[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.791083][ T26] audit: type=1800 audit(1572927594.100:25): pid=8513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.811236][ T26] audit: type=1800 audit(1572927594.100:26): pid=8513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.863478][ T26] audit: type=1800 audit(1572927594.110:27): pid=8513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.56' (ECDSA) to the list of known hosts. 2019/11/05 04:20:05 fuzzer started 2019/11/05 04:20:07 dialing manager at 10.128.0.26:42879 2019/11/05 04:20:07 syscalls: 2566 2019/11/05 04:20:07 code coverage: enabled 2019/11/05 04:20:07 comparison tracing: enabled 2019/11/05 04:20:07 extra coverage: extra coverage is not supported by the kernel 2019/11/05 04:20:07 setuid sandbox: enabled 2019/11/05 04:20:07 namespace sandbox: enabled 2019/11/05 04:20:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 04:20:07 fault injection: enabled 2019/11/05 04:20:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 04:20:07 net packet injection: enabled 2019/11/05 04:20:07 net device setup: enabled 2019/11/05 04:20:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/05 04:20:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:22:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff50700000000000000f70000000000000950000000000000099e99031ba4c0af84cfca176fb423520d2afbdf3f9f9da24171fee230524181e591d2121ef121d08331a01f03a526ca8bd0a836931da6b47edb80fdf5a0c38acad545249ed07b8613ca8e286a4af7877d8c26eaea8b0503257a0801d209c49148eb69858844d9b3c51422b1917e8700ecccc701997f6fee61dca5cc5667ab504941f137f800425cde16fdb0ec22add0cf38e4fa3e798"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 04:22:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x40284504, &(0x7f0000000040)=0x7) syzkaller login: [ 183.556897][ T8683] IPVS: ftp: loaded support on port[0] = 21 [ 183.727253][ T8686] IPVS: ftp: loaded support on port[0] = 21 [ 183.741228][ T8683] chnl_net:caif_netlink_parms(): no params data found 04:22:02 executing program 2: r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/252, 0xfc}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x103, 0x2}, 0x80, &(0x7f0000000000), 0x1b4, &(0x7f00000002c0), 0x0, 0x1a0}, 0x0) [ 183.816042][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.824859][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.833279][ T8683] device bridge_slave_0 entered promiscuous mode [ 183.843626][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.851334][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.859444][ T8683] device bridge_slave_1 entered promiscuous mode [ 183.914746][ T8683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.954485][ T8683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.001928][ T8686] chnl_net:caif_netlink_parms(): no params data found [ 184.016545][ T8683] team0: Port device team_slave_0 added [ 184.039828][ T8683] team0: Port device team_slave_1 added [ 184.100922][ T8686] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.118059][ T8686] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.125682][ T8686] device bridge_slave_0 entered promiscuous mode 04:22:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) r1 = creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x40284504, &(0x7f0000000040)=0x7) [ 184.171155][ T8683] device hsr_slave_0 entered promiscuous mode [ 184.260594][ T8683] device hsr_slave_1 entered promiscuous mode [ 184.310629][ T8686] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.317701][ T8686] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.330049][ T8686] device bridge_slave_1 entered promiscuous mode [ 184.340592][ T8689] IPVS: ftp: loaded support on port[0] = 21 [ 184.372791][ T8691] IPVS: ftp: loaded support on port[0] = 21 [ 184.392852][ T8686] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.412464][ T8686] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:22:02 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/234, 0xea}], 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001900)={{0x100000080}, 'lort1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\xd3\xde\xb2\x00', 0xee}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x0, 0x1}, {0x80}}) [ 184.521605][ T8686] team0: Port device team_slave_0 added [ 184.545632][ T8686] team0: Port device team_slave_1 added 04:22:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) [ 184.692799][ T8686] device hsr_slave_0 entered promiscuous mode [ 184.749148][ T8686] device hsr_slave_1 entered promiscuous mode [ 184.789239][ T8686] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.798235][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.805427][ T8683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.813067][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.820141][ T8683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.842886][ T2662] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.853320][ T2662] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.854152][ T8694] IPVS: ftp: loaded support on port[0] = 21 [ 184.887265][ T8696] IPVS: ftp: loaded support on port[0] = 21 [ 184.940048][ T8691] chnl_net:caif_netlink_parms(): no params data found [ 184.993640][ T8689] chnl_net:caif_netlink_parms(): no params data found [ 185.076891][ T8691] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.084670][ T8691] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.094817][ T8691] device bridge_slave_0 entered promiscuous mode [ 185.102648][ T8691] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.109767][ T8691] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.117295][ T8691] device bridge_slave_1 entered promiscuous mode [ 185.159469][ T8691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.171299][ T8689] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.178585][ T8689] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.186113][ T8689] device bridge_slave_0 entered promiscuous mode [ 185.195743][ T8689] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.202888][ T8689] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.210621][ T8689] device bridge_slave_1 entered promiscuous mode [ 185.234188][ T8691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.285624][ T8689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.311210][ T8691] team0: Port device team_slave_0 added [ 185.317048][ T8694] chnl_net:caif_netlink_parms(): no params data found [ 185.328260][ T8689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.343713][ T8686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.352061][ T8691] team0: Port device team_slave_1 added [ 185.409925][ T8691] device hsr_slave_0 entered promiscuous mode [ 185.448576][ T8691] device hsr_slave_1 entered promiscuous mode [ 185.488496][ T8691] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.533672][ T8689] team0: Port device team_slave_0 added [ 185.555470][ T8683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.584026][ T8689] team0: Port device team_slave_1 added [ 185.628074][ T8696] chnl_net:caif_netlink_parms(): no params data found [ 185.637070][ T8694] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.647028][ T8694] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.654953][ T8694] device bridge_slave_0 entered promiscuous mode [ 185.662859][ T8694] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.669990][ T8694] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.677730][ T8694] device bridge_slave_1 entered promiscuous mode [ 185.706182][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.714318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.744728][ T8683] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.791546][ T8689] device hsr_slave_0 entered promiscuous mode [ 185.848221][ T8689] device hsr_slave_1 entered promiscuous mode [ 185.908043][ T8689] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.916849][ T8686] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.923879][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.931639][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.955240][ T8694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.988301][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.996912][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.006922][ T2662] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.013969][ T2662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.023174][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.031851][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.040211][ T2662] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.047228][ T2662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.054775][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.064935][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.073552][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.081831][ T2662] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.088907][ T2662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.101986][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.114970][ T8694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.142329][ T8694] team0: Port device team_slave_0 added [ 186.159289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.167830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.176311][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.183397][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.191092][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.199733][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.208250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.216648][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.225447][ T8696] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.232861][ T8696] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.241137][ T8696] device bridge_slave_0 entered promiscuous mode [ 186.251448][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.258591][ T8696] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.266128][ T8696] device bridge_slave_1 entered promiscuous mode [ 186.281422][ T8694] team0: Port device team_slave_1 added [ 186.288836][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.335405][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.344143][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.353167][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.362198][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.371053][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.379709][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.387872][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.396068][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.404379][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.412680][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.421218][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.431469][ T8696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.453775][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.471762][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.480860][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.489625][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.503531][ T8696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.525334][ T8686] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.536885][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.557193][ T8691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.599829][ T8694] device hsr_slave_0 entered promiscuous mode [ 186.638281][ T8694] device hsr_slave_1 entered promiscuous mode [ 186.678203][ T8694] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.686632][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.695388][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.703744][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.711144][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.726739][ T8683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.772677][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.781397][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.792826][ T8696] team0: Port device team_slave_0 added [ 186.803712][ T8691] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.821899][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.830187][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.839105][ T8696] team0: Port device team_slave_1 added [ 186.849406][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.857912][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.874287][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.881371][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.894061][ T8686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.939994][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.948586][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.957157][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.965548][ T2662] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.972624][ T2662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.980785][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.020910][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.034031][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.042965][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.053404][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.066626][ T8691] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.078536][ T8691] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.122176][ T8696] device hsr_slave_0 entered promiscuous mode [ 187.168216][ T8696] device hsr_slave_1 entered promiscuous mode [ 187.218115][ T8696] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.242128][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.264568][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.279457][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.287671][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.298723][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.306901][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.316408][ T8697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.334695][ C0] hrtimer: interrupt took 26532 ns [ 187.377475][ T8711] BPF:hdr_len not found [ 187.408194][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 187.414099][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 187.433107][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.444127][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.484243][ T8691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.514346][ T8689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.529691][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 187.535782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 187.536108][ T8694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.571957][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.582501][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.600547][ T8689] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.615393][ T8694] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.632179][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.640564][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.648284][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 187.654515][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 187.708419][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.722776][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:22:06 executing program 1: [ 187.752318][ T3115] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.759471][ T3115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.768265][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 187.774036][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:22:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000180)=""/4096) [ 187.827706][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.845667][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.882413][ T3115] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.889610][ T3115] bridge0: port 2(bridge_slave_1) entered forwarding state 04:22:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 187.958394][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.973850][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.986134][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:22:06 executing program 1: open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) [ 188.012075][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.031414][ T3115] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.038524][ T3115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.053950][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.063213][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:22:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff50700000000000000f70000000000000950000000000000099e99031ba4c0af84cfca176fb423520d2afbdf3f9f9da24171fee230524181e591d2121ef121d08331a01f03a526ca8bd0a836931da6b47edb80fdf5a0c38acad545249ed07b8613ca8e286a4af7877d8c26eaea8b0503257a0801d209c49148eb69858844d9b3c51422b1917e8700ecccc701997f6fee61dca5cc5667ab504941f137f800425cde16fdb0ec22add0cf38e4fa3e798"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 188.104864][ T8696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.122576][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 188.122590][ T26] audit: type=1804 audit(1572927726.430:31): pid=8735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir272554753/syzkaller.M3fbAQ/4/file0" dev="sda1" ino=16524 res=1 04:22:06 executing program 1: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) [ 188.180019][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.210348][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:22:06 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = getpid() setresgid(0x0, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={r5}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x3, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000440)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xc9, 0x80, 0x0, 0x800, 0x100, 0x0, "07e2b835ae3f62afc63181619a6dd31161504447b99eaaec2925094546bd519d3fa2fa88c3f3c7bc4dbf17a7e1d08e6161dceeef30f445f6d790f1e17e11d6da3e72cd894e4352a3614bcb18433c97c5f9583b4f89768a2b9aac12158ffc412186cabcff43903686f5297ef87964313a7e83fad8a28e430791e92717a3c224c4a51b6f0fec0aa10d725e1ef46aea054843641a70488b2f388e59599b2aceccd092adcff71e5e987af5cd2a347443dcf40855d95c28566cc874791d6caed33295d6d5f68da7e3d42cbd"}, 0x1e1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x180, 0x0, 0x42}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000000), 0x1c) [ 188.253565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.265664][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.283365][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.290470][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.304164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.314300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.337693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.355363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.370107][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.392565][ T8696] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.426472][ T8689] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.470448][ T8689] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.489280][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.499296][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.509826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.522282][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.533958][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.547650][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.562127][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.573373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.586317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.598396][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.606800][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.623849][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.639610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 188.645366][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:22:07 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003680)={0x8, 0x0, [{0x1, 0x47, &(0x7f0000000100)=""/71}, {0x0, 0x59, &(0x7f00000001c0)=""/89}, {0xf000, 0x1000, &(0x7f0000000400)=""/4096}, {0x106000, 0x1000, &(0x7f0000001400)=""/4096}, {0x0, 0x5e, &(0x7f0000000300)=""/94}, {0x3000, 0xb2, &(0x7f0000002400)=""/178}, {0x9800, 0x1000, &(0x7f00000024c0)=""/4096}, {0x0, 0x0, 0x0}]}) [ 188.674761][ T8694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.703895][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.758462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.774706][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.798503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.815251][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.824378][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.831541][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.840143][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.849550][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.857873][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.864962][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.872634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.882754][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.892015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.924044][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.932772][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.940601][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.948786][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.979495][ T8694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.994825][ T8689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.008595][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.015985][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.025302][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.035122][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.048608][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.057429][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.081253][ T8696] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.094394][ T8696] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.107734][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.116581][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.125576][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.134533][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.150489][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.164292][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.209409][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.226254][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.245817][ T8696] 8021q: adding VLAN 0 to HW filter on device batadv0 04:22:07 executing program 2: 04:22:07 executing program 0: 04:22:07 executing program 3: 04:22:08 executing program 5: 04:22:08 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = getpid() setresgid(0x0, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={r5}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x3, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000440)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xc9, 0x80, 0x0, 0x800, 0x100, 0x0, "07e2b835ae3f62afc63181619a6dd31161504447b99eaaec2925094546bd519d3fa2fa88c3f3c7bc4dbf17a7e1d08e6161dceeef30f445f6d790f1e17e11d6da3e72cd894e4352a3614bcb18433c97c5f9583b4f89768a2b9aac12158ffc412186cabcff43903686f5297ef87964313a7e83fad8a28e430791e92717a3c224c4a51b6f0fec0aa10d725e1ef46aea054843641a70488b2f388e59599b2aceccd092adcff71e5e987af5cd2a347443dcf40855d95c28566cc874791d6caed33295d6d5f68da7e3d42cbd"}, 0x1e1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x180, 0x0, 0x42}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000000), 0x1c) 04:22:08 executing program 4: 04:22:08 executing program 3: 04:22:08 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000004000/0x1000)=nil) remap_file_pages(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 04:22:08 executing program 2: [ 190.041952][ T8802] mmap: syz-executor.0 (8802) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 04:22:08 executing program 4: 04:22:08 executing program 3: 04:22:08 executing program 2: 04:22:08 executing program 5: 04:22:08 executing program 0: 04:22:08 executing program 4: 04:22:08 executing program 3: 04:22:09 executing program 1: 04:22:09 executing program 2: 04:22:09 executing program 5: 04:22:09 executing program 0: 04:22:09 executing program 4: 04:22:09 executing program 3: 04:22:09 executing program 2: 04:22:09 executing program 5: 04:22:09 executing program 0: 04:22:09 executing program 3: 04:22:09 executing program 1: 04:22:09 executing program 4: 04:22:09 executing program 2: 04:22:09 executing program 0: 04:22:09 executing program 5: 04:22:09 executing program 4: 04:22:09 executing program 1: 04:22:09 executing program 2: 04:22:09 executing program 3: 04:22:09 executing program 5: 04:22:09 executing program 2: 04:22:09 executing program 4: 04:22:09 executing program 0: 04:22:09 executing program 1: 04:22:09 executing program 3: 04:22:09 executing program 5: 04:22:10 executing program 4: 04:22:10 executing program 2: 04:22:10 executing program 1: 04:22:10 executing program 3: 04:22:10 executing program 0: 04:22:10 executing program 5: 04:22:10 executing program 4: 04:22:10 executing program 2: 04:22:10 executing program 3: 04:22:10 executing program 5: 04:22:10 executing program 1: 04:22:10 executing program 0: 04:22:10 executing program 4: 04:22:10 executing program 2: 04:22:10 executing program 3: 04:22:10 executing program 1: 04:22:10 executing program 0: 04:22:10 executing program 4: 04:22:10 executing program 5: 04:22:10 executing program 2: 04:22:10 executing program 0: 04:22:10 executing program 3: 04:22:10 executing program 4: 04:22:10 executing program 1: 04:22:10 executing program 5: 04:22:10 executing program 3: 04:22:10 executing program 2: 04:22:10 executing program 0: 04:22:10 executing program 5: 04:22:10 executing program 3: 04:22:11 executing program 4: 04:22:11 executing program 1: 04:22:11 executing program 2: 04:22:11 executing program 4: 04:22:11 executing program 0: 04:22:11 executing program 3: 04:22:11 executing program 5: 04:22:11 executing program 1: 04:22:11 executing program 4: 04:22:11 executing program 0: 04:22:11 executing program 5: 04:22:11 executing program 2: 04:22:11 executing program 3: 04:22:11 executing program 1: 04:22:11 executing program 0: 04:22:11 executing program 5: 04:22:11 executing program 4: 04:22:11 executing program 2: 04:22:11 executing program 3: 04:22:11 executing program 0: 04:22:11 executing program 5: 04:22:11 executing program 1: 04:22:11 executing program 4: 04:22:11 executing program 2: 04:22:11 executing program 3: 04:22:11 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:22:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000fef000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0xb205f1853db84168, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 04:22:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000fef000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000300)="0f009ce002000000653ef30f09b9590b0000b800000000ba000000000f30c4e17de3de0f08c4c11973f3b6c4e298f34e00fb0f3566b808010f00d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:22:12 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:22:12 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:22:12 