[ 33.497108] kauditd_printk_skb: 8 callbacks suppressed [ 33.497114] audit: type=1800 audit(1570742648.567:33): pid=6881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 33.524255] audit: type=1800 audit(1570742648.567:34): pid=6881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.289945] random: sshd: uninitialized urandom read (32 bytes read) [ 38.565245] audit: type=1400 audit(1570742653.637:35): avc: denied { map } for pid=7054 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.609270] random: sshd: uninitialized urandom read (32 bytes read) [ 39.219726] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.7' (ECDSA) to the list of known hosts. [ 44.942277] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/10 21:24:20 fuzzer started [ 45.138443] audit: type=1400 audit(1570742660.207:36): avc: denied { map } for pid=7063 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.925218] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/10 21:24:21 dialing manager at 10.128.0.105:34941 2019/10/10 21:24:27 syscalls: 2500 2019/10/10 21:24:27 code coverage: enabled 2019/10/10 21:24:27 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/10 21:24:27 extra coverage: extra coverage is not supported by the kernel 2019/10/10 21:24:27 setuid sandbox: enabled 2019/10/10 21:24:27 namespace sandbox: enabled 2019/10/10 21:24:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 21:24:27 fault injection: enabled 2019/10/10 21:24:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 21:24:27 net packet injection: enabled 2019/10/10 21:24:27 net device setup: enabled 2019/10/10 21:24:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist [ 53.782278] random: crng init done 21:25:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]}) 21:25:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r3, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 107.602043] audit: type=1400 audit(1570742722.677:37): avc: denied { map } for pid=7063 comm="syz-fuzzer" path="/root/syzkaller-shm517977421" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 21:25:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1) 21:25:22 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) 21:25:22 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:25:22 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0) [ 107.629048] audit: type=1400 audit(1570742722.677:38): avc: denied { map } for pid=7080 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=23 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 107.930924] IPVS: ftp: loaded support on port[0] = 21 [ 108.699217] chnl_net:caif_netlink_parms(): no params data found [ 108.707319] IPVS: ftp: loaded support on port[0] = 21 [ 108.741553] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.748295] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.755505] device bridge_slave_0 entered promiscuous mode [ 108.762669] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.769056] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.776131] device bridge_slave_1 entered promiscuous mode [ 108.802525] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 108.813163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 108.836087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.843511] team0: Port device team_slave_0 added [ 108.849125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.856383] team0: Port device team_slave_1 added [ 108.857435] IPVS: ftp: loaded support on port[0] = 21 [ 108.861730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 108.874177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 108.932508] device hsr_slave_0 entered promiscuous mode [ 108.980335] device hsr_slave_1 entered promiscuous mode [ 109.060818] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 109.071071] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 109.101358] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.107933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.115003] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.121402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.148702] chnl_net:caif_netlink_parms(): no params data found [ 109.194529] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.201084] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.207982] device bridge_slave_0 entered promiscuous mode [ 109.216529] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.223153] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.229983] device bridge_slave_1 entered promiscuous mode [ 109.251298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.268324] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.292518] IPVS: ftp: loaded support on port[0] = 21 [ 109.304694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 109.312298] team0: Port device team_slave_0 added [ 109.333372] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.341808] team0: Port device team_slave_1 added [ 109.348829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.356448] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 109.442942] device hsr_slave_0 entered promiscuous mode [ 109.490412] device hsr_slave_1 entered promiscuous mode [ 109.540378] chnl_net:caif_netlink_parms(): no params data found [ 109.548605] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 109.557528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 109.565385] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 109.571589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.594682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 109.614859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.623283] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.640826] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.649080] IPVS: ftp: loaded support on port[0] = 21 [ 109.661623] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 109.667717] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.682267] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.688670] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.696135] device bridge_slave_0 entered promiscuous mode [ 109.703274] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.709622] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.716974] device bridge_slave_1 entered promiscuous mode [ 109.732554] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 