[ 56.480034][ T23] audit: type=1800 audit(1572908927.296:25): pid=8786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.505875][ T23] audit: type=1800 audit(1572908927.296:26): pid=8786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.550571][ T23] audit: type=1800 audit(1572908927.306:27): pid=8786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 57.309996][ T8854] sshd (8854) used greatest stack depth: 22888 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. 2019/11/04 23:08:58 fuzzer started 2019/11/04 23:09:00 dialing manager at 10.128.0.26:42879 2019/11/04 23:09:00 syscalls: 2566 2019/11/04 23:09:00 code coverage: enabled 2019/11/04 23:09:00 comparison tracing: enabled 2019/11/04 23:09:00 extra coverage: extra coverage is not supported by the kernel 2019/11/04 23:09:00 setuid sandbox: enabled 2019/11/04 23:09:00 namespace sandbox: enabled 2019/11/04 23:09:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 23:09:00 fault injection: enabled 2019/11/04 23:09:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 23:09:00 net packet injection: enabled 2019/11/04 23:09:00 net device setup: enabled 2019/11/04 23:09:00 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/04 23:09:00 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:10:57 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) 23:10:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\a']}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syzkaller login: [ 186.824783][ T8951] IPVS: ftp: loaded support on port[0] = 21 [ 187.017088][ T8954] IPVS: ftp: loaded support on port[0] = 21 [ 187.039168][ T8951] chnl_net:caif_netlink_parms(): no params data found 23:10:57 executing program 2: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x9db5e658824014e6, 0x0) [ 187.153149][ T8951] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.167465][ T8951] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.188272][ T8951] device bridge_slave_0 entered promiscuous mode [ 187.227363][ T8951] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.234464][ T8951] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.256766][ T8951] device bridge_slave_1 entered promiscuous mode [ 187.313143][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 187.353040][ T8951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:10:58 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) [ 187.384441][ T8951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.415791][ T8954] chnl_net:caif_netlink_parms(): no params data found [ 187.490097][ T8951] team0: Port device team_slave_0 added [ 187.523732][ T8951] team0: Port device team_slave_1 added [ 187.562413][ T8954] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.585772][ T8954] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.593981][ T8954] device bridge_slave_0 entered promiscuous mode [ 187.617733][ T8954] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.624843][ T8954] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.635309][ T8954] device bridge_slave_1 entered promiscuous mode 23:10:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\a']}) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 187.666516][ T8961] IPVS: ftp: loaded support on port[0] = 21 [ 187.811156][ T8951] device hsr_slave_0 entered promiscuous mode 23:10:58 executing program 5: memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\xc8z', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x32d}, 0x6) [ 187.868041][ T8951] device hsr_slave_1 entered promiscuous mode [ 187.937333][ T8954] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.963694][ T8964] IPVS: ftp: loaded support on port[0] = 21 [ 187.990362][ T8958] chnl_net:caif_netlink_parms(): no params data found [ 188.002542][ T8954] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.031310][ T8954] team0: Port device team_slave_0 added [ 188.050773][ T8954] team0: Port device team_slave_1 added [ 188.074688][ T8966] IPVS: ftp: loaded support on port[0] = 21 [ 188.149028][ T8954] device hsr_slave_0 entered promiscuous mode [ 188.176014][ T8954] device hsr_slave_1 entered promiscuous mode [ 188.245752][ T8954] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.285108][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.292871][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.301608][ T8958] device bridge_slave_0 entered promiscuous mode [ 188.309931][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.317083][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.324887][ T8958] device bridge_slave_1 entered promiscuous mode [ 188.350461][ T8958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.378749][ T8958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.429677][ T8958] team0: Port device team_slave_0 added [ 188.457284][ T8958] team0: Port device team_slave_1 added [ 188.528801][ T8958] device hsr_slave_0 entered promiscuous mode [ 188.586048][ T8958] device hsr_slave_1 entered promiscuous mode [ 188.635736][ T8958] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.756858][ T8961] chnl_net:caif_netlink_parms(): no params data found [ 188.777812][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.784945][ T8958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.792714][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.799911][ T8958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.876431][ T8964] chnl_net:caif_netlink_parms(): no params data found [ 188.909581][ T8966] chnl_net:caif_netlink_parms(): no params data found [ 188.967424][ T8961] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.974592][ T8961] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.982599][ T8961] device bridge_slave_0 entered promiscuous mode [ 188.992085][ T8961] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.999927][ T8961] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.008046][ T8961] device bridge_slave_1 entered promiscuous mode [ 189.051357][ T8951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.064666][ T8961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.089424][ T8964] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.100593][ T8964] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.109529][ T8964] device bridge_slave_0 entered promiscuous mode [ 189.124622][ T8954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.132309][ T8966] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.139631][ T8966] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.147526][ T8966] device bridge_slave_0 entered promiscuous mode [ 189.156119][ T8961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.165270][ T8966] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.172815][ T8966] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.180819][ T8966] device bridge_slave_1 entered promiscuous mode [ 189.195346][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.203956][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.216858][ T8964] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.223932][ T8964] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.232068][ T8964] device bridge_slave_1 entered promiscuous mode [ 189.257254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.266494][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.290785][ T8964] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.302333][ T8966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.314717][ T8951] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.328046][ T8961] team0: Port device team_slave_0 added [ 189.335204][ T8964] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.359201][ T8966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.373315][ T8954] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.388155][ T8961] team0: Port device team_slave_1 added [ 189.395916][ T8964] team0: Port device team_slave_0 added [ 189.404913][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.412991][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.420915][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.430123][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.438790][ T8957] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.445927][ T8957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.458804][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.489563][ T8964] team0: Port device team_slave_1 added [ 189.504070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.513107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.521688][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.528814][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.536394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.545102][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.553832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.562190][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.569286][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.584302][ T8958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.627861][ T8961] device hsr_slave_0 entered promiscuous mode [ 189.676137][ T8961] device hsr_slave_1 entered promiscuous mode [ 189.715986][ T8961] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.725558][ T8966] team0: Port device team_slave_0 added [ 189.732901][ T8966] team0: Port device team_slave_1 added [ 189.740019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.748355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.757100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.765366][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.772547][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.780680][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.790189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.798886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.807824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.816419][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.824974][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.833657][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.857099][ T8958] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.877853][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.885525][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.895132][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.904835][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.913690][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.922277][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.930864][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.940206][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.949024][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.957498][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.964544][ T3101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.973436][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.011427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.021116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.029708][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.039096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.048009][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.056876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.065463][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.072584][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.080307][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.138417][ T8966] device hsr_slave_0 entered promiscuous mode [ 190.176162][ T8966] device hsr_slave_1 entered promiscuous mode [ 190.225718][ T8966] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.278939][ T8964] device hsr_slave_0 entered promiscuous mode [ 190.317005][ T8964] device hsr_slave_1 entered promiscuous mode [ 190.345726][ T8964] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.373397][ T8954] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.384237][ T8954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.405192][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.413848][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.422681][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.431363][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.440040][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.448907][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.458203][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.550405][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.559893][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.570319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.579659][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.588534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.597182][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.605449][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.613398][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.621418][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.639716][ T8958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.652209][ T8958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.679755][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.689334][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.705164][ T8951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.724823][ T8954] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.758315][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.767422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.783176][ T8958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.806512][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.814022][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.896998][ T8964] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.920142][ T8961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.953123][ T8964] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.962569][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.982613][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.996309][ T8961] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.032320][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.045353][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.056657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.065522][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.074638][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.081773][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.090558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.113829][ T8966] 8021q: adding VLAN 0 to HW filter on device bond0 23:11:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 191.126509][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.136325][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.145284][ T8956] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.152411][ T8956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.160459][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.169964][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.179142][ T8956] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.186448][ T8956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.205157][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.214973][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.229761][ T8956] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.236921][ T8956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.263099][ T8966] 8021q: adding VLAN 0 to HW filter on device team0 23:11:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xdc}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 191.322967][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.341991][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.364952][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 23:11:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x4) [ 191.393089][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.414981][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.433297][ T9002] BPF:hdr_len not found 23:11:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x10}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x24}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 191.441352][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.470877][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.497199][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.505067][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:11:02 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x84, 0x73, 0x0, &(0x7f00000001c0)) [ 191.548448][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.575193][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 23:11:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300090468fe07002b0000000000ff0711000000450001070000001419001a001500020007004000550e00"/57, 0x39}], 0x1) 23:11:02 executing program 0: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f000054a000)='./bus\x00', 0xb00, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 191.592463][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.617998][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.627821][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.636769][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.653446][ T8964] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.713503][ T8964] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.753995][ T8961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.773280][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.782586][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.792031][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.801368][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.811076][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.820647][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.829810][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.839083][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.848043][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.857050][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.873503][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.882166][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.889311][ T3101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.904006][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.913083][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.928673][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.935829][ T3101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.943949][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.959424][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.971512][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.986030][ T9020] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 191.998843][ T9020] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 23:11:02 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000140)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}, 0x15202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@nfc, &(0x7f0000000000)=0x80) bind$inet6(r3, &(0x7f0000000340)={0xa, 0x4e24, 0x81, @remote, 0x7f}, 0x1c) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) epoll_create(0xdd) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, 0x0}, 0x8) [ 192.029293][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.041292][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.055207][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.085928][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.094933][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.127040][ C1] hrtimer: interrupt took 45388 ns [ 192.141125][ T8964] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.193235][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.204428][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.212479][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.220400][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.229383][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.238370][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.258524][ T3101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.272250][ T8961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.308549][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.325091][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.351472][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.360544][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.371589][ T8966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.415353][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.441028][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.458524][ T8966] 8021q: adding VLAN 0 to HW filter on device batadv0 23:11:03 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffcc}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1a}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x4, 0x3, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:04 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg$inet(r0, &(0x7f00000015c0), 0x68c, 0x0) 23:11:04 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x1) 23:11:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x5, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:04 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:04 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000140)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}, 0x15202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@nfc, &(0x7f0000000000)=0x80) bind$inet6(r3, &(0x7f0000000340)={0xa, 0x4e24, 0x81, @remote, 0x7f}, 0x1c) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) epoll_create(0xdd) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, 0x0}, 0x8) 23:11:04 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet(r0, &(0x7f00000015c0)=[{{&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x18, 0x0, 0x1600bd75}}], 0x18}}], 0x1, 0x0) 23:11:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00), 0x1000) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:11:04 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:11:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:04 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:04 executing program 4: r0 = inotify_init1(0x0) r1 = dup2(r0, r0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, 0x0) 23:11:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) readv(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vat\xa8\x03\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r4, &(0x7f0000000200)=""/39, 0x27, 0x0) dup2(r3, r4) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba0000dd4b2f603b0000000200", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b00000000005669c23a0c24a382fcc9b335f92c11bb433fa723307d79a0efc6e6512d753c9b89b979fda4618af79ce515c43521b9a52fe1e741887f8f2b7516f2c3454b90250871efb8e7908919fd194229bb6f28d7fb072a2d13669f5458292067e39bf34ffa35d244"], 