[?25l[?1c7[ ok 8[?25h[?0c. [ 34.171094] audit: type=1800 audit(1556531393.680:33): pid=6895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 34.194425] audit: type=1800 audit(1556531393.680:34): pid=6895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.213120] random: sshd: uninitialized urandom read (32 bytes read) [ 38.664752] audit: type=1400 audit(1556531398.170:35): avc: denied { map } for pid=7067 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.714680] random: sshd: uninitialized urandom read (32 bytes read) [ 39.333585] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. [ 45.006395] random: sshd: uninitialized urandom read (32 bytes read) 2019/04/29 09:50:04 fuzzer started [ 45.203995] audit: type=1400 audit(1556531404.710:36): avc: denied { map } for pid=7076 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 46.894138] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/29 09:50:07 dialing manager at 10.128.0.105:40727 2019/04/29 09:50:07 syscalls: 2434 2019/04/29 09:50:07 code coverage: enabled 2019/04/29 09:50:07 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/04/29 09:50:07 extra coverage: extra coverage is not supported by the kernel 2019/04/29 09:50:07 setuid sandbox: enabled 2019/04/29 09:50:07 namespace sandbox: enabled 2019/04/29 09:50:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/29 09:50:07 fault injection: enabled 2019/04/29 09:50:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/29 09:50:07 net packet injection: enabled 2019/04/29 09:50:07 net device setup: enabled [ 49.370762] random: crng init done 09:52:44 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000200)={&(0x7f000090b000/0x4000)=nil, 0x4000}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 09:52:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4000000020000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:52:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r1, r0, 0x0) 09:52:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/37) 09:52:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:52:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4000000020000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) [ 204.938429] audit: type=1400 audit(1556531564.440:37): avc: denied { map } for pid=7076 comm="syz-fuzzer" path="/root/syzkaller-shm519942790" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 205.002409] audit: type=1400 audit(1556531564.480:38): avc: denied { map } for pid=7093 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13771 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 206.260183] IPVS: ftp: loaded support on port[0] = 21 [ 206.582222] chnl_net:caif_netlink_parms(): no params data found [ 206.593112] IPVS: ftp: loaded support on port[0] = 21 [ 206.638587] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.645125] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.651923] device bridge_slave_0 entered promiscuous mode [ 206.663466] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.669836] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.676656] device bridge_slave_1 entered promiscuous mode [ 206.692284] IPVS: ftp: loaded support on port[0] = 21 [ 206.706441] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.720366] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.757204] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.764527] team0: Port device team_slave_0 added [ 206.775720] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.782928] team0: Port device team_slave_1 added [ 206.796540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.806424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.844137] IPVS: ftp: loaded support on port[0] = 21 [ 206.922132] device hsr_slave_0 entered promiscuous mode [ 206.990405] device hsr_slave_1 entered promiscuous mode [ 207.060885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 207.071563] chnl_net:caif_netlink_parms(): no params data found [ 207.081418] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 207.177258] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.183951] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.192180] device bridge_slave_0 entered promiscuous mode [ 207.200696] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.207054] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.214062] device bridge_slave_1 entered promiscuous mode [ 207.245772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.258043] chnl_net:caif_netlink_parms(): no params data found [ 207.267885] IPVS: ftp: loaded support on port[0] = 21 [ 207.273502] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.282605] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.289054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.296003] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.302435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.362745] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.369878] team0: Port device team_slave_0 added [ 207.376121] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.385454] team0: Port device team_slave_1 added [ 207.422926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.452223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.473633] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.480627] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.487484] device bridge_slave_0 entered promiscuous mode [ 207.493810] IPVS: ftp: loaded support on port[0] = 21 [ 207.499481] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.505922] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.513288] device bridge_slave_1 entered promiscuous mode [ 207.557194] chnl_net:caif_netlink_parms(): no params data found [ 207.584068] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.593687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.642262] device hsr_slave_0 entered promiscuous mode [ 207.670306] device hsr_slave_1 entered promiscuous mode [ 207.710673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 207.721824] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.728804] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.759020] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 207.791879] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.798335] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.805407] device bridge_slave_0 entered promiscuous mode [ 207.826728] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.834278] team0: Port device team_slave_0 added [ 207.843721] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.850193] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.857029] device bridge_slave_1 entered promiscuous mode [ 207.879636] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.889769] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.899834] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.906930] team0: Port device team_slave_1 added [ 207.912187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.923356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.052099] device hsr_slave_0 entered promiscuous mode [ 208.090280] device hsr_slave_1 entered promiscuous mode [ 208.140653] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 208.152549] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.161085] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.168316] team0: Port device team_slave_0 added [ 208.173490] chnl_net:caif_netlink_parms(): no params data found [ 208.182239] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 208.198345] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.205606] team0: Port device team_slave_1 added [ 208.227263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.242114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.287453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.307049] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.345873] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.352803] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.359659] device bridge_slave_0 entered promiscuous mode [ 208.366041] chnl_net:caif_netlink_parms(): no params data found [ 208.433869] device hsr_slave_0 entered promiscuous mode [ 208.470352] device hsr_slave_1 entered promiscuous mode [ 208.511329] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 208.517561] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.524202] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.531485] device bridge_slave_1 entered promiscuous mode [ 208.549121] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.563569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.571420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.578486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 208.586178] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 208.625686] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 208.632505] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.647523] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.664302] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.682567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.696972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.705152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.712861] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.719271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.728926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.738522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.751946] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.758363] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.765411] device bridge_slave_0 entered promiscuous mode [ 208.772496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.780522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.788024] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.794401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.806055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.823172] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.829536] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.837688] device bridge_slave_1 entered promiscuous mode [ 208.852794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.864842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.877183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.885233] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.892459] team0: Port device team_slave_0 added [ 208.904028] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.911876] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.921179] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.929180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.939685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.951593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.958655] team0: Port device team_slave_1 added [ 208.966273] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 208.991228] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.998381] team0: Port device team_slave_0 added [ 209.004081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.012462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.019964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.026933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.034565] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.042456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.049547] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.059696] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.070740] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 209.076826] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.083249] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.091186] team0: Port device team_slave_1 added [ 209.096948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.104863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.115396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 209.134762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.145012] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.152650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.161115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.168659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.176542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.184288] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.190684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.198315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.209413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.225606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.255495] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.263497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.273515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.343205] device hsr_slave_0 entered promiscuous mode [ 209.400444] device hsr_slave_1 entered promiscuous mode [ 209.443298] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.454288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 209.503395] device hsr_slave_0 entered promiscuous mode [ 209.540314] device hsr_slave_1 entered promiscuous mode [ 209.591524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.599367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.609497] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.615866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.623696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.631380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.638841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.647942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.657767] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 209.667953] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 209.674623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.682257] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.690592] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 209.697379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.705897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.713122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.721309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.729679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.737619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.745591] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.760376] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 209.769581] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 209.777217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.789063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 209.801791] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 