109.741136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 109.761362] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.769630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 109.779586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 109.801773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.809706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.817943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.825761] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.832142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.839019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.847452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.855063] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.861531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.870937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 109.880750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 109.911968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.919646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.930790] chnl_net:caif_netlink_parms(): no params data found [ 109.953954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.967320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.979052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.986853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.994391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.002140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.009566] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.023715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.031058] team0: Port device team_slave_0 added [ 110.037722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 110.057375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.065530] team0: Port device team_slave_1 added [ 110.070899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.078492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.091469] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.097830] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.106017] device bridge_slave_0 entered promiscuous mode [ 110.112696] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.124276] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.130740] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.137708] device bridge_slave_1 entered promiscuous mode [ 110.144837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 110.155187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.178148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.188519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.198002] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 110.204411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.214128] IPVS: ftp: loaded support on port[0] = 21 [ 110.272542] device hsr_slave_0 entered promiscuous mode [ 110.310406] device hsr_slave_1 entered promiscuous mode [ 110.355260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 110.364359] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 110.380502] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 110.401094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 110.438913] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 110.447191] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 110.459474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.466858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.475954] team0: Port device team_slave_0 added [ 110.481850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.488861] team0: Port device team_slave_1 added [ 110.534431] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 110.541815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.555040] chnl_net:caif_netlink_parms(): no params data found [ 110.568095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 110.575787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.584306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.595399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.607079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.630847] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 110.636956] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.687030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 110.732129] device hsr_slave_0 entered promiscuous mode [ 110.780428] device hsr_slave_1 entered promiscuous mode [ 110.820583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.828272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.835982] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.842554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.857425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 110.873749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 110.880946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 110.887589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.894797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.902902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.910652] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.917016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.924575] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.933004] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.940735] device bridge_slave_0 entered promiscuous mode [ 110.947977] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.954784] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.962204] device bridge_slave_1 entered promiscuous mode [ 111.009835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 111.054271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.062880] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 111.072374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 111.089419] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 111.104004] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 111.112666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.126679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.138461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 21:25:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]}) [ 111.158249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 111.167299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.177953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.189520] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.198113] chnl_net:caif_netlink_parms(): no params