[ 35.159104][ T23] audit: type=1800 audit(1571183238.281:25): pid=7051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.193730][ T23] audit: type=1800 audit(1571183238.281:26): pid=7051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.213748][ T23] audit: type=1800 audit(1571183238.281:27): pid=7051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 35.765014][ T7116] sshd (7116) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.164' (ECDSA) to the list of known hosts. 2019/10/15 23:47:29 fuzzer started 2019/10/15 23:47:31 dialing manager at 10.128.0.105:34737 2019/10/15 23:47:31 syscalls: 2524 2019/10/15 23:47:31 code coverage: enabled 2019/10/15 23:47:31 comparison tracing: enabled 2019/10/15 23:47:31 extra coverage: extra coverage is not supported by the kernel 2019/10/15 23:47:31 setuid sandbox: enabled 2019/10/15 23:47:31 namespace sandbox: enabled 2019/10/15 23:47:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 23:47:31 fault injection: enabled 2019/10/15 23:47:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 23:47:31 net packet injection: enabled 2019/10/15 23:47:31 net device setup: enabled 2019/10/15 23:47:31 concurrency sanitizer: enabled 23:47:32 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) syzkaller login: [ 50.026994][ T7221] IPVS: ftp: loaded support on port[0] = 21 23:47:33 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 50.143667][ T7221] chnl_net:caif_netlink_parms(): no params data found [ 50.230490][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.254392][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.262516][ T7221] device bridge_slave_0 entered promiscuous mode [ 50.285595][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.295605][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.303700][ T7221] device bridge_slave_1 entered promiscuous mode [ 50.319494][ T7224] IPVS: ftp: loaded support on port[0] = 21 23:47:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) [ 50.347899][ T7221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.371076][ T7221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.448640][ T7221] team0: Port device team_slave_0 added [ 50.484039][ T7221] team0: Port device team_slave_1 added [ 50.552216][ T7224] chnl_net:caif_netlink_parms(): no params data found [ 50.627749][ T7221] device hsr_slave_0 entered promiscuous mode 23:47:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x561], [0xc1]}) [ 50.675522][ T7221] device hsr_slave_1 entered promiscuous mode [ 50.753091][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.760214][ T7221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.767678][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.774837][ T7221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.801117][ T7228] IPVS: ftp: loaded support on port[0] = 21 [ 50.861057][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.868560][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.878474][ T7224] device bridge_slave_0 entered promiscuous mode [ 50.913036][ T7221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.936367][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.943446][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.952174][ T7224] device bridge_slave_1 entered promiscuous mode [ 50.975638][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 50.976488][ T7221] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.989414][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.000374][ T7225] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.019085][ T7225] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.028871][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.075478][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.086449][ T7225] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.093514][ T7225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.102301][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.112301][ T7225] bridge0: port 2(bridge_slave_1) entered blocking state 23:47:34 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) [ 51.119388][ T7225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.141489][ T7224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.186254][ T7224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.203714][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 51.225632][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.258989][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.286468][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.306024][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.339285][ T7224] team0: Port device team_slave_0 added [ 51.362220][ T7221] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 51.373612][ T7221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.388117][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.397217][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.408253][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.417889][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.429011][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.448569][ T7224] team0: Port device team_slave_1 added [ 51.498254][ T7234] IPVS: ftp: loaded support on port[0] = 21 23:47:34 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) [ 51.617513][ T7224] device hsr_slave_0 entered promiscuous mode [ 51.654685][ T7224] device hsr_slave_1 entered promiscuous mode [ 51.724535][ T7224] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.735201][ T7228] chnl_net:caif_netlink_parms(): no params data found [ 51.790196][ T7221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.791447][ T7237] IPVS: ftp: loaded support on port[0] = 21 [ 51.854235][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.861477][ T7228] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.869606][ T7228] device bridge_slave_0 entered promiscuous mode [ 