executing program 3: [ 193.756693][ T8997] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 193.816423][ T9000] FS-Cache: Duplicate cookie detected [ 193.822049][ T9000] FS-Cache: O-cookie c=00000000b17935e4 [p=00000000a34e8ab9 fl=222 nc=0 na=1] [ 193.830948][ T9000] FS-Cache: O-cookie d=00000000d6f591e5 n=000000004dc09a80 [ 193.838161][ T9000] FS-Cache: O-key=[10] '0200020000807f000008' [ 193.838208][ T9000] FS-Cache: N-cookie c=00000000c2ef8fc8 [p=00000000a34e8ab9 fl=2 nc=0 na=1] [ 193.852958][ T9000] FS-Cache: N-cookie d=00000000d6f591e5 n=00000000fb5a8086 [ 193.860211][ T9000] FS-Cache: N-key=[10] '0200020000807f000008' 04:22:12 executing program 3: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffffd) poll(0x0, 0x0, 0xcdda) 04:22:12 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x10, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @empty, {[@routing={0x0, 0x15, 0x2}], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 193.933820][ T9008] FS-Cache: Duplicate cookie detected [ 193.939373][ T9008] FS-Cache: O-cookie c=00000000b17935e4 [p=00000000a34e8ab9 fl=222 nc=0 na=1] [ 193.939384][ T9008] FS-Cache: O-cookie d=00000000d6f591e5 n=000000004dc09a80 [ 193.939390][ T9008] FS-Cache: O-key=[10] '0200020000807f000008' [ 193.955723][ T9008] FS-Cache: N-cookie c=0000000014e152ab [p=00000000a34e8ab9 fl=2 nc=0 na=1] [ 193.955737][ T9008] FS-Cache: N-cookie d=00000000d6f591e5 n=00000000b2089760 [ 193.977678][ T9008] FS-Cache: N-key=[10] '0200020000807f000008' 04:22:12 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) mkdir(0x0, 0x0) 04:22:12 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081809) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) dup(0xffffffffffffffff) [ 194.199946][ T9021] FS-Cache: Duplicate cookie detected [ 194.205372][ T9021] FS-Cache: O-cookie c=000000002518a998 [p=00000000a34e8ab9 fl=222 nc=0 na=1] [ 194.214380][ T9021] FS-Cache: O-cookie d=00000000d6f591e5 n=000000005a53eb5d [ 194.221619][ T9021] FS-Cache: O-key=[10] '0200020000807f000008' [ 194.227722][ T9021] FS-Cache: N-cookie c=000000002b0b3239 [p=00000000a34e8ab9 fl=2 nc=0 na=1] [ 194.236573][ T9021] FS-Cache: N-cookie d=00000000d6f591e5 n=00000000a4e241c0 [ 194.243819][ T9021] FS-Cache: N-key=[10] '0200020000807f000008' 04:22:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) read$FUSE(r1, &(0x7f0000003140), 0x5e3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() sched_setattr(0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 04:22:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = memfd_create(0x0, 0x0) write(r1, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="3467ffebff003500006fcd5df5be3aaacf3af7b13d007f122e040000008c15eeb889aeb1cd0600002414c68700e2009356df78a948bad0e2fe11c097060035bd00000001e5cda371421c5bc70ffd4763d756655e5f5de2195d503b00bb4d5ff17b18e2fb08001b8851e5bea15f20831917ae00b91f6467cd200050d190938e67b3fd73395f7d2817a7bd8a8c2e4cfe5abd277f1b2d4df99eb7460ebe98d9a9a7647204"], 0xa3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) socket$bt_rfcomm(0x1f, 0x2, 0x3) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) getpid() getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000300)='net/tcp\x00') r3 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) socket$inet(0x2, 0x1, 0x0) r4 = socket$inet6(0xa, 0x0, 0x3a) open(0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) 04:22:12 executing program 2: socket$kcm(0x2, 0x20000000002, 0x73) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xbcd8781b067b5e83) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000c80)=[{0x0}, {&(0x7f0000000740)=""/146, 0x92}, {0x0}], 0x3}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0xffffffffffffffff, 0x11) socket$kcm(0x10, 0x0, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=""/4096, 0x1000}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d80)={r0, 0x10, &(0x7f0000000d40)={&(0x7f0000000500)=""/148, 0x94}}, 0x10) gettid() r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpua\x9d]\x00\xea\x8b\xdd./cct.usage_all\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="51c880468d1dfd8580feb0818202a38b627a2ab693fa9326"], 0x18) write$cgroup_pid(r2, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) 04:22:12 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000005e00012a69b90000000000002a016c60e7c0a5e0ec68346a1fa9213aa63000000000000000000c68edd4f698000001120000000000000000000027d8e6aa06753d982800200000792f2cd1016c84f687ad0d1fd284dc696577be49af0561e4c065ffe9ef42e83e33e7c5e2462a6a2eda1971864f9fdcb61634b93311ee7cdaae709bd19aef828e621f76445f237d785a52352115e3a8d85fde1d63a90d5a592a5517e9c587bf9b775c7ccf83389637e67c2da4e05abe8d0c38a3"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 04:22:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x4, 0x0, 0x0, 0x10000000002) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@deltaction={0x1b0, 0x31, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0xfffffff7, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe00}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x58, 0x1, [{0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x416e}}]}, @TCA_ACT_TAB={0xb4, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x18, 0x8, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0xa001}, 0x40000) 04:22:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) [ 194.869068][ T26] audit: type=1800 audit(1572927733.180:32): pid=9023 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16582 res=0 04:22:13 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='#!'], 0x2) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="092f1268ea2bbd8584ec3e2f6e60e39009a7"], 0x12) execveat(r0, &(0x7f0000000240)='\x00', 0x0, 0x0, 0x1000) 04:22:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7) [ 195.129838][ T9059] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 proc:/self/fd/3' not defined. [ 195.158451][ C0] net_ratelimit: 2 callbacks suppressed [ 195.158487][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.171705][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:22:13 executing program 3: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = inotify_init() ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) dup(r0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 195.228080][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 195.233982][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:22:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = semget$private(0x0, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, 0x0) 04:22:13 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000004040)='./file0\x00', 0x0) lstat(0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) lstat(0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 04:22:13 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 04:22:13 executing program 3: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@show_sys_files_no='show_sys_files=\no'}]}) [ 195.540752][ T9077] gfs2: can't find protocol lock_n%lock [ 195.557923][ T9085] ntfs: (device loop3): parse_options(): The show_sys_files option requires a boolean argument. 