0x28}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x81800) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)={0x0, {{0x2, 0x0, @dev}}}, 0x108) [ 194.555832][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 194.555847][ T23] audit: type=1804 audit(1572909065.366:31): pid=9097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir883266452/syzkaller.A1xfW0/6/file0/file0" dev="loop2" ino=22 res=1 23:11:05 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\xa8\x03\x00\x00\x00\x00\x00\xa8\x03\x00'}) 23:11:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet(r0, &(0x7f00000015c0)=[{{&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x8}}], 0x18}}], 0x1, 0x0) 23:11:05 executing program 1: 23:11:05 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:05 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet(r0, &(0x7f00000015c0)=[{{&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x1600bd74}}], 0x18}}], 0x1, 0x0) [ 194.855992][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 194.862072][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:11:05 executing program 5: 23:11:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@ldst={0x4, 0x3, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 23:11:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffcc}, [@ldst={0x4, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 195.026510][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.032515][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 195.100254][ T9134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 195.109276][ T9134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 195.166235][ T9134] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 195.264991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.272497][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 195.678363][ T9130] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 195.735748][ T9130] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 23:11:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) readv(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vat\xa8\x03\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r4, &(0x7f0000000200)=""/39, 0x27, 0x0) dup2(r3, r4) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba0000dd4b2f603b0000000200", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b00000000005669c23a0c24a382fcc9b335f92c11bb433fa723307d79a0efc6e6512d753c9b89b979fda4618af79ce515c43521b9a52fe1e741887f8f2b7516f2c3454b90250871efb8e7908919fd194229bb6f28d7fb072a2d13669f5458292067e39bf34ffa35d244"], 0x28}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x81800) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)={0x0, {{0x2, 0x0, @dev}}}, 0x108) 23:11:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x9, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1ebaa1af71a4f0ff00000000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000008c0)=""/224) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x2000203) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:11:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0x20) 23:11:06 executing program 1: 23:11:06 executing program 2: 23:11:06 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:06 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:06 executing program 2: 23:11:06 executing program 1: [ 196.143564][ T23] audit: type=1800 audit(1572909066.956:32): pid=9176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16552 res=0 23:11:07 executing program 2: 23:11:07 executing program 2: 23:11:07 executing program 1: [ 196.338956][ T23] audit: type=1804 audit(1572909066.956:33): pid=9176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir466833018/syzkaller.rSmyqz/8/file0/file0" dev="sda1" ino=16552 res=1 [ 196.375650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 196.381471][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 196.505523][ T23] audit: type=1800 audit(1572909066.956:34): pid=9176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16552 res=0 [ 196.593930][ T9182] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:11:07 executing program 0: 23:11:07 executing program 4: 23:11:07 executing program 2: 23:11:07 executing program 1: 23:11:07 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:07 executing program 5: 23:11:07 executing program 5: 23:11:07 executing program 2: 23:11:07 executing program 1: 23:11:07 executing program 4: 23:11:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:08 executing program 0: 23:11:08 executing program 5: 23:11:08 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x11}}}}}}, 0x0) 23:11:08 executing program 4: 23:11:08 executing program 1: 23:11:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:08 executing program 5: 23:11:08 executing program 0: 23:11:08 executing program 4: 23:11:08 executing program 2: 23:11:08 executing program 1: 23:11:08 executing program 4: 23:11:08 executing program 0: 23:11:08 executing program 5: 23:11:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:08 executing program 2: 23:11:08 executing program 1: 23:11:08 executing program 0: 23:11:08 executing program 5: 23:11:08 executing program 4: 23:11:08 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:08 executing program 1: 23:11:08 executing program 2: 23:11:08 executing program 0: 23:11:08 executing program 4: 23:11:08 executing program 5: 23:11:08 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:08 executing program 2: 23:11:09 executing program 1: 23:11:09 executing program 5: 23:11:09 executing program 0: 23:11:09 executing program 4: 23:11:09 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:09 executing program 2: 23:11:09 executing program 1: 23:11:09 executing program 5: 23:11:09 executing program 0: 23:11:09 executing program 4: 23:11:09 executing program 2: 23:11:09 executing program 1: 23:11:09 executing program 4: 23:11:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:09 executing program 5: 23:11:09 executing program 0: 23:11:09 executing program 1: 23:11:09 executing program 2: 23:11:09 executing program 4: 23:11:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:09 executing program 5: 23:11:09 executing program 2: 23:11:09 executing program 0: 23:11:09 executing program 1: 23:11:09 executing program 4: 23:11:09 executing program 5: 23:11:09 executing program 2: 23:11:10 executing program 1: 23:11:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:10 executing program 0: 23:11:10 executing program 4: 23:11:10 executing program 5: 23:11:10 executing program 2: 23:11:10 executing program 0: 23:11:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:10 executing program 1: 23:11:10 executing program 5: 23:11:10 executing program 2: 23:11:10 executing program 4: 23:11:10 executing program 0: 23:11:10 executing program 1: 23:11:10 executing program 5: 23:11:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:10 executing program 2: 23:11:10 executing program 4: 23:11:10 executing program 0: 23:11:10 executing program 5: 23:11:10 executing program 1: 23:11:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:10 executing program 0: 23:11:10 executing program 2: 23:11:10 executing program 4: 23:11:10 executing program 1: 23:11:10 executing program 5: 23:11:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) 23:11:11 executing program 0: 23:11:11 executing program 2: 23:11:11 executing program 4: 23:11:11 executing program 1: 23:11:11 executing program 5: 23:11:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) 23:11:11 executing program 2: 23:11:11 executing program 4: 23:11:11 executing program 1: 23:11:11 executing program 0: 23:11:11 executing program 5: 23:11:11 executing program 4: 