209.807857] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.818971] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.825983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.833958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.842769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.853163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.865732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.872864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 209.887632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.898031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.910492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.917769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.926617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.934534] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.940954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.948196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.958239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.968884] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 209.975865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.995890] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.005021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.016633] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.025873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.037057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.044891] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.051287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.066075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.076466] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.085648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.093871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.101323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.108738] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 210.117078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.128509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.135860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.151407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.159942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.169881] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 210.181352] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.195909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.203783] audit: type=1400 audit(1556531569.710:39): avc: denied { name_bind } for pid=7126 comm="syz-executor.5" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 210.229089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.236930] audit: type=1400 audit(1556531569.710:40): avc: denied { node_bind } for pid=7126 comm="syz-executor.5" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 210.259663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.260290] audit: type=1400 audit(1556531569.710:41): avc: denied { name_connect } for pid=7126 comm="syz-executor.5" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 210.271313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.296979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.326903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.338821] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.351258] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.360620] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 09:52:49 executing program 5: [ 210.371692] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.390836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.399165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 210.415997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 09:52:49 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/186, 0x28a) [ 210.428557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.445676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.454404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.462811] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.469165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.477427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.485741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.494876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.507843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:52:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x105180, 0x0) [ 210.523487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 210.535579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.544900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.553036] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.559429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.566702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.581809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.591387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.613747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.624455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 09:52:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x201000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000140)=0x7, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r2, &(0x7f0000000100), 0x1ede5) [ 210.651285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.659336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.668384] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.674831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.695011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.703173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.711473] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.717834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.724760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.732612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.742983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 09:52:50 executing program 5: shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000002c0)=""/51) [ 210.752155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.760246] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 210.772482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.783024] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.797034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:52:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='lo\x00\x00\x00\x00\x00\x00\x02\x00', 0x10) [ 210.826733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.849010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.863222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:52:50 executing program 5: write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x11, 0x0, {0x0, 0x3}}, 0x14) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0xc) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000280)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) [ 210.880681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.890767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.901529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.908361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.912076] hrtimer: interrupt took 26265 ns [ 210.919471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 09:52:50 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000180)='pstore\x00') [ 210.981533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.018041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.038290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.052643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.060682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.072340] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.088039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 211.097823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.106398] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.121387] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.128401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.135646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.142670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.150482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.158233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.166043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.186686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 211.196514] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.203339] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.219299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.227444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.235493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.243380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.251186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.258664] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.265136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.274950] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 211.281557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.290779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.298449] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 211.305464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.314708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.322554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.330332] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.336665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.351257] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 211.358455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 211.368414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.380520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.389823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.397180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.404982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.412879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.420689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.428278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.436189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.444950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.456330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 211.467895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.479730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.486192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.495652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.509097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.518139] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 211.525249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.534542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.546400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.557015] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 211.573811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 211.582635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.594604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.602230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.609624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.619482] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 211.629434] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 211.635730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.646801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.678092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 211.698597] 8021q: adding VLAN 0 to HW filter on device batadv0 09:52:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") rt_sigprocmask(0x1, &(0x7f0000000040), 0x0, 0x8) 09:52:52 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0104320, &(0x7f0000000000)) 09:52:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80002, 0x0) connect$netlink(r1, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 09:52:52 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x408c5333, &(0x7f0000000040)) 09:52:52 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 09:52:52 executing program 3: syz_execute_func(0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 09:52:52 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/186, 0x28a) getdents(r0, 0x0, 0x0) 09:52:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0bc5310, &(0x7f0000000040)) 09:52:52 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) 09:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f000001ef80)=[{0x20, 0x0, 0x7, "44100926000000f70b"}], 0x20}, 0x0) 09:52:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000001600cb9e717374289cb583bfce5b7c030400000000000000000a00000004000000"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 09:52:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000180)='./file0\x00') syz_execute_func(&(0x7f0000000200)="9877774a2ae92cb81c0c0f05bf02000003c4a37bf0c55d41e2e9c422e9aabb3c000000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb3a00d0c4efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") 09:52:52 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)=0x2000926) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) 09:52:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="98c4212173d600c44205abe5774a2ae92c8b1cc60f05bf0b000000c4a37bf0c55c41e2e9c4e26d911ce2b39ec4a1797ec8080000110f33b849c442748fc978820609000000c4c1e55cee4b26660f38091ee509c421dd5831c4e10bf8c45b64660f3838520a9ac40fe376659abd4877f582c42140547e67fbc44161d3a6000000000faac443390d560e00c4227d33f953c790906766f2ab0f0f12c4e17913a48f6f240000ce62b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4414e53d2c4816016f7a8d0b8d4d466456b3d8fc4c3dd7c984872fa668ed9af9aafd04e10106aa8308e4d88a588a500212de2c02cf5c4810dda360f1271005cffefffffdcbee0e0f04781007412b207810f9f9f474e493a3ed8fbfbe20d") 09:52:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85322, &(0x7f0000000040)) 09:52:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="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") mmap(&(0x7f000096b000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:52:52 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$alg(r0, 0x0, 0x0) 09:52:52 executing program 3: syz_execute_func(&(0x7f0000000180)="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") 09:52:52 executing program 2: syz_execute_func(&(0x7f00000003c0)="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") [ 213.267564] audit: type=1800 audit(1556531572.760:42): pid=7273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=127 res=0 09:52:52 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)=0x2000926) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) [ 213.459331] audit: type=1804 audit(1556531572.800:43): pid=7273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/4/file0/file0" dev="loop0" ino=127 res=1 [ 213.708138] audit: type=1800 audit(1556531573.210:44): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=128 res=0 09:52:53 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)=0x2000926) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) [ 213.804192] audit: type=1804 