04:22:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x800000000, 0x0, 0x0, 0x0, 0x0) 04:22:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[], 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000001000)={{0x0, 0x0, 0x1}}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) [ 195.700550][ T9077] gfs2: can't find protocol lock_n%lock 04:22:14 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30006, 0x0) [ 196.104274][ T9105] XFS (loop2): Invalid superblock magic number 04:22:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x4, 0x0, 0x0, 0x10000000002) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@deltaction={0x1b0, 0x31, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0xfffffff7, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe00}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x58, 0x1, [{0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x416e}}]}, @TCA_ACT_TAB={0xb4, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x18, 0x8, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0xa001}, 0x40000) 04:22:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:14 executing program 3: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) [ 196.272049][ T9131] gfs2: can't find protocol lock_n%lock 04:22:14 executing program 3: unlink(0x0) shmget(0x3, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) mount$9p_xen(&(0x7f0000000340)='\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x40000, 0x0) pipe(0x0) 04:22:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) 04:22:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) [ 196.669230][ T9154] gfs2: can't find protocol lock_n%lock 04:22:15 executing program 3: semop(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) clock_gettime(0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000440)="1eead01e0ff20958206c115b6fb829264090192599a4003680fadb8e221137b41e013252d57dc9b841ffbf048869eaece4dcfa55b0e851d87215af2a2881ea3190323c99a3b09b9109b66d5689c6acbe98103c49034fa4a0a066587a8462d88986490ddd8a6656de5f13fae83c741b8b2bb67cb91b087076dbc3919a0e70df674e23289585d82ac51ff362ea56f3b44d36b713d42ed763b48ed99fd306258279937561b5956dbb6aecc9eb1d28d25459de4911c957bb2c30816a87d7fa1c8d4ce72061a7d2c7db3a2700f528a96dc003bca903677b72b5a1a06c68") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, &(0x7f0000000bc0)=""/203) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x84480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78e, 0x0, @perf_bp={&(0x7f00000002c0), 0x17}, 0x12400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000780)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000880)=0xc) 04:22:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f00000001c0)) [ 196.866363][ T9168] devpts: called with bogus options 04:22:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:15 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30006, 0x0) [ 197.089606][ T9181] gfs2: can't find protocol lock_n%lock [ 197.238382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 197.245086][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 197.310588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.317995][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:22:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x4, 0x0, 0x0, 0x10000000002) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@deltaction={0x1b0, 0x31, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0xfffffff7, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe00}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x58, 0x1, [{0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x416e}}]}, @TCA_ACT_TAB={0xb4, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x18, 0x8, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0xa001}, 0x40000) 04:22:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') [ 197.389586][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.397377][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:22:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x4, 0x4) 04:22:17 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6088, 0x1) 04:22:17 executing program 5: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) 04:22:17 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30006, 0x0) 04:22:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) 04:22:17 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000300)=@un=@abs, 0x80) 04:22:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x0, 0x9}, 0x0, 0x1}) 04:22:17 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) 04:22:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = eventfd2(0x0, 0x0) poll(&(0x7f00000000c0)=[{r3}, {r4}], 0x2, 0x100) 04:22:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000053c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001400)="bae0b051bb094b239fd563e0dcd118fd", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) 04:22:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000300)) 04:22:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1, &(0x7f0000000100)}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:21 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00\x00\x00\x00\x00\b\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x4a) recvmmsg(r0, &(0x7f0000002300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/34, 0x22}}], 0x1, 0x0, 0x0) [ 202.862284][ T9304] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 04:22:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6b363f0ffd8f0040f18a35a15c3ac24", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:23 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003680)={0x5, 0x0, [{0x1, 0x47, &(0x7f0000000100)=""/71}, {0x1000, 0x59, &(0x7f00000001c0)=""/89}, {0x0, 0x6b, &(0x7f0000000280)=""/107}, {0xf000, 0x1000, &(0x7f0000000400)=""/4096}, {0x0, 0x0, 0x0}]}) 04:22:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lockproto=lock_n%lock,locktable=v']) 04:22:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r3, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) 04:22:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003680)={0x300, 0x0, [{0x0, 0x47, &(0x7f0000000100)=""/71}, {0x0, 0x59, &(0x7f00000001c0)=""/89}, {0x0, 0x6b, &(0x7f0000000280)=""/107}, {0x0, 0x1000, &(0x7f0000000400)=""/4096}, {0x0, 0x1000, &(0x7f0000001400)=""/4096}, {0x0, 0xb2, &(0x7f0000002400)=""/178}, {0x0, 0x1000, &(0x7f00000024c0)=""/4096}, {0x0, 0xc9, &(0x7f00000034c0)=""/201}]}) 04:22:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r3, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) 04:22:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003680)={0x6, 0x0, [{0x0, 0x47, &(0x7f0000000100)=""/71}, {0x1000, 0x59, &(0x7f00000001c0)=""/89}, {0x0, 0x6b, &(0x7f0000000280)=""/107}, {0xf000, 