23:11:11 executing program 2: 23:11:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) 23:11:11 executing program 0: 23:11:11 executing program 1: 23:11:11 executing program 5: 23:11:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0900d40029d38af7f65f578ca5c5e1d0d6896c075723d46ee292959b0f98b9f6afb33287932f1ffd29c1822545cdfb792d65cb5a910f7201a3efafe5a38fb6303001003f2ab1fe05963cb1eb28a7d0b2386ab7cc7892381bec116b3aa2b3f97192b978f879a49ee481bc4415adc479147e4f0b04b3f82c923a94e9082ce3ebf5f284b34da1571e83c57ae91a4f5275cb5aa4cb0a1631f9161af82be635a4fc25a644ebca8f191782b86dad1713b0d27d99641d91355f0d76fac977062e77b9826c7c74da14e27354822ef07b000000008a2d9bd57ff32f9632"], 0xdc) r4 = dup2(r3, r2) dup3(r4, r1, 0x0) 23:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x206, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(&(0x7f0000000380)='./file0\x00', 0x841, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 23:11:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x10) sendmmsg$inet(r0, &(0x7f0000005840)=[{{&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) 23:11:11 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000842}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)='4', 0x4100) r3 = open(0x0, 0x0, 0x0) bind$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) creat(0x0, 0x0) epoll_create1(0x0) 23:11:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_mreq(r3, 0x0, 0x23, 0x0, 0x772550b3) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 23:11:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000680)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) dup2(r2, r1) [ 201.066017][ T23] audit: type=1800 audit(1572909071.876:35): pid=9444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=24 res=0 23:11:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:12 executing program 1: [ 201.211960][ T23] audit: type=1800 audit(1572909072.026:36): pid=9444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="loop2" ino=24 res=0 23:11:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) dup2(r1, r2) 23:11:12 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x6, 0x4) 23:11:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000240)=[{0x0, 0xfffffee6}, {0x0}, {0x0, 0x22f}], 0x3}, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 23:11:12 executing program 4: clone(0x3103101ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f000045c000/0x4000)=nil, 0x4000) write$char_usb(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x260) 23:11:12 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xff03) [ 201.520395][ T9485] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 201.560740][ T9485] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 201.589768][ T9490] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 201.631199][ T9495] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 23:11:12 executing program 5: 23:11:12 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) [ 201.671800][ T9485] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 201.704704][ T9485] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 23:11:12 executing program 1: 23:11:12 executing program 2: 23:11:12 executing program 5: 23:11:12 executing program 1: 23:11:12 executing program 0: 23:11:12 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:12 executing program 2: 23:11:13 executing program 4: 23:11:13 executing program 5: 23:11:13 executing program 1: 23:11:13 executing program 2: 23:11:13 executing program 0: 23:11:13 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 23:11:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) 23:11:13 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, 0x0}, 0x0) 23:11:13 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x84, 0x81, 0x0, &(0x7f00000001c0)) 23:11:13 executing program 1: 23:11:13 executing program 4: 23:11:13 executing program 2: 23:11:13 executing program 1: 23:11:13 executing program 4: 23:11:13 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, 0x0}, 0x0) 23:11:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 202.689586][ T9540] overlayfs: conflicting lowerdir path [ 202.791748][ T9547] overlayfs: conflicting lowerdir path 23:11:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) dup(0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x135, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000000)="9a07000000e800260f300fc75cf4c81319811f6c6cba410066b89e001f00d8efb902090000b800000000ba000000800f30b805000000b9e10000000f01c1b8010000000f01d9b933030000b84d000000ba000000000f3066ba430066b80070e5ae", 0x61}], 0x1, 0xac, 0x0, 0xffffffffffffff24) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:11:13 executing program 4: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)) ioprio_set$uid(0x3, 0x0, 0x80000001) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="99ddeb3c88fe946a5a124f8f5af51e370f35fa7393ea6270a329d1a3a80f905fa9d3a2cf681bcc3455bad42435ee8a6ad20b16af6602be95f5c546a1cb52fc1852148bf764bbdb327cbb3b2724eb631e8103de7eb1597345bb4dbd05b439c524537aef4f6c26166d1bb105f24734e1201ff93a418dcc119aa1496b5bb308150a13d9272f753ef167bfb3085867d8670e2590a3d079b620494c98c1f1b5bc00ee53abab14902bf1b46eda7a9c6479f868aefb0e19754048338822b6a4b56cd56799c2c33ec8"], 0x0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000008040), 0x0, 0x0) recvmsg(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1, 0x0, 0x6}, 0x0) 23:11:13 executing program 5: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)) ioprio_set$uid(0x3, 0x0, 0x80000001) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="99ddeb3c88fe946a5a124f8f5af51e370f35fa7393ea6270a329d1a3a80f905fa9d3a2cf681bcc3455bad42435ee8a6ad20b16af6602be95f5c546a1cb52fc1852148bf764bbdb327cbb3b2724eb631e8103de7eb1597345bb4dbd05b439c524537aef4f6c26166d1bb105f24734e1201ff93a418dcc119aa1496b5bb308150a13d9272f753ef167bfb3085867d8670e2590a3d079b620494c98c1f1b5bc00ee53abab14902bf1b46eda7a9c6479f868aefb0e19754048338822b6a4b56cd56799c2c33ec8"], 0x0, 0x0, 0xc0000, 0x0) sendmmsg$alg(r2, &(0x7f0000008040)=[{0x0, 0x0, &(0x7f0000000840)=[{0x0}], 0x1, &(0x7f00000008c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1, 0x0, 0x6}, 0x0) 23:11:13 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, 0x0}, 0x0) [ 203.005534][ T9563] overlayfs: workdir and upperdir must reside under the same mount [ 203.045408][ T9572] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 203.099316][ T9565] overlayfs: workdir and upperdir must reside under the same mount 23:11:14 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x84, 0x81, 0x0, &(0x7f00000001c0)) 23:11:14 executing program 3: userfaultfd(0x0) r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(authenc(sha224-generic,xts(ecb-serpent-avx2)),sha1-avx)\x00'}, 0x58) shutdown(0xffffffffffffffff, 0x0) r2 = dup(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000594000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 23:11:14 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_tgsigqueueinfo(r2, r5, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r1, &(0x7f0000000700)=""/128, 0xfc25) 23:11:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000100), 0x8) listen(r1, 0x0) 23:11:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa290, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:11:14 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c00600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x306c, 0x4000002, 0x0, 0x2ff) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 23:11:14 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:14 executing program 4: mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000)=0x2, 