audit(1556531573.210:45): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/5/file0/file0" dev="loop0" ino=128 res=1 09:52:53 executing program 1: syz_execute_func(&(0x7f0000000080)="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") [ 213.892664] overlayfs: fs on '.' does not support file handles, falling back to index=off. [ 213.917271] overlayfs: failed to resolve 'file0': -2 09:52:53 executing program 5: syz_execute_func(&(0x7f0000000140)="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") [ 214.040299] audit: type=1800 audit(1556531573.540:46): pid=7306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=129 res=0 09:52:53 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") 09:52:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="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") mmap(&(0x7f000096b000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:52:53 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)=0x2000926) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) [ 214.185134] audit: type=1804 audit(1556531573.580:47): pid=7306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/6/file0/file0" dev="loop0" ino=129 res=1 09:52:53 executing program 2: syz_execute_func(&(0x7f0000000000)="980f58c51c870f05c442791cf0c4a37bf0c53ed01c41e2e9b557c40209ba0c995b660f6b32fb660f72d50f8f4897c403e2e2ed1ec461fc50e2435ce505080508e10bf8c420f9c444c0cc802997971266f3440f1aecf20f705af831dcdd0fbcaf88090056000045c3d1abc7abc764441ff807c4227d3b7ab001b00b000000f08171a30b8a826ec442a0f39601000000aae2e22d8cc7e862cc83900d3c61fd8de3c07126264788fe5800d0313165660f6a943aa8c8a440a26167f04781486900e1a70505e3") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 09:52:53 executing program 2: 09:52:54 executing program 2: [ 214.483141] audit: type=1800 audit(1556531573.980:48): pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=130 res=0 09:52:54 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$vcsn(0x0, 0x2, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) syz_execute_func(&(0x7f00000002c0)="98a84a2ae91c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb884014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d40fb0d5e8628f680864360fe25800218de3c0f52641802d08000000fac4c151ec2af6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") r1 = open(&(0x7f0000000100)='./bus\x00', 0x40, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 09:52:54 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)=0x2000926) 09:52:54 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$vcsn(0x0, 0x2, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) syz_execute_func(&(0x7f00000002c0)="98a84a2ae91c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb884014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d40fb0d5e8628f680864360fe25800218de3c0f52641802d08000000fac4c151ec2af6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") r1 = open(&(0x7f0000000100)='./bus\x00', 0x40, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 09:52:54 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) 09:52:54 executing program 1: syz_execute_func(&(0x7f0000000680)="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") 09:52:54 executing program 5: syz_execute_func(&(0x7f0000000040)="a84a2ae92c211c910f05bf03000000c4a37bf0c5fa41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b014cb8c4014e4e0b5b5b14dee509c421045f4607c4228dbf50e35b70c4c4827958cac4a3bd4877f88ac483397fd300400f01c210f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be68f0272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c450f918fffefffffbedcdca1c9fbc49add611fe5e5474f383a656465420f6bd9a29fb7e2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 09:52:54 executing program 3: 09:52:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="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") mmap(&(0x7f000096b000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:52:54 executing program 2: keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='cxifs.spne\xc6\xa8\x85uWe\xc7?\x8e\x89\xa2go]\xdd~mN\xd9\xaa\xcd\xd0\xef\xe1\xd3Y\xfb\x1e\xceZ\x9f\x9d\f\xb1z\x86[\xdb\x12s\x90\xbeSg\x86gf\x18\xca\"I\x1a\xa8y#I$\xa5\xf1:\xa5\xc1\x91]\xb7\xa8\x1f\x9a\xd8\xd7\xd7\\\x1c\b\xa6\x86O\x14\tR#m4\xfdWk\x18\xd5\xec6W\xba\x1a\xd1\xc0\xaa\x94\xad\x1f\x82\x1bK\xd7<\x1dae\xa0\x8d\xfeUm\x10\x11\xf7\x12I\xa9\xe9\xcd\x89;,\rP(tS\x02\xdeK\xc4\xee\xea\x13\x80\xa2Y\xff\xfdSwF\x17m;&~T\xe6\x8c\xc9\x1e\xb0|\x8f\xdd\xa4\x92\x18!\xd4\xb2\xfe\x11\f\xdc4\xb4\xc5\x8aj\xee0\xcd\xe7\xe3\x86sv\xaf\xec', 0x0) syz_execute_func(&(0x7f0000000180)="980f58c514bd0f05c442791cf0c4a37bf0c53cd01c41e2e9b55767660f6b32fb660f72d50f8f6536f30f2a30c403e2c461fc50e243e50808c4e11bf8c420f9c444dbae000000006dc463655f2c3f0d66f3440f1aecc9dcdc0fbcaf001000002665f3e152acac64440ff809c4227d3b7ab001b00b000000f081610d2baf826ec442a0f39601000000be0d2d8cc7e962c789e867bb603a3ac461660f5edcc099ee26262688fec4234d46d13d00d0313165660f6a943aa8c8a440c442cdaeb2a135000020007ee3") syz_execute_func(&(0x7f0000000140)="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") 09:52:54 executing program 5: 09:52:54 executing program 3: 09:52:54 executing program 3: 09:52:54 executing program 3: 09:52:54 executing program 5: 09:52:54 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r5, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r5, r6, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) pwrite64(r2, &(0x7f00000001c0)="dc85e4e19d7b9de4540ca45bb24e6017aa4ab5940240fcf06b01c341356c", 0x1e, 0x0) 09:52:54 executing program 5: [ 215.472082] kauditd_printk_skb: 5 callbacks suppressed [ 215.472091] audit: type=1800 audit(1556531574.970:54): pid=7391 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=133 res=0 [ 215.594267] audit: type=1804 audit(1556531575.010:55): pid=7391 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/10/file0/file0" dev="loop0" ino=133 res=1 09:52:55 executing program 1: 09:52:55 executing program 3: 09:52:55 executing program 5: 09:52:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="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") mmap(&(0x7f000096b000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:52:55 executing program 2: 09:52:55 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) 09:52:55 executing program 5: 09:52:55 executing program 3: 09:52:55 executing program 1: 09:52:55 executing program 5: 09:52:55 executing program 3: 09:52:55 executing program 1: 09:52:55 executing program 2: 09:52:55 executing program 5: 09:52:55 executing program 3: [ 216.302765] audit: type=1800 audit(1556531575.800:56): pid=7426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16539 res=0 [ 216.376991] audit: type=1804 audit(1556531575.810:57): pid=7426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/11/file0/file0" dev="sda1" ino=16539 res=1 09:52:56 executing program 4: 09:52:56 executing program 1: 09:52:56 executing program 5: 09:52:56 executing program 2: 09:52:56 executing program 3: 09:52:56 executing program 1: 09:52:56 executing program 4: 09:52:56 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000140)) 09:52:56 executing program 4: 09:52:56 executing program 2: 09:52:56 executing program 3: 09:52:56 executing program 5: 09:52:56 executing program 1: 09:52:56 executing program 1: 09:52:56 executing program 5: 09:52:56 executing program 4: 09:52:56 executing program 2: 09:52:56 executing program 3: 09:52:56 executing program 1: [ 217.277118] audit: type=1800 audit(1556531576.780:58): pid=7459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=134 res=0 09:52:56 executing program 3: 09:52:56 executing program 5: 09:52:56 executing program 4: 09:52:56 executing program 2: 09:52:56 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) 09:52:56 executing program 1: 09:52:56 executing program 5: 09:52:56 executing program 1: 09:52:56 executing program 4: 09:52:57 executing program 2: 09:52:57 executing program 3: [ 217.432023] audit: type=1804 audit(1556531576.780:59): pid=7459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/12/file0/file0" dev="loop0" ino=134 res=1 09:52:57 executing program 5: 09:52:57 executing program 4: 09:52:57 executing program 1: 09:52:57 executing program 3: 09:52:57 executing program 2: [ 217.649213] audit: type=1800 audit(1556531577.100:60): pid=7486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=135 res=0 09:52:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0xc700000e) 09:52:57 executing program 5: 09:52:57 executing program 2: syz_execute_func(&(0x7f0000000000)="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") 09:52:57 executing program 3: syz_execute_func(&(0x7f0000000040)="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") 09:52:57 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000100)="2664460fbfe74a2ae92cb81c080f05bf02000003c4a37bf0c55d41e2e9c4a2e922aabb3c67e3660f5c5799a400640400a4006490a00000660f383a9e02000000110f0a0ab8c4014e4e8f29489a04bf14dee509c421045f4607c421dd1031c4e1a1ea9cc065566666160b0bc4c4a3bd485bf88ac483397fd3fb0000d0c4efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1fff236440f01efba00d800414e53c462a58c31816016f7a80db8c421c653672666450fc4650000ebeb8f89709b6500a25879218de3c02cf52626802d08000000fa49c45c450f91f3ff6cffff3e0f18cafb110f450f9ce3fb430f380832") 09:52:57 executing program 1: syz_execute_func(&(0x7f0000000180)="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") [ 217.715789] audit: type=1804 audit(1556531577.100:61): pid=7486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/13/file0/file0" dev="loop0" ino=135 res=1 09:52:57 executing program 5: 09:52:57 executing program 5: [ 217.953189] audit: type=1800 audit(1556531577.460:62): pid=7517 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=136 res=0 09:52:57 executing program 5: [ 218.063351] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 218.072231] FAT-fs (loop0): Filesystem has been set read-only [ 218.078974] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000045) 09:52:57 executing program 5: 09:52:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0xc700000e) [ 218.134331] audit: type=1804 audit(1556531577.460:63): pid=7517 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/14/file0/file0" dev="loop0" ino=136 res=1 09:52:57 executing program 5: 09:52:57 executing program 5: syz_execute_func(&(0x7f0000000140)="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") 09:52:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0xc700000e) [ 218.407233] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 218.415366] FAT-fs (loop0): Filesystem has been set read-only [ 218.421867] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 218.430440] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000045) 09:52:58 executing program 2: syz_execute_func(&(0x7f00000003c0)="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") 09:52:58 executing program 1: syz_execute_func(&(0x7f0000000180)="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") 09:52:58 executing program 4: ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x801, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x54) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 09:52:58 executing program 3: syz_execute_func(&(0x7f0000000000)="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") 09:52:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) 09:52:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x5, 0x409, 0x4, 0x2200081}) 09:52:58 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x400000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80084503, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) lookup_dcookie(0x0, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) mq_open(&(0x7f0000000000)='lo#[em0wlan0\x00', 0x2, 0x0, 0x0) sysfs$2(0x2, 0x4, &(0x7f00000017c0)=""/179) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000031, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_extract_tcp_res(0x0, 0x0, 0xfffffffffffffffe) read(r0, &(0x7f0000000300)=""/100, 0xffffffffffffff58) 09:52:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) 09:52:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x2bd) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x10, 0x0, &(0x7f0000000140)) [ 219.270500] bond0: Releasing backup interface bond_slave_1 09:52:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaae}, 0xb) [ 219.337561] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:52:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x72, 0x0, &(0x7f0000000140)) 09:52:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) 09:52:59 executing program 2: clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="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") 09:52:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 09:52:59 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:52:59 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, 0xffffffffffffffff, 0x0, 0xc700000e) 09:52:59 executing program 3: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:52:59 executing program 2: syz_execute_func(&(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) [ 219.874767] bond0: Releasing backup interface bond_slave_1 [ 219.925346] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:52:59 executing program 4: r0 = socket$inet6(0xa, 0xe, 0x7) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r2 = fcntl$getown(r0, 0x9) getpgid(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x1010802, 0x0) r4 = open(0x0, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x2000000, 0x10, 0xffffffffffffffff, 0x8000000) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x89, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e, 0x0, 0x0, 0x4}, 0x0, 0x0, r5, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x0, 0x80000000, 0x0, 0x1}, 0xc) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0xa2081, 0x0) write$cgroup_type(r6, &(0x7f0000000540)='threaded\x00', 0xfffffffffffffea1) mkdirat(r4, &(0x7f00000004c0)='./file1\x00', 0x100000000) seccomp(0x0, 0x0, &(0x7f0000000200)={0x2, &(0x7f0000000500)=[{0x8000, 0x1, 0x6, 0x2}, {0x5, 0x3ff}]}) 09:52:59 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:52:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) 09:52:59 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x1ffffffffffffe99, &(0x7f0000001680)=[{}]}) r0 = memfd_create(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x20000057d) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r2, &(0x7f0000000000)={0x6}, 0x5d4) 09:52:59 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, 0xffffffffffffffff, 0x0, 0xc700000e) 09:52:59 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setreuid(0x0, 0xee00) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) [ 220.139421] FAT-fs (loop4): bogus number of reserved sectors [ 220.167690] FAT-fs (loop4): Can't find a valid FAT filesystem 09:52:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0x3, {0x0, 