0x1000, &(0x7f0000000400)=""/4096}, {0x106000, 0x1000, &(0x7f0000001400)=""/4096}, {0x0, 0x0, 0x0}]}) 04:22:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:23 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003680)={0x7, 0x0, [{0x0, 0x47, &(0x7f0000000100)=""/71}, {0x1000, 0x59, &(0x7f00000001c0)=""/89}, {0x0, 0x6b, &(0x7f0000000280)=""/107}, {0xf000, 0x1000, &(0x7f0000000400)=""/4096}, {0x106000, 0x1000, &(0x7f0000001400)=""/4096}, {0x3000, 0xb2, &(0x7f0000002400)=""/178}, {0x0, 0x0, 0x0}]}) [ 205.650002][ T9343] gfs2: not a GFS2 filesystem 04:22:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6b363f0ffd8f0040f18a35a15c3ac24", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r3, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) 04:22:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) r2 = dup3(r0, r1, 0x0) socket(0x2, 0x2, 0x2) ioctl$TIOCGPTLCK(r2, 0x80045439, 0x0) 04:22:26 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) msgget(0x0, 0x68) [ 208.440967][ T9367] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 04:22:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r3, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) [ 208.491245][ T9373] gfs2: not a GFS2 filesystem 04:22:26 executing program 5: getpid() ptrace(0x10, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) pipe2(0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x262) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="0c000000bc002af9471c99365ccb74eb79ed84d61ecad0b2b3f5aa980b965668309b94734af0ed0dde09f1bd1351def97c8482913cff380eda714ef91c0cf3325bd6a5b06db0140c613f4d1219a0eb67c2648c3a2e66e88e6ce1cf3a7ecdfffbf8fb610f5faa300a06"], 0x1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') socket$inet6(0xa, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 04:22:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) [ 208.924854][ T9416] gfs2: not a GFS2 filesystem 04:22:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045518, &(0x7f0000000040)) 04:22:29 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000000)=""/47, 0x2f) 04:22:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6b363f0ffd8f0040f18a35a15c3ac24", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 04:22:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) 04:22:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="2058d073df47f91f9ac9786650a3dc57", 0x10}], 0x1}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, 0x0, 0xbf}, 0x0) 04:22:29 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)) getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 211.573604][ T9437] gfs2: not a GFS2 filesystem [ 215.628782][ T1073] INFO: task khugepaged:1086 blocked for more than 143 seconds. [ 215.636577][ T1073] Not tainted 5.4.0-rc5-next-20191031 #0 [ 215.643121][ T1073] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 215.651834][ T1073] khugepaged D27224 1086 2 0x80004000 [ 215.658224][ T1073] Call Trace: [ 215.661518][ T1073] __schedule+0x94a/0x1e70 [ 215.665929][ T1073] ? __sched_text_start+0x8/0x8 [ 215.670811][ T1073] ? blk_insert_cloned_request+0x530/0x530 [ 215.676622][ T1073] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.681982][ T1073] ? __lock_page+0x3d9/0xab0 [ 215.686565][ T1073] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.691816][ T1073] schedule+0xdc/0x2b0 [ 215.695884][ T1073] io_schedule+0x1c/0x70 [ 215.700170][ T1073] __lock_page+0x422/0xab0 [ 215.704580][ T1073] ? wait_on_page_bit+0xa60/0xa60 [ 215.709718][ T1073] ? page_cache_next_miss+0x340/0x340 [ 215.715079][ T1073] ? ___might_sleep+0x163/0x2c0 [ 215.720000][ T1073] ? __might_sleep+0x95/0x190 [ 215.724680][ T1073] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 215.730547][ T1073] ? mpage_process_page_bufs+0x780/0x780 [ 215.736169][ T1073] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 215.741783][ T1073] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 215.747755][ T1073] ? __kmalloc_node+0xf/0x70 [ 215.753031][ T1073] ext4_writepages+0x954/0x2e70 [ 215.758097][ T1073] ? assoc_array_gc+0x1430/0x1440 [ 215.763135][ T1073] ? retint_kernel+0x2b/0x2b [ 215.767719][ T1073] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 215.773199][ T1073] ? 0xffffffff81000000 [ 215.777364][ T1073] ? mark_lock+0xc2/0x1220 [ 215.781857][ T1073] ? prep_new_page+0x19f/0x200 [ 215.786623][ T1073] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 215.792759][ T1073] ? find_held_lock+0x35/0x130 [ 215.797516][ T1073] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 215.803541][ T1073] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 215.809129][ T1073] do_writepages+0xfa/0x2a0 [ 215.813622][ T1073] ? do_writepages+0xfa/0x2a0 [ 215.818356][ T1073] ? lock_downgrade+0x920/0x920 [ 215.823324][ T1073] ? page_writeback_cpu_online+0x20/0x20 [ 215.829004][ T1073] ? __kasan_check_read+0x11/0x20 [ 215.834017][ T1073] ? do_raw_spin_unlock+0x57/0x270 [ 215.839194][ T1073] ? _raw_spin_unlock+0x28/0x40 [ 215.844034][ T1073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.850302][ T1073] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 215.856301][ T1073] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 215.862101][ T1073] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 215.868272][ T1073] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.873545][ T1073] filemap_flush+0x24/0x30 [ 215.878886][ T1073] collapse_file+0x36b1/0x41a0 [ 215.883645][ T1073] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 215.889829][ T1073] ? khugepaged+0x21c0/0x4360 [ 215.894497][ T1073] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 215.902713][ T1073] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 215.908489][ T1073] ? khugepaged_find_target_node+0x142/0x180 [ 215.914460][ T1073] khugepaged+0x2da9/0x4360 [ 215.919018][ T1073] ? __kasan_check_read+0x11/0x20 [ 215.924030][ T1073] ? __lock_acquire+0x16f2/0x4a00 [ 215.929087][ T1073] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.934276][ T1073] ? finish_task_switch+0x147/0x750 [ 215.939520][ T1073] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.944707][ T1073] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.950249][ T1073] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 215.955872][ T1073] ? lock_downgrade+0x920/0x920 [ 215.960772][ T1073] ? finish_wait+0x260/0x260 [ 215.965358][ T1073] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.970669][ T1073] ? trace_hardirqs_on+0x67/0x240 [ 215.975793][ T1073] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 215.982108][ T1073] ? __kthread_parkme+0x108/0x1c0 [ 215.987138][ T1073] ? __kasan_check_read+0x11/0x20 [ 215.992201][ T1073] kthread+0x361/0x430 [ 215.996283][ T1073] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 216.001956][ T1073] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.007673][ T1073] ret_from_fork+0x24/0x30 [ 216.012821][ T1073] [ 216.012821][ T1073] Showing all locks held in the system: [ 216.020679][ T1073] 4 locks held by kworker/u4:3/242: [ 216.025863][ T1073] #0: ffff8880a7cfe928 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 [ 216.035993][ T1073] #1: ffff8880a9307dc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 216.047355][ T1073] #2: ffff88809ac1a0d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 216.056852][ T1073] #3: ffff88809ac1c990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 216.066704][ T1073] 1 lock held by khungtaskd/1073: [ 216.071756][ T1073] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 216.081091][ T1073] 1 lock held by khugepaged/1086: [ 216.086088][ T1073] #0: ffff88809ac1c990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 216.096076][ T1073] 2 locks held by rs:main Q:Reg/8549: [ 216.101511][ T1073] #0: ffff8880ae934d58 (&rq->lock){-.