0x4) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000100)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0xffff) 23:11:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 23:11:14 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) [ 203.869842][ T9619] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:11:14 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:15 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x84, 0x81, 0x0, &(0x7f00000001c0)) 23:11:15 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) gettid() read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:11:15 executing program 4: mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)=0x3f) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000)=0x2, 0x4) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000100)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0xffff) 23:11:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) getresgid(&(0x7f0000003180), 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440"}}, {{@in=@empty}, 0x0, @in=@loopback}}, 0xe8) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000001480)=ANY=[@ANYBLOB="00000000000000000000010000000000000000000000000000000003"]) 23:11:15 executing program 3: userfaultfd(0x0) r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(authenc(sha224-generic,xts(ecb-serpent-avx2)),sha1-avx)\x00'}, 0x58) shutdown(0xffffffffffffffff, 0x0) r2 = dup(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000594000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 23:11:15 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)]) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00d3bb0f00000014660f3422"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 204.671358][ T9656] ptrace attach of "/root/syz-executor.5"[9654] was attempted by "/root/syz-executor.5"[9656] 23:11:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="1bcdcff08fbecccdb2c128abc4931e1e"}}}, 0x2eb) r3 = accept$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) fsetxattr$trusted_overlay_origin(r3, 0x0, 0x0, 0xfffffffffffffe43, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) readlink(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x30004081) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPS\x00') r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000400)=0x200) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f00000001c0)={'batadv0\x00', {0x2, 0x4e21, @remote}}) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40180000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0xa344aff5179dd9ed, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20080021}, 0x4000) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7}, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 204.728301][ T9659] ptrace attach of "/root/syz-executor.1"[9658] was attempted by "/root/syz-executor.1"[9659] 23:11:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bcsf0\x00') r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2103001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 23:11:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 23:11:16 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) gettid() read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:16 executing program 3: userfaultfd(0x0) r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(authenc(sha224-generic,xts(ecb-serpent-avx2)),sha1-avx)\x00'}, 0x58) shutdown(0xffffffffffffffff, 0x0) r2 = dup(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000594000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 23:11:16 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x29, 0xf, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r1, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) r2 = gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x2, 0x40, 0x77, 0x0, 0x8001, 0x80402, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1000, 0x9, 0x0, 0x4, 0x4, 0x1000, 0xff}, r2, 0x9, 0xffffffffffffffff, 0x1) r3 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x24000001) r4 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x24000001) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYRESDEC=r7, @ANYRESOCT=0x0, @ANYRESDEC, @ANYBLOB="484ca07a00a3e2c31b0a6a08ccc24455df11a5de12367ff1bf938c6d140ae000bd412ac690aff9773b2746c2d5fe8afeae0e6d872e49dc04b55f2fc0244bff02c65f3dc00cdf5cfdcc4cc7658993718f7dccbfc95fff839d71944f4986f61e84bae11a58561a8d48311cd9f8c4c5f88697945fcb71797dd72ff29c346518f16e8d79810a7f5f2a13b58e40423abdc1a90382545cfedd27ca0e01ed13e74da41be1bed84257e1c1e94df0f44ca317a2e0d802e1cc05690dd61cce888482e89c877ba26e66d1bd0132ffd24ae253fb70ed28534d1cb33f1f51a3e1c90ea2dc4486e2e92149f3e380e7ba7406b2", @ANYRES32, @ANYBLOB, @ANYRESDEC=r5, @ANYRESHEX, @ANYPTR64, @ANYRES64=0x0], 0x165) write$cgroup_subtree(r6, &(0x7f0000000780)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c4655122061e308ec79d0c81e240ae00adc42506f9b54c20fe51c8e52a8cbfeef7343e81e3ee79c09bc7d7bef9af3400f39f64782aa261c42bcacd68005dcf5d813a7045f6b58aeecd"], 0x5d) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) recvmsg(r0, &(0x7f000000c0c0)={0x0, 0x0, 0x0}, 0x40) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0xfffffff8, 0xdc, &(0x7f00000002c0)=""/220, 0x41000, 0x0, [], 0x0, 0x11, r8, 0x8, &(0x7f00000003c0), 0x8, 0x10, 0x0}, 0x70) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r9, &(0x7f0000000100), 0xda4fff08) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='pids.current\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) recvmsg$kcm(r10, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000680)=[{0x0}], 0x1, &(0x7f0000000840)=""/221, 0xdd}, 0x1) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x660c, 0x0) 23:11:16 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) 23:11:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x3, 0x0, &(0x7f0000000100)) 23:11:17 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) getpgrp(0x0) gettid() read(r0, &(0x7f0000000700)=""/128, 0xfc25) [ 206.264874][ T23] audit: type=1800 audit(1572909077.076:37): pid=9709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=25 res=0 23:11:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 23:11:17 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)='vboxnet0]cpusetselfeth0', 0x0) write(r0, &(0x7f0000002000)='5', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, '.m4\x00'}, 0x58) 23:11:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 23:11:17 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) 23:11:17 executing program 4: getrandom(&(0x7f00000001c0)=""/244, 0xf4, 0x88666649d8e09996) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000080), 0x4) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x4) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x58, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 'irlan0\x00'}) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) creat(0x0, 0x0) 23:11:17 executing program 3: readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 206.994424][ T23] audit: type=1800 audit(1572909077.806:38): pid=9746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16634 res=0 23:11:17 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 207.026069][ T23] audit: type=1800 audit(1572909077.806:39): pid=9749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16625 res=0 23:11:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x29, 0xf, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r1, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) r2 = gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x2, 0x40, 0x77, 0x0, 0x8001, 0x80402, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1000, 