0x0}}, 0x20) 09:52:59 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") poll(&(0x7f0000000040)=[{r0}], 0x1, 0x5) [ 220.186863] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 09:52:59 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:52:59 executing program 3: syz_execute_func(&(0x7f0000000340)="9877774a2ae92cb81c0c0f05bf0c020000c4a37bf0c55d41e2e9c422e9aabb3c000000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000d0c4efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) [ 220.348946] FAT-fs (loop4): bogus number of reserved sectors [ 220.360092] FAT-fs (loop4): Can't find a valid FAT filesystem 09:52:59 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000001c0)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:53:00 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shmctl$SHM_LOCK(0x0, 0xb) socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x2, 0x0, 0x6}}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:53:00 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getpeername$inet(r1, 0x0, 0x0) 09:53:00 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') [ 220.483234] kauditd_printk_skb: 14 callbacks suppressed [ 220.483242] audit: type=1800 audit(1556531579.980:78): pid=7663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=142 res=0 09:53:00 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, 0xffffffffffffffff, 0x0, 0xc700000e) [ 220.584954] hfs: can't find a HFS filesystem on dev loop2 09:53:00 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000000)) 09:53:00 executing program 5: syz_execute_func(&(0x7f0000000000)="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") 09:53:00 executing program 1: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) getpid() openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x2, 0x0, 0x6}}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000004001fc) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000200)=""/205) [ 220.746852] hfs: can't find a HFS filesystem on dev loop2 09:53:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) 09:53:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000007a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") [ 220.850119] audit: type=1800 audit(1556531580.350:79): pid=7716 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16519 res=0 09:53:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000200)=""/170) [ 221.203770] audit: type=1400 audit(1556531580.710:80): avc: denied { map } for pid=7704 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=29545 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 09:53:01 executing program 3: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x1002f}], 0x1, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/173, 0xad}], 0x1, 0x0) 09:53:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(0xffffffffffffffff, r4, 0x0, 0xc700000e) 09:53:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 09:53:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:01 executing program 5: syz_execute_func(&(0x7f0000000000)="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") [ 221.613543] mmap: syz-executor.4 (7740) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 09:53:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(0xffffffffffffffff, r4, 0x0, 0xc700000e) 09:53:01 executing program 1: write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x11, 0x0, {0x0, 0x3}}, 0x14) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0xc) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000280)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='lo\x00\x00\x00\x00\x00\x00\x02\x00', 0x10) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20040000, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) 09:53:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000640)='/dev/dsp#\x00', 0xa, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(0xffffffffffffffff, r4, 0x0, 0xc700000e) 09:53:01 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x105140, 0x0) 09:53:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() sched_setattr(r3, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r4, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r4, r5, 0x0, 0xc700000e) 09:53:01 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001200)='/dev/sequencer2\x00', 0x1, 0x0) write$selinux_load(r0, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 222.272243] audit: type=1800 audit(1556531581.780:81): pid=7768 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=143 res=0 09:53:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) [ 222.416488] audit: type=1804 audit(1556531581.780:82): pid=7768 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/26/file0/file0" dev="loop0" ino=143 res=1 [ 222.556289] audit: type=1800 audit(1556531582.060:83): pid=7783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=144 res=0 [ 222.596151] audit: type=1804 audit(1556531582.090:84): pid=7783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/27/file0/file0" dev="loop0" ino=144 res=1 09:53:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x13, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x02', 0x1ff) 09:53:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000800)="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") 09:53:02 executing program 5: syz_execute_func(&(0x7f0000000000)="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") 09:53:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x0, 0x48400) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:53:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:02 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:02 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8923, 0x0) [ 222.824006] audit: type=1400 audit(1556531582.330:85): avc: denied { create } for pid=7803 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:53:02 executing program 2: syz_execute_func(&(0x7f0000000280)="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") [ 222.942620] audit: type=1400 audit(1556531582.360:86): avc: denied { write } for pid=7803 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.087855] audit: type=1400 audit(1556531582.390:88): avc: denied { read } for pid=7803 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:53:03 executing program 5: syz_execute_func(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:53:03 executing program 5: syz_execute_func(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:53:03 executing program 1: syz_execute_func(&(0x7f0000000140)="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") 09:53:03 executing program 5: syz_execute_func(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 09:53:04 executing program 3: syz_execute_func(&(0x7f0000000500)="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") 09:53:04 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:04 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, 0x0) 09:53:04 executing program 2: syz_execute_func(&(0x7f00000001c0)="a84a2ae92c211c910f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b014cb8c4014e4e0b5b5b14dee509c421045f4607c4228dbf50e35b70c4c4827958cac4a3bd4877f88ac483397fd300400f01c210f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be68f0272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c450f918fffefffffbedcdca1c9fbc49add611fe5e5474f383a656465420f6bd9a29fb7e2") openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200000, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, 0x0}, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000001400)='/selinux/user\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x104031, 0xffffffffffffffff, 0x0) 09:53:04 executing program 1: syz_execute_func(&(0x7f0000000000)="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") 09:53:04 executing program 2: syz_execute_func(&(0x7f00000003c0)="982d2d4a2ae92cb81c4c0f05bfd7000147c4a37bf0c55c41e2e92e363e466e1a7000c4217d2ec3660f383a9e020000003636ad0bc60bc644b90e0000004e5bc4615c15470426660f38091e14de809700f87fbe00c421045f4607c4a27925910af7880ec4e10bf8c45b64660f3838520ac421615531c4a3bd4877f88ac483397fd300c4a1662ad760d33597afafc4c462559abba90000005ebde400000098acc462b1f72ec321f4b9a5604ba419c20b0bf20f18c6c4816016f7a80dd4d466450fc4650000ebeb41dbbd318d0000680864360fa25800218de3c02cf52626802d08000000faf30fbd43ae5c450f91f3ffefb5ff47dbd08adcfb110f66474eb83aa2f1fbc422c99fc3c3dafd2ef2416d") 09:53:04 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) [ 224.807131] syz-executor.0 (7847) used greatest stack depth: 24576 bytes left 09:53:04 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:04 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:04 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, 0x0) 09:53:04 executing program 1: 09:53:06 executing program 3: 09:53:06 executing program 1: 09:53:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:06 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:06 executing program 2: 09:53:06 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, 0x0) 09:53:06 executing program 2: 09:53:06 executing program 1: 09:53:06 executing program 1: 09:53:06 executing program 2: 09:53:06 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:06 executing program 1: 09:53:07 executing program 3: 09:53:07 executing program 2: 09:53:07 executing program 1: 09:53:07 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:07 executing program 5: 09:53:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="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") 09:53:07 executing program 2: 09:53:07 executing program 5: 09:53:07 executing program 1: 09:53:07 executing program 5: 09:53:07 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:07 executing program 1: 09:53:07 executing program 3: 09:53:07 executing program 2: 09:53:07 executing program 5: 09:53:07 executing program 1: 09:53:07 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="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") 09:53:08 executing program 1: 09:53:08 executing program 2: 09:53:08 executing program 5: 09:53:08 executing program 3: 09:53:08 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:08 executing program 1: 09:53:08 executing program 5: 09:53:08 executing program 2: [ 228.625194] kauditd_printk_skb: 9 callbacks suppressed [ 228.625202] audit: type=1800 audit(1556531588.130:97): pid=7974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16627 res=0 09:53:08 executing program 5: 09:53:08 executing program 2: 09:53:08 executing program 1: [ 228.710220] audit: type=1804 audit(1556531588.160:98): pid=7974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/38/file0" dev="sda1" ino=16627 res=1 09:53:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="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") 09:53:08 executing program 1: 09:53:08 executing program 2: 09:53:08 executing program 5: 09:53:08 executing program 3: 09:53:08 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:09 executing program 2: 09:53:09 executing program 5: 09:53:09 executing program 1: [ 229.512044] audit: type=1800 audit(1556531589.020:99): pid=7996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16627 res=0 09:53:09 executing program 5: 09:53:09 executing program 2: 09:53:09 executing program 1: [ 229.583281] audit: type=1804 audit(1556531589.040:100): pid=7996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/39/file0" dev="sda1" ino=16627 res=1 09:53:09 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:09 executing program 5: 09:53:09 executing program 2: 09:53:09 executing program 1: 09:53:10 executing program 3: 09:53:10 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:10 executing program 1: 09:53:10 executing program 2: 09:53:10 executing program 5: 09:53:10 executing program 2: 09:53:10 executing program 1: [ 230.590297] audit: type=1800 audit(1556531590.090:101): pid=8025 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16668 res=0 09:53:10 executing program 5: [ 230.695764] audit: type=1804 audit(1556531590.100:102): pid=8025 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/40/file0" dev="sda1" ino=16668 res=1 09:53:10 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:10 executing program 2: 09:53:10 executing program 1: 09:53:10 executing program 5: 09:53:10 executing program 3: 09:53:10 executing program 2: 09:53:10 executing program 1: 09:53:10 executing program 5: 09:53:10 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:10 executing program 2: 09:53:10 executing program 1: 09:53:10 executing program 5: [ 231.563537] audit: type=1800 audit(1556531591.070:103): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=148 res=0 [ 231.636060] audit: type=1804 audit(1556531591.090:104): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/41/file0/file0" dev="loop0" ino=148 res=1 09:53:11 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:11 executing program 1: 09:53:11 executing program 2: 09:53:11 executing program 5: 09:53:11 executing program 3: 09:53:11 executing program 1: 09:53:11 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:11 executing program 5: 09:53:11 executing program 2: 09:53:11 executing program 1: 09:53:11 executing program 5: [ 232.319844] audit: type=1800 audit(1556531591.820:105): pid=8076 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=149 res=0 09:53:12 executing program 5: [ 232.449818] audit: type=1804 audit(1556531591.860:106): pid=8076 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/42/file0/file0" dev="loop0" ino=149 res=1 09:53:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:12 executing program 1: 09:53:12 executing program 2: 09:53:12 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:12 executing program 3: 09:53:12 executing program 5: 09:53:12 executing program 2: 09:53:12 executing program 1: 09:53:12 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r3, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r3, r4, 0x0, 0xc700000e) 09:53:12 executing program 2: 09:53:12 executing program 1: 09:53:12 executing program 2: 09:53:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:13 executing program 5: 09:53:13 executing program 1: 09:53:13 executing program 2: 09:53:13 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:13 executing program 3: 09:53:13 executing program 1: 09:53:13 executing program 5: [ 233.861086] kauditd_printk_skb: 4 callbacks suppressed [ 233.861094] audit: type=1800 audit(1556531593.370:111): pid=8128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=152 res=0 09:53:13 executing program 2: 09:53:13 executing program 5: 09:53:13 executing program 1: 09:53:13 executing program 2: [ 233.867839] audit: type=1804 audit(1556531593.370:112): pid=8128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/45/file0/file0" dev="loop0" ino=152 res=1 09:53:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:14 