0.26:42879 2019/11/05 07:37:26 syscalls: 2566 2019/11/05 07:37:26 code coverage: enabled 2019/11/05 07:37:26 comparison tracing: enabled 2019/11/05 07:37:26 extra coverage: extra coverage is not supported by the kernel 2019/11/05 07:37:26 setuid sandbox: enabled 2019/11/05 07:37:26 namespace sandbox: enabled 2019/11/05 07:37:26 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 07:37:26 fault injection: enabled 2019/11/05 07:37:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 07:37:26 net packet injection: enabled 2019/11/05 07:37:26 net device setup: enabled 2019/11/05 07:37:26 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/05 07:37:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:39:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000005640)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="dde056b5586b298d486e9d3492cb929c7194fdde36b6d07589a605b8bc9cda93a1bb487d51014e14c8ba7fd7f27fd1b24fd4f48d3c57be111b40387bf8a01b717857ead2962216a645272bd082d3dbb0cd485e8d0970627862493988aa89211da69a9c72c9a47632cafc746ab70f4f9b8a7aacc6824ffe3ffaef9e705f208d6b4ae06c77", 0x84}, {&(0x7f0000000200)="aea52827e0eb642874bbbbc81b986be0c28af8ecde1288cbf5aae8f644503ad49efd6f15b366abc7bc08b810b43e13f54f56f3991ad9ab4a445e349a3bdfe0f27b1578bcc12f8b7665c8497393ed9c8d94d2fa7534bd720d2b482f78a52fd6c0e9f3123c4d536353efbbdc998140000bfbb39def8a372f4a020f8b97eb64185297364fece92984cbd78fae86ca02bdd0689c06d1cb99f50e2bbd37cd52eb3809853e8287ceeafc3a219e5aa3cdd88699d041438d0d4ab0825047442bb5ea02cbd4c212d8aabf44316d", 0xc9}, {&(0x7f0000000080)="413b0e36164ae94c9fcc1af82a7a448b45339e6c6949c70ddc61bf61dacc2e4006ec90fee6471c", 0x27}, {&(0x7f0000000300)="abd0ef11e7514f86f201b5efafc1b8aa6cc6fbdc02282294bf727b228ed26b478d6befd89906ada40668b8d2272bfc8154f70431a08a31b392dd04429277f49be5e5ce49568ff163d1db0550c34738a18aaa2b841cd95773393d3e041d5db034fd35ded7a7ce2911e16082a703a8d15ae172b72f42cd7bdde6561c921987258d070587af883f67befd0d880b4031cab4ab6fbfa1d636956fff43a5c20937fd3e6566d43262d2721831accf1617229d91281f2d5577fe29d6c8bcee1ad7e1ad490f82a0a502fcc43f47cd58d619ed0a3e32e4340041390b5fd5632cc1e46f139ef5c90e", 0xe3}, {&(0x7f0000000400)="80ad649c7f85e81dde6a5fb66abe7722c2fb0314f5104e80ca793b52029514ab91073aa5c7a0c7f32f81b55d1fc406748ea644031df5282ab958c6dd3f53c6d5bf45ab66b8a34d5f543f223d38373727101e077eca020cafd685a3719e9fce1253d629c4a801b7fc2e03eb816f48f51c11406111d5f5ee33a7582ef5f40cf193fe3a3ce7e3672bfe48145c72f09aa0c36694f2a4ea7b94e2ba5926d61c9f26861eb6b185538ca7cceed054c40d40c03c7d7ab34d647ca55a0b75fef0cef3", 0xbe}], 0x5}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="a7a31d719da5b8f79e133b1ecda18d1a89793879daab2055550cc8383242a3819e4d75a2d115994497f8ad81", 0x2c}, {0x0}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x3, 0x8000) sendto$inet6(r0, &(0x7f0000000000)="0503000006023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0x23a, 0x4804, 0x0, 0xb4) 07:39:29 executing program 1: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r4, r5, 0x0, 0x102000002) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r7 = fsmount(r1, 0x1, 0xe5) dup(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) r11 = socket$isdn(0x22, 0x3, 0x2) setsockopt$sock_int(r11, 0x1, 0xa, 0x0, 0x2e9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, r2, 0x0) syzkaller login: [ 196.422450][ T8841] IPVS: ftp: loaded support on port[0] = 21 [ 196.532885][ T8843] IPVS: ftp: loaded support on port[0] = 21 07:39:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) [ 196.644855][ T8841] chnl_net:caif_netlink_parms(): no params data found [ 196.747584][ T8843] chnl_net:caif_netlink_parms(): no params data found [ 196.790293][ T8841] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.798993][ T8841] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.807701][ T8841] device bridge_slave_0 entered promiscuous mode [ 196.840452][ T8841] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.847551][ T8841] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.855956][ T8841] device bridge_slave_1 entered promiscuous mode [ 196.883724][ T8847] IPVS: ftp: loaded support on port[0] = 21 [ 196.893044][ T8843] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.902647][ T8843] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.910868][ T8843] device bridge_slave_0 entered promiscuous mode [ 196.922428][ T8841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.936422][ T8841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.948683][ T8843] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.955772][ T8843] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.966367][ T8843] device bridge_slave_1 entered promiscuous mode 07:39:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) close(r0) socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000006380)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x41}}], 0x30}], 0x1, 0x0) [ 197.005339][ T8841] team0: Port device team_slave_0 added [ 197.021078][ T8843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.035262][ T8841] team0: Port device team_slave_1 added [ 197.045662][ T8843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.130318][ T8843] team0: Port device team_slave_0 added [ 197.190810][ T8841] device hsr_slave_0 entered promiscuous mode 07:39:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x11, 0x10000000066, 0x0, &(0x7f00000000c0)) [ 197.268539][ T8841] device hsr_slave_1 entered promiscuous mode [ 197.324464][ T8843] team0: Port device team_slave_1 added [ 197.382337][ T8849] IPVS: ftp: loaded support on port[0] = 21 [ 197.411680][ T8843] device hsr_slave_0 entered promiscuous mode 07:39:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x810003, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 197.498288][ T8843] device hsr_slave_1 entered promiscuous mode [ 197.538091][ T8843] debugfs: Directory 'hsr0' with parent '/' already present! [ 197.603697][ T8851] IPVS: ftp: loaded support on port[0] = 21 [ 197.665008][ T8847] chnl_net:caif_netlink_parms(): no params data found [ 197.725980][ T8847] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.734664][ T8847] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.742588][ T8847] device bridge_slave_0 entered promiscuous mode [ 197.765288][ T8854] IPVS: ftp: loaded support on port[0] = 21 [ 197.784001][ T8847] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.791672][ T8847] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.799917][ T8847] device bridge_slave_1 entered promiscuous mode [ 197.857602][ T8847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.869220][ T8847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.919167][ T8847] team0: Port device team_slave_0 added [ 197.952067][ T8847] team0: Port device team_slave_1 added [ 198.002309][ T8849] chnl_net:caif_netlink_parms(): no params data found [ 198.015628][ T8851] chnl_net:caif_netlink_parms(): no params data found [ 198.071371][ T8847] device hsr_slave_0 entered promiscuous mode [ 198.108399][ T8847] device hsr_slave_1 entered promiscuous mode [ 198.148100][ T8847] debugfs: Directory 'hsr0' with parent '/' already present! [ 198.290768][ T8851] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.298049][ T8851] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.305897][ T8851] device bridge_slave_0 entered promiscuous mode [ 198.333485][ T8849] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.341148][ T8849] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.349300][ T8849] device bridge_slave_0 entered promiscuous mode [ 198.357006][ T8849] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.364168][ T8849] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.372017][ T8849] device bridge_slave_1 entered promiscuous mode [ 198.380521][ T8847] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.387982][ T8847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.395605][ T8847] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.402752][ T8847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.414285][ T8843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.422524][ T8851] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.430075][ T8851] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.437784][ T8851] device bridge_slave_1 entered promiscuous mode [ 198.494347][ T8851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.504879][ T30] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.512932][ T30] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.524587][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.533328][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.553817][ T8849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.564959][ T8849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.581157][ T8841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.590642][ T8851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.628718][ T8843] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.635707][ T8854] chnl_net:caif_netlink_parms(): no params data found [ 198.651123][ T8851] team0: Port device team_slave_0 added [ 198.660096][ T8849] team0: Port device team_slave_0 added [ 198.682624][ T8851] team0: Port device team_slave_1 added [ 198.693886][ T8841] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.704734][ T8849] team0: Port device team_slave_1 added [ 198.733957][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.741976][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.752516][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.761256][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.770443][ T3664] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.777480][ T3664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.785903][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.816814][ T8854] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.824642][ T8854] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.832705][ T8854] device bridge_slave_0 entered promiscuous mode [ 198.848804][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.857409][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.866742][ T3664] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.873875][ T3664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.881600][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.890518][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.899035][ T3664] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.906169][ T3664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.913868][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.922850][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.931941][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.941198][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.001248][ T8849] device hsr_slave_0 entered promiscuous mode [ 199.038503][ T8849] device hsr_slave_1 entered promiscuous mode [ 199.078018][ T8849] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.131101][ T8851] device hsr_slave_0 entered promiscuous mode [ 199.168437][ T8851] device hsr_slave_1 entered promiscuous mode [ 199.218352][ T8851] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.226021][ T8854] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.233238][ T8854] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.242483][ T8854] device bridge_slave_1 entered promiscuous mode [ 199.263364][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.272311][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.280463][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.289209][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.298598][ T3664] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.305630][ T3664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.313712][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.322759][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.339439][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.353538][ T8854] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.364879][ T8854] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.410474][ T8854] team0: Port device team_slave_0 added [ 199.419266][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.427803][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.436270][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.454415][ T8843] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.465835][ T8843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.484254][ T8847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.498031][ T8854] team0: Port device team_slave_1 added [ 199.505294][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.515304][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.523964][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.532944][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.542688][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.585769][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.596936][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.609249][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.616929][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.625002][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.633652][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.678161][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.686504][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.695573][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.704246][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.715765][ T8843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.760103][ T8854] device hsr_slave_0 entered promiscuous mode [ 199.788593][ T8854] device hsr_slave_1 entered promiscuous mode [ 199.848139][ T8854] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.857518][ T8841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.866617][ T8847] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.949735][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.963644][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.974484][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.981623][ T8860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.990304][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.999091][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.007358][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.014438][ T8860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.022050][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.030901][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.039779][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 200.047236][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.066043][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.078159][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.086805][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.111829][ T8849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.142678][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.156241][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.174952][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.184278][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.203066][ T8847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.216848][ T8847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.236714][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.251573][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.251811][ T8868] misc userio: The device must be registered before sending interrupts [ 200.273497][ T8841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.281721][ T8868] misc userio: The device must be registered before sending interrupts [ 200.302086][ T8849] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.328963][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.343568][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.454937][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 200.463158][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.470795][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.480250][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.481958][ T8868] misc userio: The device must be registered before sending interrupts [ 200.488774][ T8858] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.488823][ T8858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.489265][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.489736][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.504108][ T8876] misc userio: The device must be registered before sending interrupts [ 200.505244][ T8858] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.536284][ T8858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.561596][ T8847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.584259][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.597071][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:39:33 executing program 1: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r4, r5, 0x0, 0x102000002) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r7 = fsmount(r1, 0x1, 0xe5) dup(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) r11 = socket$isdn(0x22, 0x3, 0x2) setsockopt$sock_int(r11, 0x1, 0xa, 0x0, 0x2e9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, r2, 0x0) [ 200.608073][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.632421][ T8851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.659127][ T8882] misc userio: The device must be registered before sending interrupts [ 200.669493][ T8882] misc userio: The device must be registered before sending interrupts [ 200.687905][ C0] hrtimer: interrupt took 61913 ns [ 200.745837][ T8849] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 200.756517][ T8849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.784162][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.800624][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.819362][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.836097][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 07:39:33 executing program 1: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r4, r5, 0x0, 0x102000002) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r7 = fsmount(r1, 0x1, 0xe5) dup(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) r11 = socket$isdn(0x22, 0x3, 0x2) setsockopt$sock_int(r11, 0x1, 0xa, 0x0, 0x2e9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, r2, 0x0) [ 200.845178][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.855236][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.871430][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.884747][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:39:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000005640)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="dde056b5586b298d486e9d3492cb929c7194fdde36b6d07589a605b8bc9cda93a1bb487d51014e14c8ba7fd7f27fd1b24fd4f48d3c57be111b40387bf8a01b717857ead2962216a645272bd082d3dbb0cd485e8d0970627862493988aa89211da69a9c72c9a47632cafc746ab70f4f9b8a7aacc6824ffe3ffaef9e705f208d6b4ae06c77", 0x84}, {&(0x7f0000000200)="aea52827e0eb642874bbbbc81b986be0c28af8ecde1288cbf5aae8f644503ad49efd6f15b366abc7bc08b810b43e13f54f56f3991ad9ab4a445e349a3bdfe0f27b1578bcc12f8b7665c8497393ed9c8d94d2fa7534bd720d2b482f78a52fd6c0e9f3123c4d536353efbbdc998140000bfbb39def8a372f4a020f8b97eb64185297364fece92984cbd78fae86ca02bdd0689c06d1cb99f50e2bbd37cd52eb3809853e8287ceeafc3a219e5aa3cdd88699d041438d0d4ab0825047442bb5ea02cbd4c212d8aabf44316d", 0xc9}, {&(0x7f0000000080)="413b0e36164ae94c9fcc1af82a7a448b45339e6c6949c70ddc61bf61dacc2e4006ec90fee6471c", 0x27}, {&(0x7f0000000300)="abd0ef11e7514f86f201b5efafc1b8aa6cc6fbdc02282294bf727b228ed26b478d6befd89906ada40668b8d2272bfc8154f70431a08a31b392dd04429277f49be5e5ce49568ff163d1db0550c34738a18aaa2b841cd95773393d3e041d5db034fd35ded7a7ce2911e16082a703a8d15ae172b72f42cd7bdde6561c921987258d070587af883f67befd0d880b4031cab4ab6fbfa1d636956fff43a5c20937fd3e6566d43262d2721831accf1617229d91281f2d5577fe29d6c8bcee1ad7e1ad490f82a0a502fcc43f47cd58d619ed0a3e32e4340041390b5fd5632cc1e46f139ef5c90e", 0xe3}, {&(0x7f0000000400)="80ad649c7f85e81dde6a5fb66abe7722c2fb0314f5104e80ca793b52029514ab91073aa5c7a0c7f32f81b55d1fc406748ea644031df5282ab958c6dd3f53c6d5bf45ab66b8a34d5f543f223d38373727101e077eca020cafd685a3719e9fce1253d629c4a801b7fc2e03eb816f48f51c11406111d5f5ee33a7582ef5f40cf193fe3a3ce7e3672bfe48145c72f09aa0c36694f2a4ea7b94e2ba5926d61c9f26861eb6b185538ca7cceed054c40d40c03c7d7ab34d647ca55a0b75fef0cef3", 0xbe}], 0x5}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="a7a31d719da5b8f79e133b1ecda18d1a89793879daab2055550cc8383242a3819e4d75a2d115994497f8ad81", 0x2c}, {0x0}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x3, 0x8000) sendto$inet6(r0, &(0x7f0000000000)="0503000006023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0x23a, 0x4804, 0x0, 0xb4) [ 200.921730][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.922980][ T8893] misc userio: The device must be registered before sending interrupts [ 200.947726][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.962654][ T8893] misc userio: The device must be registered before sending interrupts 07:39:33 executing program 0: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r4, r5, 0x0, 0x102000002) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r7 = fsmount(r1, 0x1, 