0x9, 0x0, 0x4, 0x4, 0x1000, 0xff}, r2, 0x9, 0xffffffffffffffff, 0x1) r3 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x24000001) r4 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x24000001) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYRESDEC=r7, @ANYRESOCT=0x0, @ANYRESDEC, @ANYBLOB="484ca07a00a3e2c31b0a6a08ccc24455df11a5de12367ff1bf938c6d140ae000bd412ac690aff9773b2746c2d5fe8afeae0e6d872e49dc04b55f2fc0244bff02c65f3dc00cdf5cfdcc4cc7658993718f7dccbfc95fff839d71944f4986f61e84bae11a58561a8d48311cd9f8c4c5f88697945fcb71797dd72ff29c346518f16e8d79810a7f5f2a13b58e40423abdc1a90382545cfedd27ca0e01ed13e74da41be1bed84257e1c1e94df0f44ca317a2e0d802e1cc05690dd61cce888482e89c877ba26e66d1bd0132ffd24ae253fb70ed28534d1cb33f1f51a3e1c90ea2dc4486e2e92149f3e380e7ba7406b2", @ANYRES32, @ANYBLOB, @ANYRESDEC=r5, @ANYRESHEX, @ANYPTR64, @ANYRES64=0x0], 0x165) write$cgroup_subtree(r6, &(0x7f0000000780)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c4655122061e308ec79d0c81e240ae00adc42506f9b54c20fe51c8e52a8cbfeef7343e81e3ee79c09bc7d7bef9af3400f39f64782aa261c42bcacd68005dcf5d813a7045f6b58aeecd"], 0x5d) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) recvmsg(r0, &(0x7f000000c0c0)={0x0, 0x0, 0x0}, 0x40) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0xfffffff8, 0xdc, &(0x7f00000002c0)=""/220, 0x41000, 0x0, [], 0x0, 0x11, r8, 0x8, &(0x7f00000003c0), 0x8, 0x10, 0x0}, 0x70) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r9, &(0x7f0000000100), 0xda4fff08) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='pids.current\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) recvmsg$kcm(r10, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000680)=[{0x0}], 0x1, &(0x7f0000000840)=""/221, 0xdd}, 0x1) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x660c, 0x0) 23:11:18 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, 0x0, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:18 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) [ 207.340435][ T23] audit: type=1800 audit(1572909078.156:40): pid=9770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16625 res=0 23:11:18 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x4) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000842}, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') ptrace$peekuser(0x3, 0x0, 0x4) r4 = open(0x0, 0x0, 0x0) bind$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) creat(0x0, 0x0) epoll_create1(0x0) 23:11:18 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:18 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) [ 207.833892][ T23] audit: type=1800 audit(1572909078.616:41): pid=9788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16582 res=0 23:11:18 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 207.971030][ T23] audit: type=1800 audit(1572909078.776:42): pid=9796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16636 res=0 23:11:19 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, 0x0, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 23:11:19 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:19 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x4) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000842}, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)='4', 0x4100) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') ptrace$peekuser(0x3, 0x0, 0x4) r4 = open(0x0, 0x0, 0x0) bind$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) creat(0x0, 0x0) epoll_create1(0x0) 23:11:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000540)={0x1fe, 0x0, &(0x7f0000ffd000/0x2000)=nil}) [ 208.773444][ T23] audit: type=1800 audit(1572909079.586:43): pid=9828 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16636 res=0 23:11:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fcntl$setstatus(r0, 0x4, 0x8c0ab91d6f0278b4) sync() socketpair$unix(0x1, 0x0, 0x0, 0x0) sync() ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000400)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000530ff8)=0x4) shutdown(r3, 0x1) setsockopt$inet6_tcp_int(r3, 0x6, 0x19, &(0x7f000093a000), 0x4) recvfrom$inet6(r3, &(0x7f0000000440)=""/198, 0xc6, 0x4f2c8f9bdeb74d8c, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @empty, 0x81}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:19 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, 0x0, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='vboxnet1\x00') 23:11:20 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 209.578246][ T9855] NFS: bad mount option value specified: vboxnet1 [ 209.644263][ T9860] NFS: bad mount option value specified: vboxnet1 23:11:20 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) 23:11:20 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000013) 23:11:20 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = gettid() rt_tgsigqueueinfo(0x0, r1, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r0, &(0x7f0000000700)=""/128, 0xfc25) 23:11:21 executing program 4: r0 = memfd_create(&(0x7f0000000180)='vboxnet0]cpusetselfeth0', 0x0) write(r0, &(0x7f0000002000)='5', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, '.m4\x00'}, 0x58) 23:11:21 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x48) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:21 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x42581, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f00000001c0)={{}, "", [[], []]}, 0x220) [ 236.295798][ T1076] INFO: task khugepaged:1083 blocked for more than 143 seconds. [ 236.303496][ T1076] Not tainted 5.4.0-rc5-next-20191031 #0 [ 236.309704][ T1076] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 236.318401][ T1076] khugepaged D27840 1083 2 0x80004000 [ 236.324858][ T1076] Call Trace: [ 236.328271][ T1076] __schedule+0x94a/0x1e70 [ 236.332708][ T1076] ? __sched_text_start+0x8/0x8 [ 236.337694][ T1076] ? blk_insert_cloned_request+0x530/0x530 [ 236.343546][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 [ 236.348806][ T1076] ? __lock_page+0x3d9/0xab0 [ 236.353395][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 [ 236.358660][ T1076] schedule+0xdc/0x2b0 [ 236.362730][ T1076] io_schedule+0x1c/0x70 [ 236.367028][ T1076] __lock_page+0x422/0xab0 [ 236.371475][ T1076] ? wait_on_page_bit+0xa60/0xa60 [ 236.376626][ T1076] ? page_cache_next_miss+0x340/0x340 [ 236.382008][ T1076] ? ___might_sleep+0x163/0x2c0 [ 236.386909][ T1076] ? __might_sleep+0x95/0x190 [ 236.391605][ T1076] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 236.397474][ T1076] ? mpage_process_page_bufs+0x780/0x780 [ 236.403105][ T1076] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 236.408708][ T1076] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 236.414743][ T1076] ? __kmalloc_node+0xf/0x70 [ 236.419417][ T1076] ext4_writepages+0x954/0x2e70 [ 236.424381][ T1076] ? __this_cpu_preempt_check+0x2c/0x190 [ 236.430084][ T1076] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 236.435619][ T1076] ? 