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:14 executing program 5: 09:53:14 executing program 1: 09:53:14 executing program 2: [ 234.760978] audit: type=1800 audit(1556531594.260:113): pid=8156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=153 res=0 09:53:14 executing program 3: 09:53:14 executing program 5: 09:53:14 executing program 2: 09:53:14 executing program 1: 09:53:14 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 234.843614] audit: type=1804 audit(1556531594.290:114): pid=8156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/46/file0/file0" dev="loop0" ino=153 res=1 09:53:14 executing program 2: 09:53:14 executing program 1: [ 234.990578] audit: type=1800 audit(1556531594.490:115): pid=8168 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=154 res=0 [ 235.065788] audit: type=1804 audit(1556531594.490:116): pid=8168 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/47/file0/file0" dev="loop0" ino=154 res=1 09:53:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:15 executing program 5: 09:53:15 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:15 executing program 2: 09:53:15 executing program 1: 09:53:15 executing program 3: 09:53:15 executing program 5: 09:53:15 executing program 2: 09:53:15 executing program 1: [ 235.625730] audit: type=1800 audit(1556531595.130:117): pid=8194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16722 res=0 09:53:15 executing program 1: 09:53:15 executing program 5: 09:53:15 executing program 2: [ 235.749555] audit: type=1804 audit(1556531595.130:118): pid=8194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/48/file0/file0" dev="sda1" ino=16722 res=1 09:53:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:15 executing program 1: 09:53:15 executing program 5: 09:53:15 executing program 2: 09:53:15 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 236.526908] audit: type=1800 audit(1556531596.030:119): pid=8216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=155 res=0 09:53:16 executing program 3: 09:53:16 executing program 5: 09:53:16 executing program 1: 09:53:16 executing program 2: 09:53:16 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000680)=0x7, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 236.563381] audit: type=1804 audit(1556531596.030:120): pid=8216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/49/file0/file0" dev="loop0" ino=155 res=1 09:53:16 executing program 1: 09:53:16 executing program 5: 09:53:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") 09:53:16 executing program 2: 09:53:16 executing program 5: 09:53:16 executing program 1: 09:53:16 executing program 0: syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:16 executing program 3: 09:53:16 executing program 2: 09:53:16 executing program 5: 09:53:16 executing program 1: 09:53:16 executing program 5: 09:53:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:16 executing program 2: 09:53:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:17 executing program 1: 09:53:17 executing program 2: 09:53:17 executing program 5: 09:53:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r1, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r1, r2, 0x0, 0xc700000e) 09:53:17 executing program 3: 09:53:17 executing program 1: syz_execute_func(&(0x7f0000000340)="98c4212173d60098774a2ae92c8b1cc60f05bfd904e8b3c4a37bf0c55c41e2e9c4e26d911ce2b9b90f383a9e02000000110f33b849c442748fc978820509000000c4c1e55cee4b26660f38091ee509c4c2793e9100000000c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fbc44161d3a6000000000faac443390d560e00c4227d33f953c790906766f2ab0f0f12c4e17913a48f6f240000ce62b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4414e53d2c4816016f7a8d0b8d4d46645ebeb8fc4c3dd7c9848f3a445d04e32a25800218de3c02cf5c4810dda360f1271005cffefffffdcbee0e0f04781007412b207810f9f9f474e493a3ed8fbfbe20d") 09:53:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") socket(0x2, 0x3, 0x100000001) open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="9877774a2ae92cb81c030f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466454b0fc46500004c004c628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") 09:53:17 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x1000000002806, 0x0) write$UHID_DESTROY(r0, &(0x7f0000001280), 0x4) 09:53:17 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 09:53:17 executing program 2: 09:53:17 executing program 2: 09:53:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:18 executing program 2: syz_execute_func(&(0x7f0000000140)="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") syz_execute_func(&(0x7f0000000100)="980f050520d0f80791b0244141e2e99650855b66c4237909a200800000e60fc4014e66f63c220fa0e5be34d1c4e1f8c42e6566460f107848226bebeb61f97e5a003e98660f550f0000c4e1c7596b0dc4c35d467f00aa8888a1c40fbb6567f046838b546a000000420fba2d00000100ef0f73d539da663c57c46291ae8ca0656000000f01c4c4213f7cbb9e0000002d9600000000cadcdc1544c82b550142c4c4227931c420b15ffbb15ffb0f3804830a000000") 09:53:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r1, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r1, r2, 0x0, 0xc700000e) 09:53:18 executing program 5: syz_execute_func(&(0x7f0000000640)="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") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 239.081094] kauditd_printk_skb: 9 callbacks suppressed [ 239.081102] audit: type=1804 audit(1556531598.590:130): pid=8328 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir537654649/syzkaller.tyW4Ud/84/file0" dev="sda1" ino=16754 res=1 09:53:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) [ 239.156741] audit: type=1800 audit(1556531598.650:131): pid=8335 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=159 res=0 [ 239.234170] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 239.264531] audit: type=1804 audit(1556531598.660:132): pid=8335 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/54/file0/file0" dev="loop0" ino=159 res=1 09:53:19 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf00507100c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:53:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r1, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r1, r2, 0x0, 0xc700000e) 09:53:19 executing program 5: syz_execute_func(&(0x7f0000000600)="260f93cea84a2ae92c431cd20f05bf03004000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3e316b8c4014e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 09:53:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/157, 0x9d}], 0x131, 0x10) [ 239.739475] audit: type=1800 audit(1556531599.240:133): pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=160 res=0 09:53:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x8b], [0xc1]}) [ 239.791478] audit: type=1804 audit(1556531599.270:134): pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/55/file0/file0" dev="loop0" ino=160 res=1 09:53:19 executing program 5: syz_execute_func(&(0x7f0000000600)="260f93cea84a2ae92c431cd20f05bf03004000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3e316b8c4014e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 09:53:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:19 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 09:53:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:19 executing program 1: syz_execute_func(&(0x7f0000000380)="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") [ 240.005737] audit: type=1800 audit(1556531599.450:135): pid=8366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=161 res=0 09:53:19 executing program 5: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) getpgid(0xffffffffffffffff) syz_open_dev$video(0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utime(&(0x7f0000000280)='./file0\x00', &(0x7f0000000400)={0xfffffffffffffe00, 0x7fff}) getegid() lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{r0, r1/1000+30000}, {0x0, 0x2710}}) semctl$SETVAL(0x0, 0x7, 0x10, &(0x7f0000000440)=0x2) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e24}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 240.198451] audit: type=1804 audit(1556531599.450:136): pid=8366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/56/file0/file0" dev="loop0" ino=161 res=1 [ 240.233772] audit: type=1800 audit(1556531599.660:137): pid=8387 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=162 res=0 [ 240.256723] audit: type=1804 audit(1556531599.660:138): pid=8387 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/57/file0/file0" dev="loop0" ino=162 res=1 [ 240.817520] warning: process `syz-executor.3' used the deprecated sysctl system call with 09:53:21 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf00507100c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:53:21 executing program 1: syz_execute_func(&(0x7f0000000000)="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") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) 09:53:21 executing program 5: setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000003c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:21 executing program 2: syz_execute_func(&(0x7f00000003c0)="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") 09:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:21 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/cgroup\x00') fcntl$setlease(r0, 0x400, 0x3) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) ptrace$setregset(0x4205, 0xffffffffffffffff, 0x201, &(0x7f00000001c0)={0x0}) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x901, 0x3) pipe(&(0x7f0000000140)) 09:53:21 executing program 1: syz_execute_func(&(0x7f0000000640)="449ca84a2ae92cdd1c030f05bf00c07000c4a37bf0c55c41e2e92e36dc460f5a7000660fde978fe97c80660f383a9e02000000e30b3e66430f88f48c0ef83edfffffffb8c4014e4e4e5b5b016d7d14de06c4a20993949800000000090909045f4607c421dd5831c4e10bf8c4450f188705000000260f380a32c92a93bd4877e88a8adcdc0fbcafc0e1d91491fa0000c483596b61240051afaf6766f2ab440fec3f67ddea2cc462b1f72ec321f4b9a5604ba419c2c2b0c10b0b0000f08171a30b8a826ec4816016f72dfd0dd4d466450fc4650000ebeb628f680864360fe25800218de3c02cf52626802d080000f7a1dd7dbbbfdd5c450f91f3ffefffffbedcdc21c9adc4217ff0ad0000000066474f383ae34ba2f1fb3a4c5fe2") 09:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:21 executing program 5: syz_execute_func(&(0x7f0000000280)="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") 09:53:22 executing program 3: 09:53:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:22 executing program 2: socket$unix(0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 09:53:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000140)="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") 09:53:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 09:53:22 executing program 5: 09:53:23 executing program 5: 09:53:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:23 executing program 5: [ 243.575904] overlayfs: fs on '.' does not support file handles, falling back to index=off. 09:53:23 executing program 5: [ 243.636205] overlayfs: filesystem on './file0' not supported as upperdir [ 243.691979] overlayfs: fs on '.' does not support file handles, falling back to index=off. 09:53:23 executing program 5: [ 243.742607] overlayfs: maximum fs stacking depth exceeded 09:53:23 executing program 5: 09:53:23 executing program 3: 09:53:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 244.224971] kauditd_printk_skb: 13 callbacks suppressed [ 244.224980] audit: type=1800 audit(1556531603.730:152): pid=8493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=169 res=0 09:53:23 executing program 2: 09:53:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 09:53:23 executing program 5: 09:53:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000140)="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") [ 244.306538] audit: type=1804 audit(1556531603.760:153): pid=8493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/64/file0/file0" dev="loop0" ino=169 res=1 09:53:23 executing program 2: 09:53:23 executing program 5: 09:53:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:24 executing program 1: [ 244.432487] overlayfs: fs on '.' does not support file handles, falling back to index=off. [ 244.459790] audit: type=1800 audit(1556531603.960:154): pid=8508 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=170 res=0 09:53:24 executing program 2: [ 244.664267] audit: type=1804 audit(1556531603.960:155): pid=8508 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/65/file0/file0" dev="loop0" ino=170 res=1 [ 244.704684] audit: type=1800 audit(1556531604.210:156): pid=8526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16593 res=0 [ 244.745270] audit: type=1804 audit(1556531604.210:157): pid=8526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/66/file0/file0" dev="sda1" ino=16593 res=1 09:53:24 executing program 3: 09:53:24 executing program 2: 09:53:24 executing program 1: 09:53:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="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") 09:53:24 executing program 5: 09:53:24 executing program 1: 09:53:24 executing program 2: 09:53:24 executing program 5: 09:53:24 executing program 1: 09:53:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:24 executing program 1: 09:53:24 executing program 5: [ 245.614631] audit: type=1800 audit(1556531605.120:158): pid=8553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=171 res=0 [ 245.656619] audit: type=1804 audit(1556531605.140:159): pid=8553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/67/file0/file0" dev="loop0" ino=171 res=1 09:53:25 executing program 3: 09:53:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:25 executing program 5: 09:53:25 executing program 2: 09:53:25 executing program 1: 09:53:25 executing program 2: 09:53:25 executing program 5: 09:53:25 executing program 1: [ 246.176473] audit: type=1800 audit(1556531605.680:160): pid=8564 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="loop0" ino=172 res=0 09:53:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:25 executing program 2: 09:53:25 executing program 5: [ 246.309059] audit: type=1804 audit(1556531605.710:161): pid=8564 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/68/file0/file0" dev="loop0" ino=172 res=1 09:53:26 executing program 3: 09:53:26 executing program 1: 09:53:26 executing program 2: 09:53:26 executing program 5: 09:53:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="984a2ae92cb80c480f05bf02000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5b7f4b4b26660f38091e2fdee509c421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2a0c10b00cca27a0e0f414e53d2c4c4015559dcd4d466450fc4650000c4e39978c104c441c05983f9070bb38f89709b6500cda259c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa49c45c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 09:53:26 executing