data found [ 111.226379] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.241803] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.249826] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 111.260476] 8021q: adding VLAN 0 to HW filter on device team0 21:25:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]}) [ 111.276322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 111.296314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.309318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.316671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:25:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]}) [ 111.328797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.346369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.355884] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 111.370710] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 111.389573] team0: Port device team_slave_0 added 21:25:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) [ 111.411439] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 111.418745] team0: Port device team_slave_1 added [ 111.433122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 111.447374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.460916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.468663] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.475066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.482623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.491529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.499183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.509172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.526216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 111.541112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.549420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.559479] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.565914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.585258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 111.593954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.605124] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 21:25:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) [ 111.611222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.628754] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.636164] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.648890] device bridge_slave_0 entered promiscuous mode [ 111.657040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.665252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.674263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 111.703738] device hsr_slave_0 entered promiscuous mode [ 111.720314] protocol 88fb is buggy, dev hsr_slave_0 [ 111.725594] protocol 88fb is buggy, dev hsr_slave_1 [ 111.740569] device hsr_slave_1 entered promiscuous mode 21:25:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) [ 111.780709] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.787169] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.794477] device bridge_slave_1 entered promiscuous mode [ 111.805825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.817829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.832173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 111.843161] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 111.856074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.864876] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 111.874412] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.882272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 111.892052] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 111.899056] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 111.911759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 111.924767] 8021q: adding VLAN 0 to HW filter on device batadv0 21:25:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) [ 111.932057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.939660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.962854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.975911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.983708] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.997439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.007734] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.021913] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.035542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.046551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.067110] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 112.073532] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.081353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 112.099691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 112.107183] team0: Port device team_slave_0 added [ 112.114704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 112.123523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.131467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.139253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.147585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.157376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.167503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 112.175279] team0: Port device team_slave_1 added [ 112.182679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.193408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.203378] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.209746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.218697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.229255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 112.237037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 112.244702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.252051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.259775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.267478] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.273855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.283375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.295010] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 112.302548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.324241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:25:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) close(r1) close(r2) [ 