0xe5) dup(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) r11 = socket$isdn(0x22, 0x3, 0x2) setsockopt$sock_int(r11, 0x1, 0xa, 0x0, 0x2e9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, r2, 0x0) [ 201.002915][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.018952][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.044859][ T8854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.091871][ T8851] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.120589][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.132120][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.147837][ T8854] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.156877][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.192007][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.219342][ T8855] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.219384][ T8901] misc userio: The device must be registered before sending interrupts [ 201.226518][ T8855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.251386][ T8901] misc userio: The device must be registered before sending interrupts [ 201.251475][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.278264][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.294615][ T8849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.316837][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.353268][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:39:34 executing program 1: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r4, r5, 0x0, 0x102000002) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r7 = fsmount(r1, 0x1, 0xe5) dup(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) r11 = socket$isdn(0x22, 0x3, 0x2) setsockopt$sock_int(r11, 0x1, 0xa, 0x0, 0x2e9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, r2, 0x0) [ 201.377109][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.386986][ T8855] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.394461][ T8855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.412525][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.557369][ T8914] misc userio: The device must be registered before sending interrupts [ 201.583792][ T8914] misc userio: The device must be registered before sending interrupts 07:39:34 executing program 0: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) sendfile(r2, r3, 0x0, 0x102000002) [ 201.654383][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.702504][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.746807][ T8920] misc userio: The device must be registered before sending interrupts [ 201.747124][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.762284][ T8860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.762893][ T8920] misc userio: The device must be registered before sending interrupts [ 201.807498][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.831096][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.844838][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state 07:39:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000003c0)) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x100800, &(0x7f0000001540)=ANY=[@ANYBLOB="66643df93ca934b725ded3b0d187f016871c08a2e62ec8412a32585ea8dd7e80d2a221b389a66b63818f3d7349177eb98db8b823907c12ad249e2ee337176186dcb2f08603dd0d99e55a1705b60c73cab27eae728addf68b448819e00a15b565cb211ece85b52051348208e11abd36461c3c8625189fa27ecfd2a1d489a1563d64a1b5b5cd071a07a54e00"/150, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000200,mask=^MAY_EXEC,\x00']) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)="63b1958f8354ad4fd6e02863432fc27e", 0x10) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 201.852006][ T8860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.865871][ T8920] misc userio: The device must be registered before sending interrupts [ 201.875449][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.881902][ T8922] misc userio: The device must be registered before sending interrupts [ 201.919522][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.933822][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.943291][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.991727][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.008854][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 07:39:34 executing program 0: clock_settime(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10013, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffc}, 0x2) socket$caif_stream(0x25, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) sendfile(r2, r3, 0x0, 0x102000002) 07:39:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 202.032605][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.069275][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.093427][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.109007][ T8933] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 202.115449][ T8934] misc userio: The device must be registered before sending interrupts [ 202.126173][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.148886][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.151612][ T8934] misc userio: The device must be registered before sending interrupts [ 202.168512][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.177174][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.192514][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.201750][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.222990][ T8851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:39:35 executing program 3: r0 = gettid() setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0xe) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) getresgid(0x0, 0x0, 0x0) shmctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 202.348847][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.397010][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.411729][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.431750][ T8925] device bridge_slave_0 left promiscuous mode [ 202.440214][ T8925] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.604416][ T8925] device bridge_slave_1 left promiscuous mode [ 202.615203][ T8925] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.771213][ T8925] bond0: (slave bond_slave_0): Releasing backup interface [ 202.929704][ T8925] bond0: (slave bond_slave_1): Releasing backup interface [ 203.194288][ T8925] team0: Port device team_slave_0 removed [ 203.348404][ T8925] team0: Port device team_slave_1 removed [ 203.446927][ T8854] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.457662][ T8854] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.470266][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.478625][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.487284][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.500520][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.509690][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.518459][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.528664][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.537514][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.548826][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.557550][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.565620][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.625711][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.633549][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.645842][ T8854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.660719][ T8851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.668522][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.675972][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:39:36 executing program 4: writev(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) 07:39:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r0, &(0x7f0000000000)="b6", 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={{r1, r2/1000+30000}, {0x0, 0x7530}}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)=0x1) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400100, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x400, 0x24) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresuid(&(0x7f00000001c0), &(0x7f0000000c80), &(0x7f0000000cc0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x20000, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty}}, 0xe8) getegid() r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x200000, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000d00)='cpu.stat\x00\xea\x11\x06i\xb5\xc4Ov%\x82\x14\b\x00\x00\x00\x00\x00\x00\x00qX\xcd\a\xce\xe5.<\xe5k\xb4Y\x1eXc\x06z<\b\xc6\xf5\xc3\xe4\xbb\xfdb\xc3\xe3\xec\x88\xf0\xf7h\xdc\xfd\x11\xae5Pm\xd7\x90\x8a,', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x3, 0x0, 0x8, 0xe6e1, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 07:39:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000272000)) 07:39:37 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x202000, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000040)={&(0x7f0000003000/0x2000)=nil, 0x800005, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil}) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) 07:39:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = open(0x0, 0x8001141042, 0x0) write(r0, &(0x7f0000000000)="b6", 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={{r1, r2/1000+30000}, {0x0, 0x7530}}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_submit(0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)=ANY=[], &(0x7f0000000100)) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400100, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x400, 0x24) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresuid(&(0x7f00000001c0), &(0x7f0000000c80), &(0x7f0000000cc0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getegid() openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x200000, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000d00)='cpu.stat\x00\xea\x11\x06i\xb5\xc4Ov%\x82\x14\b\x00\x00\x00\x00\x00\x00\x00qX\xcd\a\xce\xe5.<\xe5k\xb4Y\x1eXc\x06z<\b\xc6\xf5\xc3\xe4\xbb\xfdb\xc3\xe3\xec\x88\xf0\xf7h\xdc\xfd\x11\xae5Pm\xd7\x90\x8a,', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x3, 0x0, 0x8, 0xe6e1, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 07:39:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000003c0)) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x100800, &(0x7f0000001540)=ANY=[@ANYBLOB="66643df93ca934b725ded3b0d187f016871c08a2e62ec8412a32585ea8dd7e80d2a221b389a66b63818f3d7349177eb98db8b823907c12ad249e2ee337176186dcb2f08603dd0d99e55a1705b60c73cab27eae728addf68b448819e00a15b565cb211ece85b52051348208e11abd36461c3c8625189fa27ecfd2a1d489a1563d64a1b5b5cd071a07a54e00"/150, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000200,mask=^MAY_EXEC,\x00']) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)="63b1958f8354ad4fd6e02863432fc27e", 0x10) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:39:37 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) r1 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x8000000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x1000100) lseek(0xffffffffffffffff, 0x0, 0x3) msgctl$IPC_RMID(0x0, 0x0) 07:39:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0xfffffffffffffe52) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000003c0)) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x100800, &(0x7f0000001540)=ANY=[@ANYBLOB="66643df93ca934b725ded3b0d187f016871c08a2e62ec8412a32585ea8dd7e80d2a221b389a66b63818f3d7349177eb98db8b823907c12ad249e2ee337176186dcb2f08603dd0d99e55a1705b60c73cab27eae728addf68b448819e00a15b565cb211ece85b52051348208e11abd36461c3c8625189fa27ecfd2a1d489a1563d64a1b5b5cd", @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000200,mask=^MAY_EXEC,\x00']) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 204.718749][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.802072][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.843660][ T8991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.912915][ T8991] device bridge_slave_0 left promiscuous mode [ 204.950383][ T8991] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = open(0x0, 0x8001141042, 0x0) write(r0, &(0x7f0000000000)="b6", 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={{r1, r2/1000+30000}, {0x0, 0x7530}}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_submit(0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)=ANY=[], &(0x7f0000000100)) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400100, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x400, 0x24) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresuid(&(0x7f00000001c0), &(0x7f0000000c80), &(0x7f0000000cc0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getegid() openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x200000, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000d00)='cpu.stat\x00\xea\x11\x06i\xb5\xc4Ov%\x82\x14\b\x00\x00\x00\x00\x00\x00\x00qX\xcd\a\xce\xe5.<\xe5k\xb4Y\x1eXc\x06z<\b\xc6\xf5\xc3\xe4\xbb\xfdb\xc3\xe3\xec\x88\xf0\xf7h\xdc\xfd\x11\xae5Pm\xd7\x90\x8a,', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x3, 0x0, 0x8, 0xe6e1, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 205.113570][ T8991] device bridge_slave_1 left promiscuous mode [ 205.142717][ T8991] bridge0: port 2(bridge_slave_1) entered disabled state 07:39:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r0, &(0x7f0000000000)="b6", 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={{r1, r2/1000+30000}, {0x0, 0x7530}}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000001de842f19b259a3c1cf000003b4000007f71242d6af33ee77b76e096f0eb3af34b97fd5be8dbcc8ce4ab976815135d637e92b57a493a3dd85ee717cb8da7f808075f50d57e7d13adce8f38f42485fe9bfc6530cbc679534343fb27faf85b11939bedca5380da9b568503490950a1684588062d1959e9ed4e292cca170e027a02896cd0c850f6d7d7da7907b8392ee750678e9ff144fc3209000000fcdf791b6b133f82d4bdf7ede6f847e6dfa5241e4b62601797592dc30a14c125fe619276cf4f7e062a891839e32c7d37297165bac00bcc5d90d9571bbd888dd889d25194fd128d13a0b25fe3ccb88e964bb65d9f15dd3edbd686c7ed79989ceed96477ddaab10a14b587ffbafe63b6e114562564c6f4cffddc4415688e03b30efeee837a562888bd9c6477fe3579c747410ab0dd0e6170a6889360c9718adbb2b4703a3ae34965ca2aaf0e207092e06193090ef145e2b83a02e4b781ada0290dd0ee0dd4a0e9fda4ab83b982b00346340e08e5f6e2709df6d6731a21d082b7bad4f5fb7a9ff57f0c3c11d8b59c03960d57d8daaeb134005bb1fe2afb23433f1334117f2e2f2e7e6c5b74d66095e9745c543c97c065e19790aa659bfcf401203e0a0c2644944d759c8cc9bb65c53c6504dd0a7a2cce46e46ba440c7f8a2ead8afc0eb57d3c3fc7d5225e2c3241a2a48adcb8f67757d9911555a13e4fd55e288de"], &(0x7f0000000100)=0x1) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400100, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x400, 0x24) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresuid(&(0x7f00000001c0), &(0x7f0000000c80), &(0x7f0000000cc0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x20000, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty}}, 0xe8) getegid() r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x200000, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000d00)='cpu.stat\x00\xea\x11\x06i\xb5\xc4Ov%\x82\x14\b\x00\x00\x00\x00\x00\x00\x00qX\xcd\a\xce\xe5.