program 2: 09:53:26 executing program 5: 09:53:26 executing program 1: 09:53:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:26 executing program 1: 09:53:26 executing program 5: 09:53:27 executing program 3: 09:53:27 executing program 2: 09:53:27 executing program 1: 09:53:27 executing program 5: 09:53:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="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") 09:53:27 executing program 2: 09:53:27 executing program 1: 09:53:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:27 executing program 5: 09:53:27 executing program 1: 09:53:27 executing program 2: 09:53:28 executing program 3: 09:53:28 executing program 5: 09:53:28 executing program 1: 09:53:28 executing program 2: 09:53:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(0x0, &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="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") 09:53:28 executing program 1: 09:53:28 executing program 5: 09:53:28 executing program 2: 09:53:28 executing program 5: 09:53:28 executing program 2: 09:53:28 executing program 1: syz_execute_func(&(0x7f0000000040)="701fa84a2ae92c433cd20f05bf0b000000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3c1b8c4010e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") 09:53:28 executing program 3: syz_execute_func(&(0x7f0000000280)="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") 09:53:28 executing program 5: syz_execute_func(&(0x7f0000000240)="260f93cea84a2ae92c433cd20f05bf0b000000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3e316b8c4010e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c42666dbc2c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") 09:53:28 executing program 2: syz_execute_func(&(0x7f00000003c0)="98f247af4a2ae92cb81c070f05bffa254000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33cab8c4414e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520aebc4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afafc4211d6b2de3000000440fec3fc481792f22660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffff460f79bd175a5117eab886fbb8867c474e9cb83aa2f1fbfbe2") 09:53:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(0x0, &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="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") [ 249.693941] kauditd_printk_skb: 12 callbacks suppressed [ 249.693949] audit: type=1800 audit(1556531609.200:174): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16853 res=0 09:53:29 executing program 1: syz_execute_func(&(0x7f0000000140)="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") [ 249.811092] audit: type=1804 audit(1556531609.200:175): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/75/file0/file0" dev="sda1" ino=16853 res=1 09:53:29 executing program 2: syz_execute_func(&(0x7f0000000300)="701fa84a2ae92c433cd20f05bf0b000000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3c1b8c4010e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") 09:53:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") creat(&(0x7f00000000c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 09:53:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432700000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) [ 250.029092] audit: type=1400 audit(1556531609.530:176): avc: denied { setopt } for pid=8704 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:53:29 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d2000000000200632020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000fffffdfd0000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 250.097564] audit: type=1400 audit(1556531609.560:177): avc: denied { setattr } for pid=8704 comm="syz-executor.5" name="NETLINK" dev="sockfs" ino=34048 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:53:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500020000001f00000000000800080017000400ff7e", 0x24}], 0x1}, 0x0) [ 250.152669] audit: type=1804 audit(1556531609.590:178): pid=8711 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir537654649/syzkaller.tyW4Ud/115/bus" dev="sda1" ino=16854 res=1 [ 250.205657] syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 250.342758] Dev loop1: unable to read RDB block 1 [ 250.349114] loop1: unable to read partition table [ 250.365207] loop1: partition table beyond EOD, truncated [ 250.382029] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(0x0, &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 250.503745] Dev loop1: unable to read RDB block 1 [ 250.508657] loop1: unable to read partition table [ 250.527142] loop1: partition table beyond EOD, truncated [ 250.533550] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x8188aea6, &(0x7f0000000280)={0x0, 0x0, [], [0xc1]}) 09:53:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="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") 09:53:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x102d4) recvfrom$inet6(r0, &(0x7f0000001780)=""/4096, 0x1000, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1) 09:53:30 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d2000000000200632020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000fffffdfd0000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:53:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) setxattr$trusted_overlay_origin(0x0, &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0x1000000a0, 0x0) [ 251.175657] Dev loop1: unable to read RDB block 1 [ 251.183454] loop1: unable to read partition table [ 251.199058] audit: type=1800 audit(1556531610.700:179): pid=8757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16852 res=0 [ 251.205633] loop1: partition table beyond EOD, truncated 09:53:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYBLOB="0500060408810780090000e0ffe4"], 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) setxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64\x00', &(0x7f00000003c0)='^system\x00', 0x8, 0x3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) shmat(r4, &(0x7f0000ffd000/0x3000)=nil, 0x0) fstat(r3, &(0x7f0000000240)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) open$dir(&(0x7f0000000140)='./file0\x00', 0x83ffd, 0x84) r5 = creat(0x0, 0xfffffffffffffffc) mkdir(0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0xcfab0f40) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1/file0\x00') utimes(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{}, {0x77359400}}) 09:53:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") [ 251.293257] audit: type=1804 audit(1556531610.700:180): pid=8757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/77/file0" dev="sda1" ino=16852 res=1 [ 251.322650] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:30 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d2000000000200632020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000fffffdfd0000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 251.630478] Dev loop1: unable to read RDB block 1 [ 251.643896] loop1: unable to read partition table [ 251.675212] loop1: partition table beyond EOD, truncated [ 251.710824] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:31 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d2000000000200632020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000fffffdfd0000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:53:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="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") [ 251.971273] Dev loop1: unable to read RDB block 1 09:53:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 252.010545] loop1: unable to read partition table [ 252.046335] loop1: partition table beyond EOD, truncated [ 252.085489] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 252.199169] syz-executor.2 (8769) used greatest stack depth: 24208 bytes left [ 252.291514] audit: type=1800 audit(1556531611.800:181): pid=8800 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16861 res=0 [ 252.394194] audit: type=1804 audit(1556531611.820:182): pid=8800 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/78/file0" dev="sda1" ino=16861 res=1 09:53:32 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) rt_sigreturn() 09:53:32 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 09:53:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="459ca84a2ae92cb81c030f05bf00c07000c4a37bf0c55c41e2e92e36dc460f5a7000660fde978fe97c80660f383a9e02000000e30b3e66430f88f48c0ef8ffffffffb8c4014e4e4e5b5b016d7d14dee560c421045f4607c421dd5831c4e10bf8c45b70c4c4c4a3bd4877f88af7dcdc0fbcafc4e1d91491fa00000064d3cffd51afaf6766f2ab440fec3f67ddeaacc462b1f72ec321f4b9a5604ba419c2c2b0c10b0b0000f08171a30b8a826ec4816016f7a80dd4d466450fc4650000ebeb628f680864360fe25800218de3c02cf52626802d08000000fa49c4f7a1dd7dbbbfdd5c450f91f3ffefffffbedcdc21c9fbc4217ff0ad0000000066474f383ae34ba2f1fb46e2") 09:53:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="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") 09:53:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 253.160129] audit: type=1800 audit(1556531612.661:183): pid=8824 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16876 res=0 09:53:32 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 09:53:32 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 09:53:33 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) 09:53:33 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) 09:53:33 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) 09:53:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 09:53:33 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) 09:53:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="459ca84a2ae92cb81c030f05bf00c07000c4a37bf0c55c41e2e92e36dc460f5a7000660fde978fe97c80660f383a9e02000000e30b3e66430f88f48c0ef8ffffffffb8c4014e4e4e5b5b016d7d14dee560c421045f4607c421dd5831c4e10bf8c45b70c4c4c4a3bd4877f88af7dcdc0fbcafc4e1d91491fa00000064d3cffd51afaf6766f2ab440fec3f67ddeaacc462b1f72ec321f4b9a5604ba419c2c2b0c10b0b0000f08171a30b8a826ec4816016f7a80dd4d466450fc4650000ebeb628f680864360fe25800218de3c02cf52626802d08000000fa49c4f7a1dd7dbbbfdd5c450f91f3ffefffffbedcdc21c9fbc4217ff0ad0000000066474f383ae34ba2f1fb46e2") 09:53:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 09:53:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) [ 254.195564] FAT-fs (loop0): bogus number of reserved sectors [ 254.219114] FAT-fs (loop0): Can't find a valid FAT filesystem [ 254.272179] Dev loop1: unable to read RDB block 1 [ 254.277317] loop1: unable to read partition table [ 254.294902] loop1: partition table beyond EOD, truncated [ 254.313834] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:33 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) 09:53:34 executing program 4: 09:53:34 executing program 4: [ 254.573093] Dev loop1: unable to read RDB block 1 [ 254.578367] loop1: unable to read partition table [ 254.595431] loop1: partition table beyond EOD, truncated [ 254.619589] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:34 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) 09:53:34 executing program 4: 09:53:34 executing program 4: [ 254.771754] Dev loop1: unable to read RDB block 1 [ 254.778058] loop1: unable to read partition table [ 254.798892] loop1: partition table beyond EOD, truncated [ 254.818496] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) [ 255.056982] FAT-fs (loop0): bogus number of reserved sectors [ 255.077388] FAT-fs (loop0): Can't find a valid FAT filesystem [ 255.097559] kauditd_printk_skb: 3 callbacks suppressed [ 255.097566] audit: type=1800 audit(1556531614.597:187): pid=8909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16577 res=0 [ 255.139525] audit: type=1804 audit(1556531614.637:188): pid=8909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/81/file0/file0" dev="sda1" ino=16577 res=1 09:53:35 executing program 4: 09:53:35 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) 09:53:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") 09:53:35 executing program 5: 09:53:35 executing program 3: 09:53:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:35 executing program 5: 09:53:35 executing program 4: [ 256.070533] Dev loop1: unable to read RDB block 1 [ 256.075578] loop1: unable to read partition table [ 256.086346] loop1: partition table beyond EOD, truncated [ 256.086671] audit: type=1800 audit(1556531615.593:189): pid=8930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16488 res=0 [ 256.097695] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 09:53:35 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) [ 256.173757] FAT-fs (loop0): bogus number of reserved sectors [ 256.179991] FAT-fs (loop0): Can't find a valid FAT filesystem 09:53:35 executing program 4: 09:53:35 executing program 5: [ 256.262710] audit: type=1804 audit(1556531615.623:190): pid=8930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir103880423/syzkaller.P0BWae/82/file0" dev="sda1" ino=16488 res=1 09:53:35 executing program 4: 09:53:35 executing program 5: 09:53:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x6, 0x100}, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x0, {0x2, 0x8, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x9}}, 0x43) sendfile(r2, r3, 0x0, 0xc700000e) 09:53:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="459ca84a2ae92cb81c030f05bf00c07000c4a37bf0c55c41e2e92e36dc460f5a7000660fde978fe97c80660f383a9e02000000e30b3e66430f88f48c0ef8ffffffffb8c4014e4e4e5b5b016d7d14dee560c421045f4607c421dd5831c4e10bf8c45b70c4c4c4a3bd4877f88af7dcdc0fbcafc4e1d91491fa00000064d3cffd51afaf6766f2ab440fec3f67ddeaacc462b1f72ec321f4b9a5604ba419c2c2b0c10b0b0000f08171a30b8a826ec4816016f7a80dd4d466450fc4650000ebeb628f680864360fe25800218de3c02cf52626802d08000000fa49c4f7a1dd7dbbbfdd5c450f91f3ffefffffbedcdc21c9fbc4217ff0ad0000000066474f383ae34ba2f1fb46e2") [ 427.990574] INFO: task syz-executor.5:7099 blocked for more than 140 seconds. [ 427.998045] Not tainted 4.14.114 #4 [ 428.008344] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.016395] syz-executor.5 D24824 7099 1 0x00000004 [ 428.027240] Call Trace: [ 428.029853] __schedule+0x7be/0x1cf0 [ 428.033860] ? __mutex_lock+0x737/0x1470 [ 428.037949] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.048725] schedule+0x92/0x1c0 [ 428.052170] schedule_preempt_disabled+0x13/0x20 [ 428.056928] __mutex_lock+0x73c/0x1470 [ 428.065993] ? trace_hardirqs_on+0x10/0x10 [ 428.070382] ? lo_release+0x84/0x1b0 [ 428.074125] ? save_trace+0x250/0x290 [ 428.077938] ? mutex_trylock+0x1c0/0x1c0 [ 428.087322] ? __blkdev_put+0x397/0x7f0 [ 428.091364] ? find_held_lock+0x35/0x130 [ 428.095435] ? __blkdev_put+0x397/0x7f0 [ 428.099421] ? loop_clr_fd+0xae0/0xae0 [ 428.108862] mutex_lock_nested+0x16/0x20 [ 428.112995] ? mutex_lock_nested+0x16/0x20 [ 428.117245] lo_release+0x84/0x1b0 [ 428.125807] ? loop_clr_fd+0xae0/0xae0 [ 