51.880378][ T7231] chnl_net:caif_netlink_parms(): no params data found [ 51.908889][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.916247][ T7228] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.924024][ T7228] device bridge_slave_1 entered promiscuous mode [ 51.948920][ T7228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.966353][ T7228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.018605][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.025845][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.033806][ T7231] device bridge_slave_0 entered promiscuous mode [ 52.059274][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.066542][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.074749][ T7231] device bridge_slave_1 entered promiscuous mode 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.107137][ T7228] team0: Port device team_slave_0 added [ 52.143498][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.185066][ T7228] team0: Port device team_slave_1 added [ 52.207425][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.259988][ T7231] team0: Port device team_slave_0 added [ 52.268394][ T7231] team0: Port device team_slave_1 added [ 52.280224][ T7224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.318656][ T7224] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.343231][ T7234] chnl_net:caif_netlink_parms(): no params data found [ 52.360863][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.372460][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.447611][ T7231] device hsr_slave_0 entered promiscuous mode [ 52.458821][ T7231] device hsr_slave_1 entered promiscuous mode 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.514363][ T7231] debugfs: Directory 'hsr0' with parent '/' already present! 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.608488][ T7228] device hsr_slave_0 entered promiscuous mode 23:47:35 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) [ 52.685138][ T7228] device hsr_slave_1 entered promiscuous mode [ 52.714388][ T7228] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.729633][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.744081][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.756935][ T2862] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.764114][ T2862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.774192][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.787335][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.796122][ T2862] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.803178][ T2862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.811675][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.862171][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.871734][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.891104][ T7234] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.898429][ T7234] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.906547][ T7234] device bridge_slave_0 entered promiscuous mode [ 52.917584][ T7237] chnl_net:caif_netlink_parms(): no params data found [ 52.936220][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.943405][ T7234] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.951541][ T7234] device bridge_slave_1 entered promiscuous mode [ 52.958836][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.967964][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.977525][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.013158][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.021934][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.053125][ T7224] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.064512][ T7224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.084914][ T7231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.097907][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.107297][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.116100][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.124922][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.135086][ T7234] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.146224][ T7234] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.161551][ T7224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.174218][ T7231] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.184519][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.191602][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.203573][ T7237] device bridge_slave_0 entered promiscuous mode [ 53.213541][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.225210][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.232898][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.267949][ T7228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.274971][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.281988][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.290931][ T7237] device bridge_slave_1 entered promiscuous mode [ 53.309523][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.318983][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.327766][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.334944][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.343190][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.352067][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.360612][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.367726][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.376221][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.385853][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.395269][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.403982][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.419531][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.427883][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.445026][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.453960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.467018][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.476021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.492115][ T7237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.505229][ T7234] team0: Port device team_slave_0 added [ 53.518097][ T7234] team0: Port device team_slave_1 added [ 53.528353][ T7237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.538507][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.546805][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.554921][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.563466][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.573291][ T7228] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.590498][ T7231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.624101][ T7237] team0: Port device team_slave_0 added [ 53.667871][ T7237] team0: Port device team_slave_1 added [ 53.675905][ T7231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.688176][ T2862] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 53.696513][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.721790][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.732264][ T7225] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.733765][ T2862] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 53.739369][ T7225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.787675][ T7234] device hsr_slave_0 entered promiscuous mode [ 53.824831][ T7234] device hsr_slave_1 entered promiscuous mode [ 53.874454][ T7234] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.883810][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.892541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.899998][ T3500] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 53.913433][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.922411][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.929517][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.942551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.947470][ T3500] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 [ 53.952292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.975970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.989256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.998624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.007800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.017291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.058167][ T7228] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.077309][ T7228] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.094682][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 23:47:37 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 54.104168][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.135461][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.144072][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.166979][ T17] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 54.198630][ T17] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on sz1 [ 54.208275][ T7237] device hsr_slave_0 entered promiscuous mode [ 54.254908][ T7237] device hsr_slave_1 entered promiscuous mode [ 54.304499][ T7237] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.327794][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.354613][ T7228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.472285][ T7237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.496105][ T7234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.502355][ T7298] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 54.519663][ T7234] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.544399][ T7237] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.551508][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.559993][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.568136][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.576292][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.634839][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.643754][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.679741][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.686877][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.713375][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 23:47:37 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) 23:47:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x561], [0xc1]}) [ 54.762474][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.794845][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.801984][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.826737][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.864926][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.889555][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.939340][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.948103][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.955211][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.979689][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.991003][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.009754][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.016976][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.036274][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.045767][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.055276][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.064064][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.074954][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.083818][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.093596][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.101880][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.110181][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.129134][ T7237] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.140515][ T7237] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.152046][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.162116][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.171471][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.180321][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.189118][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.197723][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.206221][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.215045][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.223530][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.232164][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.240701][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.249448][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.260795][ T7234] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.272686][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.281242][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.289941][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.318672][ T7234] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.333670][ T7237] 8021q: adding VLAN 0 to HW filter on device batadv0 23:47:38 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:38 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:38 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:38 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000), 0x10) 23:47:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x561], [0xc1]}) [ 55.751205][ T3500] hid-generic 0000:0000:0000.0004: ignoring exceeding usage max [ 55.838479][ T3500] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:39 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:39 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x561], [0xc1]}) 23:47:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:39 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:39 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) [ 56.225038][ T3500] hid-generic 0000:0000:0000.0005: ignoring exceeding usage max 23:47:39 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:39 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) [ 56.349093][ T3500] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:39 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:39 executing program 3: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:39 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:39 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:39 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:39 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:40 executing program 3: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:40 executing program 3: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="15"], 0x1) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18}, 0xfc76) 23:47:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:40 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:40 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:40 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a31e30dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14e8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2aa4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:40 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:40 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) close(r0) 23:47:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000040)=""/70, 0xffa8) getdents(r0, 0x0, 0x0) 23:47:41 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a31e30dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14e8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2aa4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 58.210988][ T3500] hid-generic 0000:0000:0000.0006: ignoring exceeding usage max [ 58.240857][ T3500] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on sz1 [ 58.324105][ T3500] hid-generic 0000:0000:0000.0007: ignoring exceeding usage max [ 58.376872][ T5] hid-generic 0000:0000:0000.0008: ignoring exceeding usage max [ 58.408566][ T3500] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on sz1 [ 58.461819][ T5] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:41 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:41 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, 0x0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f0000001a80)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940ce8cbf3b07bfa6c8415f3ccd138f80ef42a4bb8e578a43389d850426f6e8ea1188fb89c8eb4efa267d6dd6c8", 0xcf}], 0x1, &(0x7f0000000180)=[@ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x1, 0xc, [{[], 0x2}]}, @rr={0x7, 0xf, 0x0, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp={0x44, 0xc, 0x98, 0x0, 0xe, [{[@remote]}]}, @ra={0x94, 0x6, 0x96}, @generic={0x88, 0x7, "dec89f3ec9"}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @empty, @rand_addr, @remote, @multicast1]}]}}}], 0x60}}], 0x3, 0x8000) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r4, 0x0, 0x7fffffa7) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r5, r1, 0x0, 0xffffffff) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) 23:47:41 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 58.671303][ T5] hid-generic 0000:0000:0000.0009: ignoring exceeding usage max [ 58.722178][ T5] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on sz1 [ 58.770702][ T3500] hid-generic 0000:0000:0000.000A: ignoring exceeding usage max 23:47:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 58.909273][ T3500] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:42 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, 0x0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f0000001a80)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940ce8cbf3b07bfa6c8415f3ccd138f80ef42a4bb8e578a43389d850426f6e8ea1188fb89c8eb4efa267d6dd6c8", 0xcf}], 