<\xe5k\xb4Y\x1eXc\x06z<\b\xc6\xf5\xc3\xe4\xbb\xfdb\xc3\xe3\xec\x88\xf0\xf7h\xdc\xfd\x11\xae5Pm\xd7\x90\x8a,', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x3, 0x0, 0x8, 0xe6e1, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 07:39:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') r2 = dup(r0) sendfile(r2, r1, 0x0, 0x525) [ 205.369641][ T8991] bond0: (slave bond_slave_0): Releasing backup interface 07:39:38 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x188, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000080)={0x9, 0x7ff, 0x7f}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) [ 206.171581][ T8991] bond0: (slave bond_slave_1): Releasing backup interface [ 206.680063][ T8991] team0: Port device team_slave_0 removed [ 206.966291][ T8991] team0: Port device team_slave_1 removed [ 207.121841][ T9031] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.129323][ T9031] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.136174][ T9041] IPVS: ftp: loaded support on port[0] = 21 [ 209.343203][ T9041] chnl_net:caif_netlink_parms(): no params data found [ 209.469995][ T9041] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.477276][ T9041] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.505136][ T9041] device bridge_slave_0 entered promiscuous mode [ 209.644858][ T9041] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.653271][ T9041] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.662026][ T9041] device bridge_slave_1 entered promiscuous mode [ 209.689610][ T9041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.701633][ T9041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.729786][ T9041] team0: Port device team_slave_0 added [ 209.737424][ T9041] team0: Port device team_slave_1 added [ 209.893796][ T9041] device hsr_slave_0 entered promiscuous mode [ 210.048746][ T9041] device hsr_slave_1 entered promiscuous mode [ 210.108013][ T9041] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.351181][ T9041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.366043][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.376154][ T8855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.388644][ T9041] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.400422][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.409648][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.421207][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.428323][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.452036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.463079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.472273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.483577][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.490696][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.500361][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.509226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.518714][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.527536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.547180][ T9041] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.558890][ T9041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.683646][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.699085][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.717774][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.726746][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.744275][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.756404][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.771684][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.809196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.817304][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.834015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.854970][ T9041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.244775][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 211.306167][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.317808][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.342929][ T9077] device bridge_slave_0 left promiscuous mode [ 211.360606][ T9077] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.522912][ T9077] device bridge_slave_1 left promiscuous mode [ 211.537397][ T9077] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.733068][ T9077] bond0: (slave bond_slave_0): Releasing backup interface [ 212.086307][ T9077] bond0: (slave bond_slave_1): Releasing backup interface [ 212.607448][ T9077] team0: Port device team_slave_0 removed [ 212.849639][ T9077] team0: Port device team_slave_1 removed [ 213.027592][ T9077] syz-executor.2 (9077) used greatest stack depth: 22824 bytes left 07:39:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000006e80)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000002a00)='F', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000b00)='c', 0x80000}], 0x1}}], 0x2, 0x6049054) 07:39:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = dup2(r1, r3) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x12, r5, 0x0) dup3(r4, r2, 0x0) 07:39:49 executing program 1: mbind(&(0x7f0000a2e000/0x4000)=nil, 0x4000, 0x2, &(0x7f00000000c0)=0x101, 0xf0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 07:39:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCSTI(r3, 0x5412, 0x9e) dup(r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000280)=0x9) r5 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) write$P9_RWRITE(r5, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xc) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f0000000000)={0x200, {0x1, 0x7fff, 0x10001, 0x7c, 0xfffffe00, 0x10000}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000340)=""/140, &(0x7f0000000400)=0x8c) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 07:39:49 executing program 3: syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000140)="64440f07400f01dfb9800000c00f3235010000000f30c4c1196b2c71660f62ab0c0000008fc9d0986be748b800000080000000000f23d00f21f8352000000f0f23f866ba4200b800000100efc421656df52e0fe2bac4000000", 0x59}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x8, 