428.129725] __blkdev_put+0x436/0x7f0 [ 428.133951] ? bd_set_size+0xb0/0xb0 [ 428.137685] ? wait_for_completion+0x420/0x420 [ 428.147817] blkdev_put+0x88/0x510 [ 428.151471] ? fcntl_setlk+0xb90/0xb90 [ 428.155420] ? blkdev_put+0x510/0x510 [ 428.159252] blkdev_close+0x8b/0xb0 [ 428.167956] __fput+0x277/0x7a0 [ 428.171991] ____fput+0x16/0x20 [ 428.175282] task_work_run+0x119/0x190 [ 428.179203] exit_to_usermode_loop+0x1da/0x220 [ 428.189001] do_syscall_64+0x4a9/0x630 [ 428.192958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.197817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.208213] RIP: 0033:0x412b40 [ 428.211465] RSP: 002b:00007ffd3a556938 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 428.219306] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000412b40 [ 428.233539] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 428.244126] RBP: 00000000000000cd R08: 0000000000000000 R09: 000000000000000a [ 428.253320] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 428.263843] R13: 00007ffd3a556970 R14: 000000000003e93b R15: 00007ffd3a556980 [ 428.272998] INFO: task syz-executor.0:7100 blocked for more than 140 seconds. [ 428.283441] Not tainted 4.14.114 #4 [ 428.287601] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.297441] syz-executor.0 D24992 7100 1 0x00000004 [ 428.306690] Call Trace: [ 428.309294] __schedule+0x7be/0x1cf0 [ 428.314983] ? __mutex_lock+0x737/0x1470 [ 428.319069] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.327677] schedule+0x92/0x1c0 [ 428.332619] schedule_preempt_disabled+0x13/0x20 [ 428.337385] __mutex_lock+0x73c/0x1470 [ 428.344312] ? lo_open+0x1d/0xb0 [ 428.347686] ? refcount_add+0x40/0x50 [ 428.353580] ? mutex_trylock+0x1c0/0x1c0 [ 428.357652] ? exact_match+0xd/0x20 [ 428.364280] ? kobj_lookup+0x319/0x410 [ 428.368183] ? loop_unregister_transfer+0x90/0x90 [ 428.374866] mutex_lock_nested+0x16/0x20 [ 428.378936] ? mutex_lock_nested+0x16/0x20 [ 428.386585] lo_open+0x1d/0xb0 [ 428.389801] __blkdev_get+0xab1/0x1120 [ 428.397168] ? __blkdev_put+0x7f0/0x7f0 [ 428.404310] ? bd_acquire+0x178/0x2c0 [ 428.408131] ? find_held_lock+0x35/0x130 [ 428.413880] blkdev_get+0xa8/0x8e0 [ 428.417441] ? bd_may_claim+0xd0/0xd0 [ 428.424542] ? _raw_spin_unlock+0x2d/0x50 [ 428.428742] blkdev_open+0x1d1/0x260 [ 428.435166] ? security_file_open+0x8f/0x1a0 [ 428.439614] do_dentry_open+0x73e/0xeb0 [ 428.446629] ? bd_acquire+0x2c0/0x2c0 [ 428.452298] vfs_open+0x105/0x230 [ 428.455758] path_openat+0x8bd/0x3f70 [ 428.459569] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 428.467528] ? __alloc_fd+0x1d4/0x4a0 [ 428.473023] do_filp_open+0x18e/0x250 [ 428.476847] ? may_open_dev+0xe0/0xe0 [ 428.484029] ? _raw_spin_unlock+0x2d/0x50 [ 428.488204] ? __alloc_fd+0x1d4/0x4a0 [ 428.493923] do_sys_open+0x2c5/0x430 [ 428.497648] ? filp_open+0x70/0x70 [ 428.504294] SyS_open+0x2d/0x40 [ 428.507588] ? do_sys_open+0x430/0x430 [ 428.513765] do_syscall_64+0x1eb/0x630 [ 428.517695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.525822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.532465] RIP: 0033:0x412d20 [ 428.535669] RSP: 002b:00007ffeb3c7a2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 428.546747] RAX: ffffffffffffffda RBX: 000000000003eb2e RCX: 0000000000412d20 [ 428.555469] RDX: 00007ffeb3c7a38a RSI: 0000000000000002 RDI: 00007ffeb3c7a380 [ 428.566702] RBP: 00000000000000c6 R08: 0000000000000000 R09: 000000000000000a [ 428.575894] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 428.586471] R13: 00007ffeb3c7a330 R14: 000000000003e7f9 R15: 00007ffeb3c7a340 [ 428.595432] INFO: task syz-executor.2:7101 blocked for more than 140 seconds. [ 428.606036] Not tainted 4.14.114 #4 [ 428.611890] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.619857] syz-executor.2 D24992 7101 1 0x00000004 [ 428.628655] Call Trace: [ 428.632682] __schedule+0x7be/0x1cf0 [ 428.636405] ? __mutex_lock+0x737/0x1470 [ 428.643338] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.648364] schedule+0x92/0x1c0 [ 428.653509] schedule_preempt_disabled+0x13/0x20 [ 428.658286] __mutex_lock+0x73c/0x1470 [ 428.665159] ? trace_hardirqs_on+0x10/0x10 [ 428.669421] ? lo_open+0x1d/0xb0 [ 428.674411] ? refcount_add+0x40/0x50 [ 428.678241] ? mutex_trylock+0x1c0/0x1c0 [ 428.685590] ? find_held_lock+0x35/0x130 [ 428.689685] ? disk_get_part+0x9c/0x140 [ 428.695953] ? lock_downgrade+0x6e0/0x6e0 [ 428.702820] ? loop_unregister_transfer+0x90/0x90 [ 428.707661] mutex_lock_nested+0x16/0x20 [ 428.713551] ? mutex_lock_nested+0x16/0x20 [ 428.717808] lo_open+0x1d/0xb0 [ 428.724164] __blkdev_get+0x2c9/0x1120 [ 428.728072] ? __blkdev_put+0x7f0/0x7f0 [ 428.733929] ? bd_acquire+0x178/0x2c0 [ 428.737792] ? find_held_lock+0x35/0x130 [ 428.744869] blkdev_get+0xa8/0x8e0 [ 428.748432] ? bd_may_claim+0xd0/0xd0 [ 428.753883] ? _raw_spin_unlock+0x2d/0x50 [ 428.758066] blkdev_open+0x1d1/0x260 [ 428.765398] ? security_file_open+0x8f/0x1a0 [ 428.769829] do_dentry_open+0x73e/0xeb0 [ 428.775571] ? bd_acquire+0x2c0/0x2c0 [ 428.779407] vfs_open+0x105/0x230 [ 428.785973] path_openat+0x8bd/0x3f70 [ 428.789875] ? trace_hardirqs_on+0x10/0x10 [ 428.798047] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 428.805975] ? find_held_lock+0x35/0x130 [ 428.811940] ? __alloc_fd+0x1d4/0x4a0 [ 428.815760] do_filp_open+0x18e/0x250 [ 428.819562] ? may_open_dev+0xe0/0xe0 [ 428.827401] ? _raw_spin_unlock+0x2d/0x50 [ 428.833182] ? __alloc_fd+0x1d4/0x4a0 [ 428.837007] do_sys_open+0x2c5/0x430 [ 428.844108] ? filp_open+0x70/0x70 [ 428.847664] SyS_open+0x2d/0x40 [ 428.852828] ? do_sys_open+0x430/0x430 [ 428.856749] do_syscall_64+0x1eb/0x630 [ 428.864215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.869090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.876074] RIP: 0033:0x412d20 [ 428.879315] RSP: 002b:00007ffdd221f4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 428.891981] RAX: ffffffffffffffda RBX: 000000000003eb46 RCX: 0000000000412d20 [ 428.899351] RDX: 00007ffdd221f57a RSI: 0000000000000002 RDI: 00007ffdd221f570 [ 428.909147] RBP: 00000000000000ba R08: 0000000000000000 R09: 000000000000000a [ 428.918983] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 428.928745] R13: 00007ffdd221f520 R14: 000000000003e7fa R15: 00007ffdd221f530 [ 428.938520] INFO: task syz-executor.3:7103 blocked for more than 140 seconds. [ 428.948278] Not tainted 4.14.114 #4 [ 428.957925] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.968509] syz-executor.3 D24832 7103 1 0x00000004 [ 428.976613] Call Trace: [ 428.979227] __schedule+0x7be/0x1cf0 [ 428.985664] ? __mutex_lock+0x737/0x1470 [ 428.989768] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.997285] schedule+0x92/0x1c0 [ 429.003273] schedule_preempt_disabled+0x13/0x20 [ 429.008036] __mutex_lock+0x73c/0x1470 [ 429.014467] ? trace_hardirqs_on+0x10/0x10 [ 429.018722] ? lo_open+0x1d/0xb0 [ 429.024656] ? refcount_add+0x40/0x50 [ 429.028484] ? mutex_trylock+0x1c0/0x1c0 [ 429.036018] ? find_held_lock+0x35/0x130 [ 429.042534] ? disk_get_part+0x9c/0x140 [ 429.046534] ? lock_downgrade+0x6e0/0x6e0 [ 429.053240] ? loop_unregister_transfer+0x90/0x90 [ 429.058114] mutex_lock_nested+0x16/0x20 [ 429.064714] ? mutex_lock_nested+0x16/0x20 [ 429.068967] lo_open+0x1d/0xb0 [ 429.074708] __blkdev_get+0x2c9/0x1120 [ 429.078643] ? __blkdev_put+0x7f0/0x7f0 [ 429.086004] ? bd_acquire+0x178/0x2c0 [ 429.089825] ? find_held_lock+0x35/0x130 [ 429.096671] blkdev_get+0xa8/0x8e0 [ 429.102681] ? bd_may_claim+0xd0/0xd0 [ 429.106497] ? _raw_spin_unlock+0x2d/0x50 [ 429.113874] blkdev_open+0x1d1/0x260 [ 429.117604] ? security_file_open+0x8f/0x1a0 [ 429.124696] do_dentry_open+0x73e/0xeb0 [ 429.128705] ? bd_acquire+0x2c0/0x2c0 [ 429.135007] vfs_open+0x105/0x230 [ 429.138493] path_openat+0x8bd/0x3f70 [ 429.144875] ? trace_hardirqs_on+0x10/0x10 [ 429.149136] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 429.156330] ? find_held_lock+0x35/0x130 [ 429.162902] ? __alloc_fd+0x1d4/0x4a0 [ 429.166717] do_filp_open+0x18e/0x250 [ 429.173042] ? may_open_dev+0xe0/0xe0 [ 429.176887] ? _raw_spin_unlock+0x2d/0x50 [ 429.183445] ? __alloc_fd+0x1d4/0x4a0 [ 429.187268] do_sys_open+0x2c5/0x430 [ 429.195325] ? filp_open+0x70/0x70 [ 429.198912] SyS_open+0x2d/0x40 [ 429.204898] ? do_sys_open+0x430/0x430 [ 429.208815] do_syscall_64+0x1eb/0x630 [ 429.216003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.223429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.228706] RIP: 0033:0x412d20 [ 429.234378] RSP: 002b:00007ffc94775878 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 429.244561] RAX: ffffffffffffffda RBX: 000000000003e7b2 RCX: 0000000000412d20 [ 429.254353] RDX: 00007ffc9477590a RSI: 0000000000000002 RDI: 00007ffc94775900 [ 429.264040] RBP: 000000000000005b R08: 0000000000000000 R09: 000000000000000a [ 429.275421] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 429.285115] R13: 00007ffc947758b0 R14: 000000000003e48b R15: 00007ffc947758c0 [ 429.295053] INFO: task syz-executor.4:7104 blocked for more than 140 seconds. [ 429.304809] Not tainted 4.14.114 #4 [ 429.308963] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.319454] syz-executor.4 D24992 7104 1 0x00000004 [ 429.327529] Call Trace: [ 429.332657] __schedule+0x7be/0x1cf0 [ 429.336404] ? __mutex_lock+0x737/0x1470 [ 429.344083] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.349154] schedule+0x92/0x1c0 [ 429.356889] schedule_preempt_disabled+0x13/0x20 [ 429.364050] __mutex_lock+0x73c/0x1470 [ 429.367978] ? lo_ioctl+0x87/0x1c70 [ 429.374143] ? lock_downgrade+0x620/0x6e0 [ 429.378327] ? mutex_trylock+0x1c0/0x1c0 [ 429.384999] ? avc_has_extended_perms+0x8ec/0xe40 [ 429.389893] ? putname+0xdb/0x120 [ 429.395934] ? avc_ss_reset+0x110/0x110 [ 429.399943] ? kasan_slab_free+0x75/0xc0 [ 429.406599] mutex_lock_nested+0x16/0x20 [ 429.413186] ? mutex_lock_nested+0x16/0x20 [ 429.417453] lo_ioctl+0x87/0x1c70 [ 429.423643] ? loop_probe+0x160/0x160 [ 429.427475] blkdev_ioctl+0x983/0x1880 [ 429.434000] ? blkpg_ioctl+0x980/0x980 [ 429.437935] ? __might_sleep+0x93/0xb0 [ 429.444475] block_ioctl+0xde/0x120 [ 429.448160] ? blkdev_fallocate+0x3b0/0x3b0 [ 429.455445] do_vfs_ioctl+0x7b9/0x1070 [ 429.459402] ? selinux_file_mprotect+0x5d0/0x5d0 [ 429.466709] ? ioctl_preallocate+0x1c0/0x1c0 [ 429.474440] ? putname+0xe0/0x120 [ 429.477930] ? do_sys_open+0x221/0x430 [ 429.484427] ? security_file_ioctl+0x83/0xc0 [ 429.488862] ? security_file_ioctl+0x8f/0xc0 [ 429.495794] SyS_ioctl+0x8f/0xc0 [ 429.499200] ? do_vfs_ioctl+0x1070/0x1070 [ 429.505864] do_syscall_64+0x1eb/0x630 [ 429.509790] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.517758] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.525377] RIP: 0033:0x458c17 [ 429.528596] RSP: 002b:00007ffca5608c98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.538864] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c17 [ 429.548640] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 429.558569] RBP: 0000000000000088 R08: 0000000000000000 R09: 000000000000000a [ 429.568348] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 429.578458] R13: 00007ffca5608cd0 R14: 000000000003e93a R15: 00007ffca5608ce0 [ 429.588372] INFO: task syz-executor.1:8944 blocked for more than 140 seconds. [ 429.598370] Not tainted 4.14.114 #4 [ 429.605706] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.616257] syz-executor.1 D29120 8944 7102 0x00000004 [ 429.624351] Call Trace: [ 429.626981] __schedule+0x7be/0x1cf0 [ 429.633456] ? __mutex_lock+0x737/0x1470 [ 429.637560] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.645231] schedule+0x92/0x1c0 [ 429.648634] schedule_preempt_disabled+0x13/0x20 [ 429.655941] __mutex_lock+0x73c/0x1470 [ 429.659879] ? blkdev_reread_part+0x1f/0x40 [ 429.666706] ? mutex_trylock+0x1c0/0x1c0 [ 429.673337] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 429.678567] ? __wake_up_common_lock+0xe3/0x160 [ 429.685757] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 429.693261] mutex_lock_nested+0x16/0x20 [ 429.697338] ? mutex_lock_nested+0x16/0x20 [ 429.704077] blkdev_reread_part+0x1f/0x40 [ 429.708257] loop_reread_partitions+0x7c/0x90 [ 429.715333] loop_set_status+0xc28/0x1200 [ 429.719501] loop_set_status64+0xa6/0xf0 [ 429.726099] ? loop_set_status_old+0x2d0/0x2d0 [ 429.733825] lo_ioctl+0x5c1/0x1c70 [ 429.737382] ? loop_probe+0x160/0x160 [ 429.743685] blkdev_ioctl+0x983/0x1880 [ 429.747615] ? blkpg_ioctl+0x980/0x980 [ 429.754010] ? __might_sleep+0x93/0xb0 [ 429.757933] ? __fget+0x210/0x370 [ 429.764038] block_ioctl+0xde/0x120 [ 429.767703] ? blkdev_fallocate+0x3b0/0x3b0 [ 429.774582] do_vfs_ioctl+0x7b9/0x1070 [ 429.778487] ? selinux_file_mprotect+0x5d0/0x5d0 [ 429.785739] ? lock_downgrade+0x6e0/0x6e0 [ 429.789914] ? ioctl_preallocate+0x1c0/0x1c0 [ 429.796762] ? __fget+0x237/0x370 [ 429.802611] ? security_file_ioctl+0x8f/0xc0 [ 429.807037] SyS_ioctl+0x8f/0xc0 [ 429.812941] ? do_vfs_ioctl+0x1070/0x1070 [ 429.817123] do_syscall_64+0x1eb/0x630 [ 429.823563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.828434] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.838050] RIP: 0033:0x458c17 [ 429.843776] RSP: 002b:00007f4bad8a09f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 429.854014] RAX: ffffffffffffffda RBX: 00007f4bad8a16d4 RCX: 0000000000458c17 [ 429.864535] RDX: 00007f4bad8a0ab0 RSI: 0000000000004c04 RDI: 0000000000000004 [ 429.874453] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 429.884200] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 429.894044] R13: 0000000000000003 R14: 0000000000000004 R15: 00000000ffffffff [ 429.903809] INFO: task blkid:8941 blocked for more than 140 seconds. [ 429.912844] Not tainted 4.14.114 #4 [ 429.917003] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.927625] blkid D29040 8941 7062 0x00000004 [ 429.935795] Call Trace: [ 429.938407] __schedule+0x7be/0x1cf0 [ 429.944695] ? __mutex_lock+0x737/0x1470 [ 429.948776] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.957007] schedule+0x92/0x1c0 [ 429.963579] schedule_preempt_disabled+0x13/0x20 [ 429.968412] __mutex_lock+0x73c/0x1470 [ 429.974990] ? lo_ioctl+0x87/0x1c70 [ 429.978648] ? lock_downgrade+0x621/0x6e0 [ 429.985295] ? mutex_trylock+0x1c0/0x1c0 [ 429.989375] ? avc_has_extended_perms+0x8ec/0xe40 [ 429.999914] ? __might_fault+0x110/0x1d0 [ 430.006467] ? avc_ss_reset+0x110/0x110 [ 430.012892] mutex_lock_nested+0x16/0x20 [ 430.016972] ? mutex_lock_nested+0x16/0x20 [ 430.023666] lo_ioctl+0x87/0x1c70 [ 430.027161] ? loop_probe+0x160/0x160 [ 430.033442] blkdev_ioctl+0x983/0x1880 [ 430.037372] ? blkpg_ioctl+0x980/0x980 [ 430.043863] ? __might_sleep+0x93/0xb0 [ 430.047763] ? save_trace+0x290/0x290 [ 430.054016] block_ioctl+0xde/0x120 [ 430.057670] ? blkdev_fallocate+0x3b0/0x3b0 [ 430.064422] do_vfs_ioctl+0x7b9/0x1070 [ 430.068320] ? selinux_file_mprotect+0x5d0/0x5d0 [ 430.076720] ? ioctl_preallocate+0x1c0/0x1c0 [ 430.083590] ? lock_downgrade+0x6e0/0x6e0 [ 430.087755] ? security_file_ioctl+0x83/0xc0 [ 430.094497] ? security_file_ioctl+0x8f/0xc0 [ 430.098914] SyS_ioctl+0x8f/0xc0 [ 430.104574] ? do_vfs_ioctl+0x1070/0x1070 [ 430.108768] do_syscall_64+0x1eb/0x630 [ 430.114936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.119813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.127981] RIP: 0033:0x7f52df0d7347 [ 430.133988] RSP: 002b:00007ffd50326a38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 430.144333] RAX: ffffffffffffffda RBX: 0000000000632030 RCX: 00007f52df0d7347 [ 430.153687] RDX: 0000000000000000 RSI: 0000000000005331 RDI: 0000000000000003 [ 430.163482] RBP: 0000000000000003 R08: 00007f52df3875a0 R09: 0000000000000008 [ 430.173243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 430.182898] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 430.192564] INFO: task blkid:8942 blocked for more than 140 seconds. [ 430.199065] Not tainted 4.14.114 #4 [ 430.206541] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 430.216932] blkid D29040 8942 7260 0x00000004 [ 430.225181] Call Trace: [ 430.227842] __schedule+0x7be/0x1cf0 [ 430.233904] ? __mutex_lock+0x737/0x1470 [ 430.237985] ? pci_mmcfg_check_reserved+0x150/0x150 [ 430.245411] schedule+0x92/0x1c0 [ 430.248808] schedule_preempt_disabled+0x13/0x20 [ 430.256519] __mutex_lock+0x73c/0x1470 [ 430.262889] ? lo_open+0x1d/0xb0 [ 430.266274] ? refcount_add+0x40/0x50 [ 430.272557] ? mutex_trylock+0x1c0/0x1c0 [ 430.276626] ? exact_match+0xd/0x20 [ 430.282509] ? kobj_lookup+0x319/0x410 [ 430.286419] ? loop_unregister_transfer+0x90/0x90 [ 430.293533] mutex_lock_nested+0x16/0x20 [ 430.297615] ? mutex_lock_nested+0x16/0x20 [ 430.304209] lo_open+0x1d/0xb0 [ 430.307422] __blkdev_get+0xab1/0x1120 [ 430.317080] ? __blkdev_put+0x7f0/0x7f0 [ 430.323263] ? bd_acquire+0x178/0x2c0 [ 430.327096] ? find_held_lock+0x35/0x130 [ 430.333296] blkdev_get+0xa8/0x8e0 [ 430.336845] ? bd_may_claim+0xd0/0xd0 [ 430.342945] ? _raw_spin_unlock+0x2d/0x50 [ 430.347115] blkdev_open+0x1d1/0x260 [ 430.353143] ? security_file_open+0x8f/0x1a0 [ 430.357597] do_dentry_open+0x73e/0xeb0 [ 430.363880] ? bd_acquire+0x2c0/0x2c0 [ 430.367704] vfs_open+0x105/0x230 [ 430.373242] path_openat+0x8bd/0x3f70 [ 430.377092] ? trace_hardirqs_on+0x10/0x10 [ 430.384507] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 430.389192] ? find_held_lock+0x35/0x130 [ 430.395946] ? __alloc_fd+0x1d4/0x4a0 [ 430.399767] do_filp_open+0x18e/0x250 [ 430.406011] ? may_open_dev+0xe0/0xe0 [ 430.409848] ? _raw_spin_unlock+0x2d/0x50 [ 430.416499] ? __alloc_fd+0x1d4/0x4a0 [ 430.422736] do_sys_open+0x2c5/0x430 [ 430.426493] ? filp_open+0x70/0x70 [ 430.432691] SyS_open+0x2d/0x40 [ 430.435999] ? do_sys_open+0x430/0x430 [ 430.439894] do_syscall_64+0x1eb/0x630 [ 430.446313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.453583] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.458801] RIP: 0033:0x7f37f69b5120 [ 430.465101] RSP: 002b:00007ffd45992908 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 430.475294] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f37f69b5120 [ 430.485233] RDX: 00007ffd45993f34 RSI: 0000000000000000 RDI: 00007ffd45993f34 [ 430.494919] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 430.504672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001f16030 [ 430.515136] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 430.525653] INFO: task blkid:8943 blocked for more than 140 seconds. [ 430.534481] Not tainted 4.14.114 #4 [ 430.538666] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 430.549171] blkid D28808 8943 7063 0x00000004 [ 430.557466] Call Trace: [ 430.562626] __schedule+0x7be/0x1cf0 [ 430.566368] ? __mutex_lock+0x737/0x1470 [ 430.573026] ? pci_mmcfg_check_reserved+0x150/0x150 [ 430.578389] schedule+0x92/0x1c0 [ 430.584286] schedule_preempt_disabled+0x13/0x20 [ 430.589073] __mutex_lock+0x73c/0x1470 [ 430.595605] ? lo_open+0x1d/0xb0 [ 430.598991] ? refcount_add+0x40/0x50 [ 430.605305] ? mutex_trylock+0x1c0/0x1c0 [ 430.609385] ? exact_match+0xd/0x20 [ 430.615634] ? kobj_lookup+0x319/0x410 [ 430.619550] ? loop_unregister_transfer+0x90/0x90 [ 430.626955] mutex_lock_nested+0x16/0x20 [ 430.633507] ? mutex_lock_nested+0x16/0x20 [ 430.637756] lo_open+0x1d/0xb0 [ 430.644180] __blkdev_get+0xab1/0x1120 [ 430.648104] ? __blkdev_put+0x7f0/0x7f0 [ 430.654912] ? bd_acquire+0x178/0x2c0 [ 430.658754] ? find_held_lock+0x35/0x130 [ 430.665336] blkdev_get+0xa8/0x8e0 [ 430.668897] ? bd_may_claim+0xd0/0xd0 [ 430.675186] ? _raw_spin_unlock+0x2d/0x50 [ 430.679347] blkdev_open+0x1d1/0x260 [ 430.685633] ? security_file_open+0x8f/0x1a0 [ 430.692390] do_dentry_open+0x73e/0xeb0 [ 430.696376] ? bd_acquire+0x2c0/0x2c0 [ 430.702566] vfs_open+0x105/0x230 [ 430.706054] path_openat+0x8bd/0x3f70 [ 430.709907] ? trace_hardirqs_on+0x10/0x10 [ 430.716562] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 430.723545] ? find_held_lock+0x35/0x130 [ 430.727626] ? __alloc_fd+0x1d4/0x4a0 [ 430.733903] do_filp_open+0x18e/0x250 [ 430.737711] ? may_open_dev+0xe0/0xe0 [ 430.743873] ? _raw_spin_unlock+0x2d/0x50 [ 430.748029] ? __alloc_fd+0x1d4/0x4a0 [ 430.754255] do_sys_open+0x2c5/0x430 [ 430.757981] ? filp_open+0x70/0x70 [ 430.764116] SyS_open+0x2d/0x40 [ 430.767423] ? do_sys_open+0x430/0x430 [ 430.774422] do_syscall_64+0x1eb/0x630 [ 430.778344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.785358] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.792810] RIP: 0033:0x7f69b68d9120 [ 430.796560] RSP: 002b:00007ffde36ba2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 430.806780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f69b68d9120 [ 430.816452] RDX: 00007ffde36bbf34 RSI: 0000000000000000 RDI: 00007ffde36bbf34 [ 430.826042] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 430.835631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002189030 [ 430.845222] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 430.854817] INFO: task blkid:8946 blocked for more than 140 seconds. [ 430.863584] Not tainted 4.14.114 #4 [ 430.867734] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 430.882779] blkid D29040 8946 7268 0x00000004 [ 430.888422] Call Trace: [ 430.892712] __schedule+0x7be/0x1cf0 [ 430.896458] ? __mutex_lock+0x737/0x1470 [ 430.904493] ? pci_mmcfg_check_reserved+0x150/0x150 [ 430.909524] schedule+0x92/0x1c0 [ 430.914349] schedule_preempt_disabled+0x13/0x20 [ 430.919112] __mutex_lock+0x73c/0x1470 [ 430.925985] ? __mutex_unlock_slowpath+0x71/0x800 [ 430.932137] ? __blkdev_get+0x145/0x1120 [ 430.936210] ? mutex_trylock+0x1c0/0x1c0 [ 430.942861] ? exact_match+0xd/0x20 [ 430.946502] ? kobj_lookup+0x319/0x410 [ 430.951936] ? blkdev_ioctl+0x1880/0x1880 [ 430.956138] mutex_lock_nested+0x16/0x20 [ 430.963104] ? mutex_lock_nested+0x16/0x20 [ 430.967374] __blkdev_get+0x145/0x1120 [ 430.972616] ? __blkdev_put+0x7f0/0x7f0 [ 430.976601] ? bd_acquire+0x178/0x2c0 [ 430.983533] ? find_held_lock+0x35/0x130 [ 430.987601] blkdev_get+0xa8/0x8e0 [ 430.992725] ? bd_may_claim+0xd0/0xd0 [ 430.996538] ? _raw_spin_unlock+0x2d/0x50 [ 431.003600] blkdev_open+0x1d1/0x260 [ 431.007335] ? security_file_open+0x8f/0x1a0 [ 431.013511] do_dentry_open+0x73e/0xeb0 [ 431.017494] ? bd_acquire+0x2c0/0x2c0 [ 431.024287] vfs_open+0x105/0x230 [ 431.027754] path_openat+0x8bd/0x3f70 [ 431.034919] ? trace_hardirqs_on+0x10/0x10 [ 431.039185] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 431.046998] ? find_held_lock+0x35/0x130 [ 431.052651] ? __alloc_fd+0x1d4/0x4a0 [ 431.056461] do_filp_open+0x18e/0x250 [ 431.063518] ? may_open_dev+0xe0/0xe0 [ 431.067341] ? _raw_spin_unlock+0x2d/0x50 [ 431.072987] ? __alloc_fd+0x1d4/0x4a0 [ 431.076808] do_sys_open+0x2c5/0x430 [ 431.083312] ? filp_open+0x70/0x70 [ 431.086866] SyS_open+0x2d/0x40 [ 431.091862] ? do_sys_open+0x430/0x430 [ 431.095753] do_syscall_64+0x1eb/0x630 [ 431.099629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.107653] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.115879] RIP: 0033:0x7f70e3436120 [ 431.119598] RSP: 002b:00007fff0166fd08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 431.132144] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70e3436120 [ 431.139420] RDX: 00007fff01670f34 RSI: 0000000000000000 RDI: 00007fff01670f34 [ 431.148743] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 431.158296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000d38030 [ 431.168496] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 431.178151] [ 431.178151] Showing all locks held in the system: [ 431.186689] 1 lock held by khungtaskd/1008: [ 431.191275] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 431.200406] 2 locks held by getty/7055: [ 431.204379] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.213145] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.222492] 2 locks held by getty/7056: [ 431.226476] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.235233] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.244620] 2 locks held by getty/7057: [ 431.248596] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.257376] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.266726] 2 locks held by getty/7058: [ 431.270787] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.279494] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.288839] 2 locks held by getty/7059: [ 431.292893] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.301625] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.312576] 2 locks held by getty/7060: [ 431.316555] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.325312] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.334686] 2 locks held by getty/7061: [ 431.338664] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 431.347894] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 431.357291] 3 locks held by syz-executor.5/7099: [ 431.362129] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 431.370718] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x1e/0x1b0 [ 431.379158] #2: (loop_ctl_mutex#2){+.+.}, at: [] lo_release+0x84/0x1b0 [ 431.387693] 2 locks held by syz-executor.0/7100: [ 431.392528] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.401297] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 431.409387] 2 locks held by syz-executor.2/7101: [ 431.414220] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.422964] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 431.431172] 2 locks held by syz-executor.3/7103: [ 431.435934] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.444697] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 431.453101] 1 lock held by syz-executor.4/7104: [ 431.457769] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 431.466200] 2 locks held by syz-executor.1/8944: [ 431.471026] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 431.479394] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 431.488461] 1 lock held by blkid/8941: [ 431.492419] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 431.500842] 2 locks held by blkid/8942: [ 431.504815] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.513580] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 431.521716] 2 locks held by blkid/8943: [ 431.525735] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.534560] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 431.542724] 1 lock held by blkid/8946: [ 431.546605] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 431.555372] [ 431.557006] ============================================= [ 431.557006] [ 431.565397] NMI backtrace for cpu 0 [ 431.569046] CPU: 0 PID: 1008 Comm: khungtaskd Not tainted 4.14.114 #4 [ 431.575642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.585001] Call Trace: [ 431.587606] dump_stack+0x138/0x19c [ 431.591256] nmi_cpu_backtrace.cold+0x57/0x94 [ 431.595776] ? irq_force_complete_move.cold+0x7d/0x7d [ 431.600987] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 431.606291] arch_trigger_cpumask_backtrace+0x14/0x20 [ 431.611499] watchdog+0x5e7/0xb90 [ 431.614976] kthread+0x31c/0x430 [ 431.618363] ? hungtask_pm_notify+0x60/0x60 [ 431.622708] ? kthread_create_on_node+0xd0/0xd0 [ 431.627389] ret_from_fork+0x3a/0x50 [ 431.631238] Sending NMI from CPU 0 to CPUs 1: [ 431.636005] NMI backtrace for cpu 1 [ 431.636010] CPU: 1 PID: 7603 Comm: syz-executor.2 Not tainted 4.14.114 #4 [ 431.636014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.636017] task: ffff888058b38380 task.stack: ffff888058f20000 [ 431.636020] RIP: 0010:lock_acquire+0x15e/0x430 [ 431.636023] RSP: 0018:ffff888058f27e00 EFLAGS: 00000086 [ 431.636029] RAX: 0000000000000000 RBX: ffff888058b38380 RCX: 0000000000000002 [ 431.636032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8778ef60 [ 431.636036] RBP: ffff888058f27e68 R08: 0000000000000000 R09: 0000000000000282 [ 431.636039] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8778ef60 [ 431.636043] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 431.636046] FS: 00007f3ce7bdc700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 431.636049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 431.636053] CR2: 0000000000000000 CR3: 000000009532e000 CR4: 00000000001406e0 [ 431.636055] Call Trace: [ 431.636068] ? SyS_ioprio_get+0x4c8/0xa00 [ 431.636071] SyS_ioprio_get+0x4f7/0xa00 [ 431.636074] ? SyS_ioprio_get+0x4c8/0xa00 [ 431.636076] ? do_syscall_64+0x53/0x630 [ 431.636078] ? ioprio_best+0x50/0x50 [ 431.636081] do_syscall_64+0x1eb/0x630 [ 431.636084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.636086] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.636088] RIP: 0033:0x20000553 [ 431.636098] RSP: 002b:00007f3ce7bdbbd8 EFLAGS: 00000297 ORIG_RAX: 00000000000000fc [ 431.636104] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 0000000020000553 [ 431.636107] RDX: 74dcc826bd53a815 RSI: 0000000000000000 RDI: 0000000000000003 [ 431.636111] RBP: 00000000000000c6 R08: 0000000000000005 R09: 0000000000000006 [ 431.636114] R10: 0000000000000007 R11: 0000000000000297 R12: 000000000000000b [ 431.636118] R13: 000000000000000c R14: 000000000000000d R15: 00000000ffffffff [ 431.636119] Code: 48 0f a3 05 65 9e dc 06 0f 82 c1 01 00 00 4c 8b 4d c8 44 89 f2 6a 00 4c 89 e7 6a 00 45 89 d8 44 89 f9 44 89 ee ff 75 10 ff 75 d0 <49> c1 e9 09 49 83 f1 01 41 83 e1 01 e8 31 9e ff ff 48 b8 00 00 [ 431.637487] Kernel panic - not syncing: hung_task: blocked tasks [ 431.839132] CPU: 0 PID: 1008 Comm: khungtaskd Not tainted 4.14.114 #4 [ 431.845714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.855093] Call Trace: [ 431.857704] dump_stack+0x138/0x19c [ 431.861356] panic+0x1f2/0x438 [ 431.864554] ? add_taint.cold+0x16/0x16 [ 431.868536] ? ___preempt_schedule+0x16/0x18 [ 431.872979] watchdog+0x5f8/0xb90 [ 431.876444] kthread+0x31c/0x430 [ 431.879817] ? hungtask_pm_notify+0x60/0x60 [ 431.884171] ? kthread_create_on_node+0xd0/0xd0 [ 431.888849] ret_from_fork+0x3a/0x50 [ 431.893780] Kernel Offset: disabled [ 431.897409] Rebooting in 86400 seconds..