0x1, &(0x7f0000000180)=[@ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x1, 0xc, [{[], 0x2}]}, @rr={0x7, 0xf, 0x0, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp={0x44, 0xc, 0x98, 0x0, 0xe, [{[@remote]}]}, @ra={0x94, 0x6, 0x96}, @generic={0x88, 0x7, "dec89f3ec9"}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @empty, @rand_addr, @remote, @multicast1]}]}}}], 0x60}}], 0x3, 0x8000) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r4, 0x0, 0x7fffffa7) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r5, r1, 0x0, 0xffffffff) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) 23:47:42 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 59.219927][ T5] hid-generic 0000:0000:0000.000B: ignoring exceeding usage max 23:47:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) 23:47:42 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 59.305209][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 59.305234][ T23] audit: type=1800 audit(1571183262.431:31): pid=7503 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16555 res=0 [ 59.344568][ T5] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a31e30dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14e8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2aa4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 59.432977][ T23] audit: type=1804 audit(1571183262.551:32): pid=7500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir412555769/syzkaller.Q0Zj0q/17/file0/file0" dev="sda1" ino=16555 res=1 [ 59.504300][ C1] hrtimer: interrupt took 45401 ns 23:47:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 59.619525][ T5] hid-generic 0000:0000:0000.000C: ignoring exceeding usage max [ 59.629789][ T23] audit: type=1804 audit(1571183262.681:33): pid=7500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir412555769/syzkaller.Q0Zj0q/17/file0/file0" dev="sda1" ino=16555 res=1 [ 59.635247][ T3500] hid-generic 0000:0000:0000.000D: ignoring exceeding usage max 23:47:42 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 59.774581][ T5] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:42 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, 0x0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f0000001a80)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940ce8cbf3b07bfa6c8415f3ccd138f80ef42a4bb8e578a43389d850426f6e8ea1188fb89c8eb4efa267d6dd6c8", 0xcf}], 0x1, &(0x7f0000000180)=[@ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x1, 0xc, [{[], 0x2}]}, @rr={0x7, 0xf, 0x0, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp={0x44, 0xc, 0x98, 0x0, 0xe, [{[@remote]}]}, @ra={0x94, 0x6, 0x96}, @generic={0x88, 0x7, "dec89f3ec9"}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @empty, @rand_addr, @remote, @multicast1]}]}}}], 0x60}}], 0x3, 0x8000) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r4, 0x0, 0x7fffffa7) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r5, r1, 0x0, 0xffffffff) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) [ 59.871121][ T3500] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on sz1 23:47:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a1db3c6a31e30dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14e8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b883a36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2aa4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 60.010646][ T3500] hid-generic 0000:0000:0000.000E: ignoring exceeding usage max 23:47:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) 23:47:43 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/235, 0xeb}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 23:47:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 60.134921][ T3500] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on sz1 [ 60.251648][ T3500] hid-generic 0000:0000:0000.000F: ignoring exceeding usage max [ 60.299648][ T23] audit: type=1800 audit(1571183263.421:34): pid=7529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16534 res=0 23:47:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 60.415839][ T3500] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on sz1 [ 60.438340][ T23] audit: type=1804 audit(1571183263.521:35): pid=7529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir412555769/syzkaller.Q0Zj0q/18/file0/file0" dev="sda1" ino=16534 res=1 23:47:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 60.597041][ T23] audit: type=1804 audit(1571183263.561:36): pid=7529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir412555769/syzkaller.Q0Zj0q/18/file0/file0" dev="sda1" ino=16534 res=1 23:47:43 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, 0x0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f0000001a80)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940ce8cbf3b07bfa6c8415f3ccd138f80ef42a4bb8e578a43389d850426f6e8ea1188fb89c8eb4efa267d6dd6c8", 0xcf}], 0x1, &(0x7f0000000180)=[@ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x1, 0xc, [{[], 0x2}]}, @rr={0x7, 0xf, 0x0, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp={0x44, 0xc, 0x98, 0x0, 0xe, [{[@remote]}]}, @ra={0x94, 0x6, 0x96}, @generic={0x88, 0x7, "dec89f3ec9"}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @empty, @rand_addr, @remote, @multicast1]}]}}}], 0x60}}], 0x3, 0x8000) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) sendfile(r1, r4, 0x0, 0x7fffffa7) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r5, r1, 0x0, 0xffffffff) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) 23:47:43 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, 0x0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f0000001a80)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940ce8cbf3b07bfa6c8415f3ccd138f80ef42a4bb8e578a43389d850426f6e8ea1188fb89c8eb4efa267d6dd6c8", 0xcf}], 0x1, &(0x7f0000000180)=[@ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x1, 0xc, [{[], 0x2}]}, @rr={0x7, 0xf, 0x0, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp={0x44, 