0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x4d00000000) 07:39:49 executing program 2: unshare(0x2040400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) 07:39:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r2, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) [ 216.444007][ T9090] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:39:49 executing program 4: ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000300)=""/239) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x2}, 0x10}}, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000440)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000680)=""/209, 0xd1}, {0x0}], 0x2, 0xac) write$UHID_CREATE(r2, &(0x7f0000000540)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000200)=""/32, 0x20, 0x401, 0x6512, 0x1, 0x2, 0xff}, 0x120) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') bind$inet6(r5, 0x0, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:39:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r1) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) [ 218.367968][ T1077] INFO: task khugepaged:1084 blocked for more than 143 seconds. [ 218.375916][ T1077] Not tainted 5.4.0-rc5-next-20191031 #0 [ 218.397902][ T1077] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 218.417910][ T1077] khugepaged D26296 1084 2 0x80004000 [ 218.424295][ T1077] Call Trace: [ 218.427605][ T1077] __schedule+0x94a/0x1e70 [ 218.447962][ T1077] ? __sched_text_start+0x8/0x8 [ 218.452882][ T1077] ? blk_insert_cloned_request+0x530/0x530 [ 218.467941][ T1077] ? _raw_spin_unlock_irq+0x23/0x80 [ 218.473186][ T1077] ? __lock_page+0x3d9/0xab0 [ 218.485690][ T9109] kobject: 'kvm' (000000007fe866d5): kobject_uevent_env [ 218.487952][ T1077] ? _raw_spin_unlock_irq+0x23/0x80 [ 218.495273][ T9109] kobject: 'kvm' (000000007fe866d5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 218.507973][ T1077] schedule+0xdc/0x2b0 [ 218.512047][ T1077] io_schedule+0x1c/0x70 [ 218.516311][ T1077] __lock_page+0x422/0xab0 [ 218.542245][ T9115] kobject: 'kvm' (000000007fe866d5): kobject_uevent_env [ 218.547967][ T1077] ? wait_on_page_bit+0xa60/0xa60 [ 218.554389][ T1077] ? page_cache_next_miss+0x340/0x340 [ 218.555776][ T9115] kobject: 'kvm' (000000007fe866d5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 218.567953][ T1077] ? ___might_sleep+0x163/0x2c0 [ 218.574434][ T1077] ? __might_sleep+0x95/0x190 [ 218.584422][ T9109] kobject: 'kvm' (000000007fe866d5): kobject_uevent_env [ 218.598064][ T9109] kobject: 'kvm' (000000007fe866d5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 218.609165][ T1077] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 218.615026][ T1077] ? mpage_process_page_bufs+0x780/0x780 [ 218.636782][ T1077] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 218.642807][ T1077] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 218.656432][ T1077] ? __kmalloc_node+0xf/0x70 [ 218.661453][ T1077] ext4_writepages+0x954/0x2e70 [ 218.666487][ T1077] ? __this_cpu_preempt_check+0x2c/0x190 [ 218.679149][ T1077] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 218.685506][ T1077] ? 0xffffffff81000000 [ 218.695938][ T1077] ? mark_lock+0xc2/0x1220 [ 218.702928][ T1077] ? prep_new_page+0x19f/0x200 [ 218.707965][ T1077] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 218.714037][ T1077] ? find_held_lock+0x35/0x130 [ 218.726239][ T1077] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 218.734699][ T1077] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 218.745104][ T1077] do_writepages+0xfa/0x2a0 [ 218.749930][ T1077] ? do_writepages+0xfa/0x2a0 [ 218.754637][ T1077] ? lock_downgrade+0x920/0x920 [ 218.763623][ T1077] ? page_writeback_cpu_online+0x20/0x20 [ 218.769516][ T1077] ? __kasan_check_read+0x11/0x20 [ 218.774649][ T1077] ? do_raw_spin_unlock+0x57/0x270 [ 218.780047][ T1077] ? _raw_spin_unlock+0x28/0x40 [ 218.784909][ T1077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 218.791203][ T1077] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 218.797193][ T1077] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 218.803419][ T1077] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 218.809553][ T1077] ? lockdep_hardirqs_on+0x421/0x5e0 [ 218.814959][ T1077] filemap_flush+0x24/0x30 [ 218.822492][ T1077] collapse_file+0x36b1/0x41a0 [ 218.827332][ T1077] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 218.833605][ T1077] ? khugepaged+0x21c0/0x4360 [ 218.838412][ T1077] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 218.848032][ T1077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 218.853788][ T1077] ? khugepaged_find_target_node+0x142/0x180 [ 218.869025][ T1077] khugepaged+0x2da9/0x4360 [ 218.873594][ T1077] ? __kasan_check_read+0x11/0x20 [ 218.884467][ T1077] ? __lock_acquire+0x16f2/0x4a00 [ 218.890730][ T1077] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 218.896404][ T1077] ? lock_downgrade+0x920/0x920 [ 218.906855][ T1077] ? finish_wait+0x260/0x260 [ 218.912543][ T1077] ? lockdep_hardirqs_on+0x421/0x5e0 [ 218.923632][ T1077] ? trace_hardirqs_on+0x67/0x240 [ 218.930819][ T1077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 218.937092][ T1077] ? __kthread_parkme+0x108/0x1c0 [ 218.949052][ T1077] ? __kasan_check_read+0x11/0x20 [ 218.955079][ T1077] kthread+0x361/0x430 [ 218.963851][ T1077] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 218.971372][ T1077] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 218.977123][ T1077] ret_from_fork+0x24/0x30 [ 218.986355][ T1077] [ 218.986355][ T1077] Showing all locks held in the system: [ 218.988553][ T21] kobject: 'batman_adv' (000000003852a570): kobject_uevent_env [ 219.002273][ T1077] 4 locks held by kworker/u4:1/21: [ 219.007385][ T21] kobject: 'batman_adv' (000000003852a570): kobject_uevent_env: filter function caused the event to drop! [ 219.007409][ T1077] 4 locks held by kworker/u4:4/765: [ 219.020817][ T21] kobject: 'batman_adv' (000000003852a570): kobject_cleanup, parent 00000000607a8f95 [ 219.028761][ T1077] #0: ffff8880a7d47528 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 [ 219.034208][ T21] kobject: 'batman_adv' (000000003852a570): calling ktype release [ 219.051104][ T1077] #1: ffff8880a8187dc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 219.052300][ T21] kobject: (000000003852a570): dynamic_kobj_release [ 219.063071][ T1077] #2: ffff88809acee0d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 219.070169][ T21] kobject: 'batman_adv': free name [ 219.085478][ T1077] #3: ffff88809acf0990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 219.095583][ T1077] 1 lock held by khungtaskd/1077: [ 219.100709][ T1077] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 219.110081][ T1077] 1 lock held by khugepaged/1084: [ 219.115122][ T1077] #0: ffff88809acf0990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 219.125698][ T1077] 3 locks held by kworker/1:2/3664: [ 219.130938][ T1077] #0: ffff8880aa426d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 219.140876][ T1077] #1: ffff88809c007dc0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 219.150767][ T1077] #2: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.158939][ T1077] 2 locks held by getty/8802: [ 219.163628][ T1077] #0: ffff8880a0d2c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.172675][ T1077] #1: ffffc90005f472e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.182321][ T1077] 2 locks held by getty/8803: [ 219.186985][ T1077] #0: ffff88808e8b5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.196000][ T1077] #1: ffffc90005f4b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.205646][ T1077] 2 locks held by getty/8804: [ 219.210373][ T1077] #0: ffff88809bc53090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.219378][ T1077] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.229031][ T1077] 2 locks held by getty/8805: [ 219.233793][ T1077] #0: ffff8880a8c53090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.242828][ T1077] #1: ffffc90005f3f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.252523][ T1077] 2 locks held by getty/8806: [ 219.257304][ T1077] #0: ffff88809c970090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.266726][ T1077] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.278433][ T1077] 2 locks held by getty/8807: [ 219.283120][ T1077] #0: ffff8880a4130090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.292150][ T1077] #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.301936][ T1077] 2 locks held by getty/8808: [ 219.306608][ T1077] #0: ffff88809ad1e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.315647][ T1077] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.325288][ T1077] 1 lock held by syz-executor.0/9085: [ 219.330714][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.338797][ T1077] 1 lock held by syz-executor.0/9089: [ 219.344172][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.352260][ T1077] 1 lock held by syz-executor.1/9094: [ 219.357644][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.365728][ T1077] 1 lock held by syz-executor.1/9096: [ 219.371152][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.379280][ T1077] 1 lock held by syz-executor.4/9110: [ 219.384643][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.392787][ T1077] 1 lock held by syz-executor.4/9111: [ 219.398231][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 219.406585][ T1077] 1 lock held by syz-executor.3/9113: [ 219.412020][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 219.420967][ T1077] 1 lock held by syz-executor.2/9118: [ 219.426342][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 219.435299][ T1077] 1 lock held by syz-executor.5/9119: [ 219.441599][ T1077] #0: ffffffff899b90e0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 219.450667][ T1077] [ 219.452997][ T1077] ============================================= [ 219.452997][ T1077] [ 219.461782][ T1077] NMI backtrace for cpu 1 [ 219.466123][ T1077] CPU: 1 PID: 1077 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 219.474712][ T1077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.484761][ T1077] Call Trace: [ 219.488041][ T1077] dump_stack+0x172/0x1f0 [ 219.492357][ T1077] nmi_cpu_backtrace.cold+0x70/0xb2 [ 219.497570][ T1077] ? vprintk_func+0x86/0x189 [ 219.502152][ T1077] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 219.507780][ T1077] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 219.513838][ T1077] arch_trigger_cpumask_backtrace+0x14/0x20 [ 219.519832][ T1077] watchdog+0xc8f/0x1350 [ 219.524123][ T1077] kthread+0x361/0x430 [ 219.528196][ T1077] ? reset_hung_task_detector+0x30/0x30 [ 219.533743][ T1077] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 219.539468][ T1077] ret_from_fork+0x24/0x30 [ 219.544163][ T1077] Sending NMI from CPU 1 to CPUs 0: [ 219.549782][ C0] NMI backtrace for cpu 0 [ 219.549788][ C0] CPU: 0 PID: 2922 Comm: kworker/u4:5 Not tainted 5.4.0-rc5-next-20191031 #0 [ 219.549793][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.549797][ C0] Workqueue: bat_events batadv_nc_worker [ 219.549803][ C0] RIP: 0010:in_lock_functions+0xb/0x20 [ 219.549812][ C0] Code: c7 40 86 12 8a e8 55 3e 55 00 eb 88 0f 1f 00 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 31 c0 48 81 ff 28 d8 57 87 72 0c <31> c0 48 81 ff cd e6 57 87 0f 92 c0 c3 90 90 90 90 90 90 90 90 55 [ 219.549816][ C0] RSP: 0018:ffff8880a0047bd0 EFLAGS: 00000016 [ 219.549822][ C0] RAX: 0000000000000000 RBX: ffffffff8757d843 RCX: 1ffffffff1561834 [ 219.549827][ C0] RDX: 0000000000000000 RSI: 1ffffffff1186c28 RDI: ffffffff8757d843 [ 219.549831][ C0] RBP: ffff8880a0047be8 R08: ffff8880a00322c0 R09: ffffed1015d06b7d [ 219.549835][ C0] R10: ffffed1015d06b7c R11: ffff8880ae835be3 R12: ffffffff88fae340 [ 219.549840][ C0] R13: ffff8880a0032650 R14: ffff8880ae835b15 R15: ffffffff88fae340 [ 219.549844][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 219.549848][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 219.549853][ C0] CR2: 000000000244f978 CR3: 000000006f0d6000 CR4: 00000000001406f0 [ 219.549857][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 219.549861][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 219.549864][ C0] Call Trace: [ 219.549867][ C0] ? preempt_count_add+0x7a/0x160 [ 219.549870][ C0] _raw_spin_lock+0x13/0x40 [ 219.549874][ C0] rcu_preempt_deferred_qs_irqrestore+0x1fc/0xd60 [ 219.549877][ C0] ? batadv_nc_worker+0x208/0x760 [ 219.549885][ C0] ? trace_hardirqs_off+0x62/0x240 [ 219.549888][ C0] __rcu_read_unlock+0x220/0x6b0 [ 219.549891][ C0] ? __kasan_check_read+0x11/0x20 [ 219.549895][ C0] batadv_nc_worker+0x208/0x760 [ 219.549898][ C0] process_one_work+0x9af/0x1740 [ 219.549901][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 219.549904][ C0] ? lock_acquire+0x190/0x410 [ 219.549907][ C0] worker_thread+0x98/0xe40 [ 219.549911][ C0] ? trace_hardirqs_on+0x67/0x240 [ 219.549913][ C0] kthread+0x361/0x430 [ 219.549916][ C0] ? process_one_work+0x1740/0x1740 [ 219.549920][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 219.549923][ C0] ret_from_fork+0x24/0x30 [ 219.550827][ T1077] Kernel panic - not syncing: hung_task: blocked tasks [ 219.786742][ T1077] CPU: 1 PID: 1077 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 219.795306][ T1077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.805401][ T1077] Call Trace: [ 219.808703][ T1077] dump_stack+0x172/0x1f0 [ 219.813038][ T1077] panic+0x2e3/0x75c [ 219.816932][ T1077] ? add_taint.cold+0x16/0x16 [ 219.821600][ T1077] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 219.827493][ T1077] ? ___preempt_schedule+0x16/0x18 [ 219.832685][ T1077] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 219.838818][ T1077] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 219.844953][ T1077] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 219.851088][ T1077] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 219.857233][ T1077] watchdog+0xca0/0x1350 [ 219.861474][ T1077] kthread+0x361/0x430 [ 219.865608][ T1077] ? reset_hung_task_detector+0x30/0x30 [ 219.871151][ T1077] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 219.876864][ T1077] ret_from_fork+0x24/0x30 [ 219.883064][ T1077] Kernel Offset: disabled [ 219.887408][ T1077] Rebooting in 86400 seconds..