0xffffffff81000000 [ 236.439789][ T1076] ? mark_lock+0xc2/0x1220 [ 236.444245][ T1076] ? prep_new_page+0x19f/0x200 [ 236.449072][ T1076] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 236.455048][ T1076] ? find_held_lock+0x35/0x130 [ 236.459958][ T1076] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 236.466032][ T1076] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 236.471509][ T1076] do_writepages+0xfa/0x2a0 [ 236.476080][ T1076] ? do_writepages+0xfa/0x2a0 [ 236.480793][ T1076] ? lock_downgrade+0x920/0x920 [ 236.485773][ T1076] ? page_writeback_cpu_online+0x20/0x20 [ 236.491409][ T1076] ? __kasan_check_read+0x11/0x20 [ 236.496501][ T1076] ? do_raw_spin_unlock+0x57/0x270 [ 236.501677][ T1076] ? _raw_spin_unlock+0x28/0x40 [ 236.506575][ T1076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.512814][ T1076] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 236.518893][ T1076] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 236.524614][ T1076] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 236.530760][ T1076] ? lockdep_hardirqs_on+0x421/0x5e0 [ 236.536208][ T1076] filemap_flush+0x24/0x30 [ 236.540626][ T1076] collapse_file+0x36b1/0x41a0 [ 236.545387][ T1076] ? khugepaged+0x21c0/0x4360 [ 236.550110][ T1076] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 236.558225][ T1076] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 236.564816][ T1076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 236.570580][ T1076] ? khugepaged_find_target_node+0x142/0x180 [ 236.576607][ T1076] khugepaged+0x2da9/0x4360 [ 236.581112][ T1076] ? __kasan_check_read+0x11/0x20 [ 236.586188][ T1076] ? __lock_acquire+0x16f2/0x4a00 [ 236.591475][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 [ 236.596823][ T1076] ? finish_task_switch+0x147/0x750 [ 236.602030][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 [ 236.607298][ T1076] ? lockdep_hardirqs_on+0x421/0x5e0 [ 236.612601][ T1076] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 236.619275][ T1076] ? lock_downgrade+0x920/0x920 [ 236.624147][ T1076] ? finish_wait+0x260/0x260 [ 236.628787][ T1076] ? lockdep_hardirqs_on+0x421/0x5e0 [ 236.634071][ T1076] ? trace_hardirqs_on+0x67/0x240 [ 236.639144][ T1076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 236.645382][ T1076] ? __kthread_parkme+0x108/0x1c0 [ 236.650445][ T1076] ? __kasan_check_read+0x11/0x20 [ 236.655474][ T1076] kthread+0x361/0x430 [ 236.659672][ T1076] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 236.665336][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 236.671097][ T1076] ret_from_fork+0x24/0x30 [ 236.675675][ T1076] [ 236.675675][ T1076] Showing all locks held in the system: [ 236.683410][ T1076] 4 locks held by kworker/u4:2/102: [ 236.688649][ T1076] #0: ffff8880a7ed2928 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 [ 236.698772][ T1076] #1: ffff8880a961fdc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 236.710459][ T1076] #2: ffff88809ac200d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 236.719966][ T1076] #3: ffff88809ac22990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 236.729818][ T1076] 1 lock held by khungtaskd/1076: [ 236.734828][ T1076] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 236.744256][ T1076] 1 lock held by khugepaged/1083: [ 236.749316][ T1076] #0: ffff88809ac22990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 236.759215][ T1076] 2 locks held by rsyslogd/8824: [ 236.764144][ T1076] #0: ffff8880a47036a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 236.772785][ T1076] #1: ffffffff88fa0ef8 (log_wait.lock){-.-.}, at: is_bpf_text_address+0x0/0x160 [ 236.781957][ T1076] 2 locks held by getty/8914: [ 236.786694][ T1076] #0: ffff88809fcf5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.795740][ T1076] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.805421][ T1076] 2 locks held by getty/8915: [ 236.810137][ T1076] #0: ffff8880948cc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.819172][ T1076] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.828792][ T1076] 2 locks held by getty/8916: [ 236.833453][ T1076] #0: ffff8880a3c57090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.842453][ T1076] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.852053][ T1076] 2 locks held by getty/8917: [ 236.856785][ T1076] #0: ffff8880a8e17090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.865820][ T1076] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.875396][ T1076] 2 locks held by getty/8918: [ 236.880119][ T1076] #0: ffff88809996d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.889131][ T1076] #1: ffffc90005f3f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.898763][ T1076] 2 locks held by getty/8919: [ 236.903471][ T1076] #0: ffff888094a3c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.912477][ T1076] #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.922085][ T1076] 2 locks held by getty/8920: [ 236.926867][ T1076] #0: ffff8880986ec090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 236.935948][ T1076] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 236.945525][ T1076] 2 locks held by syz-executor.1/9838: [ 236.951029][ T1076] #0: ffff88809ac200d8 (&type->s_umount_key#32){++++}, at: iterate_supers+0xe2/0x290 [ 236.960628][ T1076] #1: ffff8880a2eba6c8 (&bdi->wb_switch_rwsem){+.+.}, at: sync_inodes_sb+0x1a5/0xb50 [ 236.970231][ T1076] 2 locks held by syz-executor.1/9839: [ 236.975724][ T1076] #0: ffff88809ac200d8 (&type->s_umount_key#32){++++}, at: iterate_supers+0xe2/0x290 [ 236.985297][ T1076] #1: ffff8880a2eba6c8 (&bdi->wb_switch_rwsem){+.+.}, at: sync_inodes_sb+0x1a5/0xb50 [ 236.994888][ T1076] 2 locks held by syz-executor.1/9844: [ 237.000389][ T1076] #0: ffff88809ac200d8 (&type->s_umount_key#32){++++}, at: iterate_supers+0xe2/0x290 [ 237.010008][ T1076] #1: ffff8880a2eba6c8 (&bdi->wb_switch_rwsem){+.+.}, at: sync_inodes_sb+0x1a5/0xb50 [ 237.019601][ T1076] 2 locks held by syz-executor.1/9846: [ 237.025030][ T1076] #0: ffff88809ac200d8 (&type->s_umount_key#32){++++}, at: iterate_supers+0xe2/0x290 [ 237.034631][ T1076] #1: ffff8880a2eba6c8 (&bdi->wb_switch_rwsem){+.+.}, at: sync_inodes_sb+0x1a5/0xb50 [ 237.044480][ T1076] [ 237.046856][ T1076] ============================================= [ 237.046856][ T1076] [ 237.055259][ T1076] NMI backtrace for cpu 1 [ 237.059636][ T1076] CPU: 1 PID: 1076 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 237.068214][ T1076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.078247][ T1076] Call Trace: [ 237.081584][ T1076] dump_stack+0x172/0x1f0 [ 237.085899][ T1076] nmi_cpu_backtrace.cold+0x70/0xb2 [ 237.091071][ T1076] ? vprintk_func+0x86/0x189 [ 237.095640][ T1076] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 237.101248][ T1076] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 237.107215][ T1076] arch_trigger_cpumask_backtrace+0x14/0x20 [ 237.113082][ T1076] watchdog+0xc8f/0x1350 [ 237.117314][ T1076] kthread+0x361/0x430 [ 237.121357][ T1076] ? reset_hung_task_detector+0x30/0x30 [ 237.126877][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 237.132587][ T1076] ret_from_fork+0x24/0x30 [ 237.137098][ T1076] Sending NMI from CPU 1 to CPUs 0: [ 237.142384][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 237.143304][ T1076] Kernel panic - not syncing: hung_task: blocked tasks [ 237.157466][ T1076] CPU: 1 PID: 1076 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 237.166039][ T1076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.176070][ T1076] Call Trace: [ 237.179350][ T1076] dump_stack+0x172/0x1f0 [ 237.183669][ T1076] panic+0x2e3/0x75c [ 237.187539][ T1076] ? add_taint.cold+0x16/0x16 [ 237.192195][ T1076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 237.197889][ T1076] ? printk_safe_flush+0xf2/0x140 [ 237.202888][ T1076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.209107][ T1076] ? nmi_trigger_cpumask_backtrace+0x224/0x28b [ 237.215234][ T1076] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 237.221362][ T1076] watchdog+0xca0/0x1350 [ 237.225592][ T1076] kthread+0x361/0x430 [ 237.229636][ T1076] ? reset_hung_task_detector+0x30/0x30 [ 237.235154][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 237.240860][ T1076] ret_from_fork+0x24/0x30 [ 237.246894][ T1076] Kernel Offset: disabled [ 237.251226][ T1076] Rebooting in 86400 seconds..