-.}, at: newidle_balance+0xa28/0xe80 [ 216.110204][ T1073] #1: ffffffff88faba40 (rcu_read_lock){....}, at: update_curr+0x2ea/0x8d0 [ 216.118972][ T1073] 1 lock held by rsyslogd/8551: [ 216.123809][ T1073] #0: ffff8880997506a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 216.132492][ T1073] 2 locks held by getty/8641: [ 216.137198][ T1073] #0: ffff8880a05cd090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.146790][ T1073] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.156394][ T1073] 2 locks held by getty/8642: [ 216.161088][ T1073] #0: ffff8880a296a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.170064][ T1073] #1: ffffc90005f152e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.179670][ T1073] 2 locks held by getty/8643: [ 216.184324][ T1073] #0: ffff8880a747c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.193278][ T1073] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.202906][ T1073] 2 locks held by getty/8644: [ 216.207552][ T1073] #0: ffff8880a70b1090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.216508][ T1073] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.226091][ T1073] 2 locks held by getty/8645: [ 216.230895][ T1073] #0: ffff888098997090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.239902][ T1073] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.249496][ T1073] 2 locks held by getty/8646: [ 216.254152][ T1073] #0: ffff8880a0b55090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.263151][ T1073] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.273652][ T1073] 2 locks held by getty/8647: [ 216.278369][ T1073] #0: ffff8880a16cc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.287312][ T1073] #1: ffffc90005f012e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.296912][ T1073] 1 lock held by syz-executor.5/9396: [ 216.302298][ T1073] #0: ffff88809ac1a0d8 (&type->s_umount_key#32){++++}, at: do_mount+0xec2/0x1b50 [ 216.311568][ T1073] [ 216.313881][ T1073] ============================================= [ 216.313881][ T1073] [ 216.322408][ T1073] NMI backtrace for cpu 0 [ 216.326727][ T1073] CPU: 0 PID: 1073 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.335281][ T1073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.345318][ T1073] Call Trace: [ 216.348584][ T1073] dump_stack+0x172/0x1f0 [ 216.352888][ T1073] nmi_cpu_backtrace.cold+0x70/0xb2 [ 216.358059][ T1073] ? vprintk_func+0x86/0x189 [ 216.362623][ T1073] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 216.368229][ T1073] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 216.374200][ T1073] arch_trigger_cpumask_backtrace+0x14/0x20 [ 216.380124][ T1073] watchdog+0xc8f/0x1350 [ 216.384345][ T1073] kthread+0x361/0x430 [ 216.388388][ T1073] ? reset_hung_task_detector+0x30/0x30 [ 216.393903][ T1073] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.399606][ T1073] ret_from_fork+0x24/0x30 [ 216.404183][ T1073] Sending NMI from CPU 0 to CPUs 1: [ 216.409679][ C1] NMI backtrace for cpu 1 [ 216.409684][ C1] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.409690][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.409693][ C1] Workqueue: bat_events batadv_nc_worker [ 216.409699][ C1] RIP: 0010:find_held_lock+0x6/0x130 [ 216.409708][ C1] Code: e9 91 fc ff ff 4c 89 f7 48 89 75 d0 e8 13 77 56 00 48 8b 75 d0 e9 08 fd ff ff 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 <44> 8d 7a ff 41 56 49 89 f6 49 63 c7 41 55 48 8d 04 80 41 54 4c 8d [ 216.409712][ C1] RSP: 0018:ffff8880a988fbe8 EFLAGS: 00000006 [ 216.409719][ C1] RAX: 0000000000000000 RBX: 1ffff11015311f85 RCX: ffff8880a988fc68 [ 216.409723][ C1] RDX: 0000000000000003 RSI: ffffffff88faba40 RDI: ffff8880a98801c0 [ 216.409727][ C1] RBP: ffff8880a988fbf0 R08: 0000000000000003 R09: ffff8880a9880a58 [ 216.409732][ C1] R10: fffffbfff1390778 R11: ffffffff89c83bc7 R12: ffffffff88faba40 [ 216.409736][ C1] R13: ffffffff873b88ca R14: ffff8880a988fca8 R15: ffff8880a98801c0 [ 216.409741][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 216.409745][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 216.409749][ C1] CR2: 00007f3a0bd05000 CR3: 00000000a77e4000 CR4: 00000000001406e0 [ 216.409754][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 216.409758][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 216.409761][ C1] Call Trace: [ 216.409764][ C1] lock_release+0x254/0x960 [ 216.409767][ C1] ? lock_downgrade+0x920/0x920 [ 216.409770][ C1] ? batadv_nc_worker+0xe3/0x760 [ 216.409773][ C1] ? __kasan_check_read+0x11/0x20 [ 216.409777][ C1] batadv_nc_worker+0x220/0x760 [ 216.409780][ C1] process_one_work+0x9af/0x1740 [ 216.409783][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 216.409786][ C1] ? lock_acquire+0x190/0x410 [ 216.409789][ C1] worker_thread+0x98/0xe40 [ 216.409792][ C1] kthread+0x361/0x430 [ 216.409795][ C1] ? process_one_work+0x1740/0x1740 [ 216.409799][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.409802][ C1] ret_from_fork+0x24/0x30 [ 216.411231][ T1073] Kernel panic - not syncing: hung_task: blocked tasks [ 216.620886][ T1073] CPU: 0 PID: 1073 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.629441][ T1073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.639464][ T1073] Call Trace: [ 216.642734][ T1073] dump_stack+0x172/0x1f0 [ 216.647040][ T1073] panic+0x2e3/0x75c [ 216.650906][ T1073] ? add_taint.cold+0x16/0x16 [ 216.655564][ T1073] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 216.661168][ T1073] ? ___preempt_schedule+0x16/0x18 [ 216.666253][ T1073] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 216.672382][ T1073] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 216.678525][ T1073] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 216.684650][ T1073] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 216.690775][ T1073] watchdog+0xca0/0x1350 [ 216.694994][ T1073] kthread+0x361/0x430 [ 216.699033][ T1073] ? reset_hung_task_detector+0x30/0x30 [ 216.704553][ T1073] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.710243][ T1073] ret_from_fork+0x24/0x30 [ 216.716012][ T1073] Kernel Offset: disabled [ 216.720345][ T1073] Rebooting in 86400 seconds..