0xc, 0x98, 0x0, 0xe, [{[@remote]}]}, @ra={0x94, 0x6, 0x96}, @generic={0x88, 0x7, "dec89f3ec9"}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @empty, @rand_addr, @remote, @multicast1]}]}}}], 0x60}}], 0x3, 0x8000) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r4, 0x0, 0x7fffffa7) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r5, r1, 0x0, 0xffffffff) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) 23:47:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) 23:47:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaead, 0x0) [ 60.905785][ T7552] ================================================================== [ 60.913932][ T7552] BUG: KCSAN: data-race in wbt_issue / wbt_issue [ 60.920246][ T7552] [ 60.922579][ T7552] write to 0xffff888129c88830 of 8 bytes by task 2493 on cpu 1: [ 60.930205][ T7552] wbt_issue+0xaf/0xf0 [ 60.934289][ T7552] __rq_qos_issue+0x4a/0x80 [ 60.938787][ T7552] blk_mq_start_request+0x32a/0x370 [ 60.943978][ T7552] loop_queue_rq+0x64/0x2b0 [ 60.948471][ T7552] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 60.953942][ T7552] blk_mq_do_dispatch_sched+0x11d/0x260 [ 60.959476][ T7552] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 60.965543][ T7552] __blk_mq_run_hw_queue+0xb7/0x160 [ 60.970728][ T7552] blk_mq_run_work_fn+0x57/0x70 [ 60.975563][ T7552] process_one_work+0x3d4/0x890 [ 60.980413][ T7552] worker_thread+0xa0/0x800 [ 60.984904][ T7552] kthread+0x1d4/0x200 [ 60.988957][ T7552] ret_from_fork+0x1f/0x30 [ 60.993349][ T7552] [ 60.995668][ T7552] write to 0xffff888129c88830 of 8 bytes by task 7552 on cpu 0: [ 61.003282][ T7552] wbt_issue+0xaf/0xf0 [ 61.007338][ T7552] __rq_qos_issue+0x4a/0x80 [ 61.011838][ T7552] blk_mq_start_request+0x32a/0x370 [ 61.017025][ T7552] loop_queue_rq+0x64/0x2b0 [ 61.021514][ T7552] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 61.026958][ T7552] blk_mq_do_dispatch_sched+0x11d/0x260 [ 61.032623][ T7552] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 61.038680][ T7552] __blk_mq_run_hw_queue+0xb7/0x160 [ 61.043874][ T7552] __blk_mq_delay_run_hw_queue+0x31b/0x3a0 [ 61.049675][ T7552] blk_mq_run_hw_queue+0x103/0x1c0 [ 61.054776][ T7552] blk_mq_sched_insert_requests+0x1ca/0x2e0 [ 61.060672][ T7552] blk_mq_flush_plug_list+0x572/0x6c0 [ 61.066029][ T7552] blk_flush_plug_list+0x271/0x2a0 [ 61.071118][ T7552] [ 61.073429][ T7552] Reported by Kernel Concurrency Sanitizer on: [ 61.079566][ T7552] CPU: 0 PID: 7552 Comm: blkid Not tainted 5.4.0-rc3+ #0 [ 61.086569][ T7552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.096604][ T7552] ================================================================== [ 61.104648][ T7552] Kernel panic - not syncing: panic_on_warn set ... [ 61.111226][ T7552] CPU: 0 PID: 7552 Comm: blkid Not tainted 5.4.0-rc3+ #0 [ 61.118229][ T7552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.128266][ T7552] Call Trace: [ 61.131551][ T7552] dump_stack+0xf5/0x159 [ 61.135782][ T7552] panic+0x210/0x640 [ 61.139685][ T7552] ? __blk_mq_delay_run_hw_queue+0x31b/0x3a0 [ 61.145670][ T7552] ? vprintk_func+0x8d/0x140 [ 61.150265][ T7552] kcsan_report.cold+0xc/0x1b [ 61.154947][ T7552] __kcsan_setup_watchpoint+0x3ee/0x510 [ 61.160504][ T7552] ? __blk_mq_get_tag+0x8d/0x220 [ 61.165447][ T7552] __tsan_write8+0x32/0x40 [ 61.169853][ T7552] wbt_issue+0xaf/0xf0 [ 61.173933][ T7552] ? wbt_wait+0x250/0x250 [ 61.178249][ T7552] __rq_qos_issue+0x4a/0x80 [ 61.182739][ T7552] blk_mq_start_request+0x32a/0x370 [ 61.187930][ T7552] loop_queue_rq+0x64/0x2b0 [ 61.192437][ T7552] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 61.197899][ T7552] ? __tsan_read8+0x2c/0x30 [ 61.202394][ T7552] ? __kcsan_setup_watchpoint+0x96/0x510 [ 61.208021][ T7552] ? _raw_spin_unlock+0x4b/0x60 [ 61.212876][ T7552] blk_mq_do_dispatch_sched+0x11d/0x260 [ 61.218443][ T7552] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 61.224675][ T7552] ? __tsan_write4+0x32/0x40 [ 61.229256][ T7552] __blk_mq_run_hw_queue+0xb7/0x160 [ 61.234442][ T7552] __blk_mq_delay_run_hw_queue+0x31b/0x3a0 [ 61.240242][ T7552] blk_mq_run_hw_queue+0x103/0x1c0 [ 61.245356][ T7552] ? dd_merged_requests+0x250/0x250 [ 61.250547][ T7552] blk_mq_sched_insert_requests+0x1ca/0x2e0 [ 61.256446][ T7552] blk_mq_flush_plug_list+0x572/0x6c0 [ 61.261823][ T7552] blk_flush_plug_list+0x271/0x2a0 [ 61.266924][ T7552] blk_finish_plug+0x60/0x84 [ 61.271502][ T7552] ? blkdev_write_begin+0x60/0x60 [ 61.276527][ T7552] read_pages+0xbc/0x2d0 [ 61.280776][ T7552] ? __kcsan_setup_watchpoint+0x96/0x510 [ 61.286425][ T7552] __do_page_cache_readahead+0x353/0x390 [ 61.292057][ T7552] force_page_cache_readahead+0x13a/0x1f0 [ 61.297771][ T7552] page_cache_sync_readahead+0x1cf/0x1e0 [ 61.303405][ T7552] generic_file_read_iter+0xeb6/0x1440 [ 61.308865][ T7552] blkdev_read_iter+0xb2/0xe0 [ 61.313533][ T7552] new_sync_read+0x389/0x4f0 [ 61.318123][ T7552] __vfs_read+0xb1/0xc0 [ 61.322280][ T7552] vfs_read+0x143/0x2c0 [ 61.326959][ T7552] ksys_read+0xd5/0x1b0 [ 61.331111][ T7552] __x64_sys_read+0x4c/0x60 [ 61.335603][ T7552] do_syscall_64+0xcc/0x370 [ 61.340098][ T7552] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.346007][ T7552] RIP: 0033:0x7f7643d83310 [ 61.350413][ T7552] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 61.370002][ T7552] RSP: 002b:00007ffddc33ee38 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 61.378396][ T7552] RAX: ffffffffffffffda RBX: 000000000002f000 RCX: 00007f7643d83310 [ 61.386354][ T7552] RDX: 0000000000000029 RSI: 0000000001877ec8 RDI: 0000000000000003 [ 61.394309][ T7552] RBP: 0000000001877ea0 R08: 0000000000000058 R09: 0101010101010101 [ 61.402264][ T7552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001872030 [ 61.410223][ T7552] R13: 0000000000000029 R14: 0000000001872080 R15: 0000000001877eb8 [ 61.419609][ T7552] Kernel Offset: disabled [ 61.423950][ T7552] Rebooting in 86400 seconds..