112.348751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.362367] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 112.405234] device hsr_slave_0 entered promiscuous mode [ 112.450463] device hsr_slave_1 entered promiscuous mode [ 112.490454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.499714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 112.508486] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.519011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 112.526440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.538506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.547326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.557267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 112.573296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 112.584281] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 112.595804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.605222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.613141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.622573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.632510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.639919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.652530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 112.663190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 112.674085] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 112.685152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.693856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.701952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.710773] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.719152] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 112.729098] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.742692] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 112.750731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.757729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.768943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.778052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.785916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.794634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.806548] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.813167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.820477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.832483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.843513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.853800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.863894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.873927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.882407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.890623] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.896982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.904731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.913107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.925296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 112.939207] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 112.946932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.954995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.963698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.971560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.994519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 113.002996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.013489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.023420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.032552] ISOFS: Invalid session number or type of track [ 113.043727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 113.055467] ISOFS: Invalid session number [ 113.065794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.080513] ISOFS: Unable to identify CD-ROM format. [ 113.085206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.093747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.103245] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 113.109264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.119120] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 113.151413] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 113.158709] ISOFS: Invalid session number or type of track [ 113.167110] ISOFS: Invalid session number [ 113.175697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.187382] ISOFS: Unable to identify CD-ROM format. [ 113.187630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.206175] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 113.214830] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.226810] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 113.238021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 113.246633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.256521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.265203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.273463] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.279808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.293541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.302013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.313213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.321950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.329580] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.335989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.345246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.353240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.365313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.375787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.387891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.399059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.409247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.418813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.426648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.434682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.442452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:25:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1) [ 113.467894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 113.478870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.487353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.501769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 113.511441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.518959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.528858] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 113.535365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.551300] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 113.562270] 8021q: adding VLAN 0 to HW filter on device batadv0 21:25:29 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) 21:25:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 21:25:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0) 21:25:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0) 21:25:29 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:25:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1) 21:25:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0) 21:25:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1) [ 114.685657] ISOFS: Invalid session number or type of track 21:25:29 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) [ 114.743877] ISOFS: Invalid session number 21:25:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 21:25:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0) 21:25:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0) 21:25:29 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) [ 114.841526] ISOFS: Unable to identify CD-ROM format. 21:25:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 21:25:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0) 21:25:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 21:25:30 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:25:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0) [ 115.096793] ISOFS: Invalid session number or type of track [ 115.109950] ISOFS: Invalid session number [ 115.149143] ISOFS: Unable to identify CD-ROM format. 21:25:30 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 115.281358] ISOFS: Invalid session number or type of track [ 115.287034] ISOFS: Invalid session number [ 115.304476] ISOFS: Unable to identify CD-ROM format. 21:25:32 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) 21:25:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 21:25:32 executing program 4: socket$inet(0x2, 0x0, 0x4000000ffff) 21:25:32 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:32 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) stat(&(0x7f00000006c0)='./file0\x00', 0x0) 21:25:32 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 21:25:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}}) 21:25:32 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) 21:25:32 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) [ 117.369215] hrtimer: interrupt took 38018 ns 21:25:32 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 21:25:32 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) stat(&(0x7f00000006c0)='./file0\x00', 0x0) 21:25:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 21:25:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}}) 21:25:32 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 21:25:32 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0)) [ 117.553997] audit: type=1800 audit(1570742732.627:39): pid=7308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0 21:25:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}}) 21:25:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 21:25:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) 21:25:32 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) [ 117.690487] audit: type=1800 audit(1570742732.747:40): pid=7330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0 21:25:32 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) stat(&(0x7f00000006c0)='./file0\x00', 0x0) 21:25:32 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}}) 21:25:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 21:25:32 executing program 4: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:33 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) stat(&(0x7f00000006c0)='./file0\x00', 0x0) [ 117.972510] audit: type=1800 audit(1570742733.047:41): pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=16559 res=0 [ 118.038141] audit: type=1400 audit(1570742733.107:42): avc: denied { associate } for pid=7356 comm="syz-executor.4" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 21:25:33 executing program 0: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) 21:25:33 executing program 4: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:33 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) [ 118.176025] audit: type=1800 audit(1570742733.187:43): pid=7359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16577 res=0 21:25:33 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) [ 118.301785] audit: type=1800 audit(1570742733.367:44): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16573 res=0 21:25:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) 21:25:33 executing program 0: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) [ 118.360161] audit: type=1800 audit(1570742733.377:45): pid=7374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0 21:25:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) [ 118.533342] audit: type=1800 audit(1570742733.607:46): pid=7392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16574 res=0 21:25:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) [ 118.632425] audit: type=1800 audit(1570742733.707:47): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=16573 res=0 21:25:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) 21:25:33 executing program 4: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:33 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) [ 118.813128] audit: type=1800 audit(1570742733.887:48): pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16559 res=0 21:25:33 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98) 21:25:34 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 0: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) 21:25:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) 21:25:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}}) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0) 21:25:34 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x8bb}, {&(0x7f0000000000)="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", 0x1d2, 0x5}]) 21:25:34 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) 21:25:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}}) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0) 21:25:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) 21:25:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}}) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0) [ 119.862692] Dev loop0: unable to read RDB block 8 [ 119.868061] loop0: unable to read partition table [ 119.886326] loop0: partition table beyond EOD, truncated [ 119.898650] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:25:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:35 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) 21:25:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) [ 120.011133] Dev loop0: unable to read RDB block 8 [ 120.016438] loop0: unable to read partition table [ 120.022222] loop0: partition table beyond EOD, truncated [ 120.028017] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:25:35 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x8bb}, {&(0x7f0000000000)="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", 0x1d2, 0x5}]) 21:25:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}}) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0) 21:25:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) 21:25:35 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) close(r0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:25:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20) [ 284.640286] INFO: task syz-executor.0:7083 blocked for more than 140 seconds. [ 284.647745] Not tainted 4.14.148 #0 [ 284.651944] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 284.659996] syz-executor.0 D24992 7083 1 0x00000004 [ 284.667156] Call Trace: [ 284.669861] __schedule+0x7b8/0x1cd0 [ 284.673612] ? __mutex_lock+0x737/0x1470 [ 284.677671] ? pci_mmcfg_check_reserved+0x150/0x150 [ 284.682727] schedule+0x92/0x1c0 [ 284.686085] schedule_preempt_disabled+0x13/0x20 [ 284.690872] __mutex_lock+0x73c/0x1470 [ 284.694826] ? blkdev_reread_part+0x1f/0x40 [ 284.699129] ? mutex_trylock+0x1c0/0x1c0 [ 284.703234] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 284.708329] ? __wake_up_common_lock+0xe3/0x160 [ 284.713024] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 284.718122] mutex_lock_nested+0x16/0x20 [ 284.722236] ? mutex_lock_nested+0x16/0x20 [ 284.726460] blkdev_reread_part+0x1f/0x40 [ 284.730648] loop_reread_partitions+0x7c/0x90 [ 284.735160] loop_clr_fd+0x844/0xae0 [ 284.738941] lo_ioctl+0x8ea/0x1ce0 [ 284.742506] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 284.747513] ? loop_probe+0x160/0x160 [ 284.751339] blkdev_ioctl+0x96b/0x1860 [ 284.755215] ? blkpg_ioctl+0x980/0x980 [ 284.759083] ? __might_sleep+0x93/0xb0 [ 284.762998] block_ioctl+0xde/0x120 [ 284.766615] ? blkdev_fallocate+0x3b0/0x3b0 [ 284.770969] do_vfs_ioctl+0x7ae/0x1060 [ 284.774846] ? selinux_file_mprotect+0x5d0/0x5d0 [ 284.779577] ? ioctl_preallocate+0x1c0/0x1c0 [ 284.784000] ? putname+0xe0/0x120 [ 284.787443] ? do_sys_open+0x221/0x430 [ 284.791359] ? security_file_ioctl+0x7d/0xb0 [ 284.795755] ? security_file_ioctl+0x89/0xb0 [ 284.800185] SyS_ioctl+0x8f/0xc0 [ 284.803547] ? do_vfs_ioctl+0x1060/0x1060 [ 284.807692] do_syscall_64+0x1e8/0x640 [ 284.811605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.816440] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.821653] RIP: 0033:0x4598c7 [ 284.824829] RSP: 002b:00007fffd7049df8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.832906] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598c7 [ 284.840195] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 284.847462] RBP: 0000000000000030 R08: 0000000000000000 R09: 000000000000000a [ 284.854758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 284.862051] R13: 00007fffd7049e30 R14: 000000000001d3e1 R15: 00007fffd7049e40 [ 284.869339] INFO: task syz-executor.1:7087 blocked for more than 140 seconds. [ 284.876652] Not tainted 4.14.148 #0 [ 284.880850] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 284.888806] syz-executor.1 D24992 7087 1 0x00000004 [ 284.894485] Call Trace: [ 284.897068] __schedule+0x7b8/0x1cd0 [ 284.900802] ? __mutex_lock+0x737/0x1470 [ 284.904874] ? pci_mmcfg_check_reserved+0x150/0x150 [ 284.909992] schedule+0x92/0x1c0 [ 284.913453] schedule_preempt_disabled+0x13/0x20 [ 284.918206] __mutex_lock+0x73c/0x1470 [ 284.922133] ? trace_hardirqs_on+0x10/0x10 [ 284.926957] ? lo_open+0x1d/0xb0 [ 284.930384] ? refcount_inc_not_zero+0x60/0xe0 [ 284.934960] ? mutex_trylock+0x1c0/0x1c0 [ 284.939020] ? find_held_lock+0x35/0x130 [ 284.943124] ? disk_get_part+0x9c/0x140 [ 284.947110] ? lock_downgrade+0x740/0x740 [ 284.951296] ? loop_unregister_transfer+0x90/0x90 [ 284.956132] mutex_lock_nested+0x16/0x20 [ 284.960286] ? mutex_lock_nested+0x16/0x20 [ 284.964513] lo_open+0x1d/0xb0 [ 284.967689] __blkdev_get+0x2c7/0x1120 [ 284.971617] ? __blkdev_put+0x7f0/0x7f0 [ 284.975600] ? bd_acquire+0x178/0x2c0 [ 284.979388] ? find_held_lock+0x35/0x130 [ 284.983493] blkdev_get+0xa8/0x8e0 [ 284.987037] ? bd_may_claim+0xd0/0xd0 [ 284.990914] ? _raw_spin_unlock+0x2d/0x50 [ 284.995056] blkdev_open+0x1d1/0x260 [ 284.998757] ? security_file_open+0x89/0x190 [ 285.003229] do_dentry_open+0x73b/0xeb0 [ 285.007217] ? bd_acquire+0x2c0/0x2c0 [ 285.011056] vfs_open+0x105/0x220 [ 285.014501] path_openat+0x8bd/0x3f70 [ 285.018290] ? trace_hardirqs_on+0x10/0x10 [ 285.022572] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 285.027231] ? find_held_lock+0x35/0x130 [ 285.031332] ? __alloc_fd+0x1d4/0x4a0 [ 285.035123] do_filp_open+0x18e/0x250 [ 285.038905] ? may_open_dev+0xe0/0xe0 [ 285.043041] ? _raw_spin_unlock+0x2d/0x50 [ 285.047195] ? __alloc_fd+0x1d4/0x4a0 [ 285.051051] do_sys_open+0x2c5/0x430 [ 285.054766] ? filp_open+0x70/0x70 [ 285.058291] SyS_open+0x2d/0x40 [ 285.061615] ? do_sys_open+0x430/0x430 [ 285.065499] do_syscall_64+0x1e8/0x640 [ 285.069369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.074275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.079455] RIP: 0033:0x413920 [ 285.082672] RSP: 002b:00007ffe02a10388 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 285.090421] RAX: ffffffffffffffda RBX: 000000000001d4b5 RCX: 0000000000413920 [ 285.097681] RDX: 00007ffe02a1041a RSI: 0000000000000002 RDI: 00007ffe02a10410 [ 285.104976] RBP: 0000000000000029 R08: 0000000000000000 R09: 000000000000000a [ 285.112263] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 285.119513] R13: 00007ffe02a103c0 R14: 000000000001d3ff R15: 00007ffe02a103d0 [ 285.126949] INFO: task syz-executor.5:7089 blocked for more than 140 seconds. [ 285.134256] Not tainted 4.14.148 #0 [ 285.138381] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.146371] syz-executor.5 D25168 7089 1 0x00000004 [ 285.152046] Call Trace: [ 285.154624] __schedule+0x7b8/0x1cd0 [ 285.158333] ? __mutex_lock+0x737/0x1470 [ 285.162462] ? pci_mmcfg_check_reserved+0x150/0x150 [ 285.167480] schedule+0x92/0x1c0 [ 285.170947] schedule_preempt_disabled+0x13/0x20 [ 285.175829] __mutex_lock+0x73c/0x1470 [ 285.179753] ? __mutex_unlock_slowpath+0x71/0x800 [ 285.184660] ? __blkdev_get+0x145/0x1120 [ 285.188736] ? mutex_trylock+0x1c0/0x1c0 [ 285.192858] ? exact_match+0xd/0x20 [ 285.196500] ? kobj_lookup+0x314/0x400 [ 285.200421] ? blkdev_ioctl+0x1860/0x1860 [ 285.204568] mutex_lock_nested+0x16/0x20 [ 285.208609] ? mutex_lock_nested+0x16/0x20 [ 285.212883] __blkdev_get+0x145/0x1120 [ 285.216766] ? __blkdev_put+0x7f0/0x7f0 [ 285.220758] ? bd_acquire+0x178/0x2c0 [ 285.224548] ? find_held_lock+0x35/0x130 [ 285.228591] blkdev_get+0xa8/0x8e0 [ 285.232218] ? bd_may_claim+0xd0/0xd0 [ 285.236115] ? _raw_spin_unlock+0x2d/0x50 [ 285.240295] blkdev_open+0x1d1/0x260 [ 285.244022] ? security_file_open+0x89/0x190 [ 285.248413] do_dentry_open+0x73b/0xeb0 [ 285.252592] ? bd_acquire+0x2c0/0x2c0 [ 285.256403] vfs_open+0x105/0x220 [ 285.259854] path_openat+0x8bd/0x3f70 [ 285.263702] ? trace_hardirqs_on+0x10/0x10 [ 285.267944] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 285.272651] ? find_held_lock+0x35/0x130 [ 285.276708] ? __alloc_fd+0x1d4/0x4a0 [ 285.280549] do_filp_open+0x18e/0x250 [ 285.284368] ? may_open_dev+0xe0/0xe0 [ 285.288167] ? _raw_spin_unlock+0x2d/0x50 [ 285.292387] ? __alloc_fd+0x1d4/0x4a0 [ 285.296247] do_sys_open+0x2c5/0x430 [ 285.299957] ? filp_open+0x70/0x70 [ 285.303614] SyS_open+0x2d/0x40 [ 285.306904] ? do_sys_open+0x430/0x430 [ 285.310845] do_syscall_64+0x1e8/0x640 [ 285.314726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.319555] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.324779] RIP: 0033:0x413920 [ 285.327963] RSP: 002b:00007ffcd32c1e08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 285.335710] RAX: ffffffffffffffda RBX: 000000000001d589 RCX: 0000000000413920 [ 285.343018] RDX: 00007ffcd32c1e9a RSI: 0000000000000002 RDI: 00007ffcd32c1e90 [ 285.350335] RBP: 0000000000000027 R08: 0000000000000000 R09: 000000000000000a [ 285.357595] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 285.365011] R13: 00007ffcd32c1e40 R14: 000000000001d535 R15: 00007ffcd32c1e50 [ 285.372347] INFO: task syz-executor.4:7090 blocked for more than 140 seconds. [ 285.379612] Not tainted 4.14.148 #0 [ 285.383779] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.391763] syz-executor.4 D25168 7090 1 0x00000004 [ 285.397375] Call Trace: [ 285.399946] __schedule+0x7b8/0x1cd0 [ 285.403684] ? __mutex_lock+0x737/0x1470 [ 285.407741] ? pci_mmcfg_check_reserved+0x150/0x150 [ 285.412806] schedule+0x92/0x1c0 [ 285.416161] schedule_preempt_disabled+0x13/0x20 [ 285.420946] __mutex_lock+0x73c/0x1470 [ 285.424844] ? trace_hardirqs_on+0x10/0x10 [ 285.429062] ? lo_open+0x1d/0xb0 [ 285.432460] ? refcount_inc_not_zero+0x60/0xe0 [ 285.437045] ? mutex_trylock+0x1c0/0x1c0 [ 285.441201] ? find_held_lock+0x35/0x130 [ 285.445255] ? disk_get_part+0x9c/0x140 [ 285.449211] ? lock_downgrade+0x740/0x740 [ 285.453401] ? loop_unregister_transfer+0x90/0x90 [ 285.458234] mutex_lock_nested+0x16/0x20 [ 285.462311] ? mutex_lock_nested+0x16/0x20 [ 285.466536] lo_open+0x1d/0xb0 [ 285.469708] __blkdev_get+0x2c7/0x1120 [ 285.473634] ? __blkdev_put+0x7f0/0x7f0 [ 285.477620] ? bd_acquire+0x178/0x2c0 [ 285.481459] ? find_held_lock+0x35/0x130 [ 285.485531] blkdev_get+0xa8/0x8e0 [ 285.489065] ? bd_may_claim+0xd0/0xd0 [ 285.492921] ? _raw_spin_unlock+0x2d/0x50 [ 285.497075] blkdev_open+0x1d1/0x260 [ 285.500811] ? security_file_open+0x89/0x190 [ 285.505228] do_dentry_open+0x73b/0xeb0 [ 285.509181] ? bd_acquire+0x2c0/0x2c0 [ 285.513026] vfs_open+0x105/0x220 [ 285.516470] path_openat+0x8bd/0x3f70 [ 285.521149] ? trace_hardirqs_on+0x10/0x10 [ 285.525379] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 285.530092] ? find_held_lock+0x35/0x130 [ 285.534173] ? __alloc_fd+0x1d4/0x4a0 [ 285.538120] do_filp_open+0x18e/0x250 [ 285.542077] ? may_open_dev+0xe0/0xe0 [ 285.545903] ? _raw_spin_unlock+0x2d/0x50 [ 285.550148] ? __alloc_fd+0x1d4/0x4a0 [ 285.553971] do_sys_open+0x2c5/0x430 [ 285.557678] ? filp_open+0x70/0x70 [ 285.561275] SyS_open+0x2d/0x40 [ 285.564622] ? do_sys_open+0x430/0x430 [ 285.568498] do_syscall_64+0x1e8/0x640 [ 285.572429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.577274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.582508] RIP: 0033:0x413920 [ 285.585829] RSP: 002b:00007ffeefea2558 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 285.593596] RAX: ffffffffffffffda RBX: 000000000001d54f RCX: 0000000000413920 [ 285.600899] RDX: 00007ffeefea25ea RSI: 0000000000000002 RDI: 00007ffeefea25e0 [ 285.608160] RBP: 0000000000000027 R08: 0000000000000000 R09: 000000000000000a [ 285.615518] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 285.622823] R13: 00007ffeefea2590 R14: 000000000001d4e8 R15: 00007ffeefea25a0 [ 285.630148] INFO: task syz-executor.2:7091 blocked for more than 140 seconds. [ 285.637423] Not tainted 4.14.148 #0 [ 285.641608] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.649563] syz-executor.2 D25168 7091 1 0x00000004 [ 285.655250] Call Trace: [ 285.657831] __schedule+0x7b8/0x1cd0 [ 285.661571] ? __mutex_lock+0x737/0x1470 [ 285.665642] ? pci_mmcfg_check_reserved+0x150/0x150 [ 285.670718] schedule+0x92/0x1c0 [ 285.674076] schedule_preempt_disabled+0x13/0x20 [ 285.678809] __mutex_lock+0x73c/0x1470 [ 285.682739] ? trace_hardirqs_on+0x10/0x10 [ 285.686967] ? lo_open+0x1d/0xb0 [ 285.690372] ? refcount_inc_not_zero+0x60/0xe0 [ 285.694952] ? mutex_trylock+0x1c0/0x1c0 [ 285.698994] ? find_held_lock+0x35/0x130 [ 285.703084] ? disk_get_part+0x9c/0x140 [ 285.707052] ? lock_downgrade+0x740/0x740 [ 285.711241] ? loop_unregister_transfer+0x90/0x90 [ 285.716092] mutex_lock_nested+0x16/0x20 [ 285.720196] ? mutex_lock_nested+0x16/0x20 [ 285.724421] lo_open+0x1d/0xb0 [ 285.727605] __blkdev_get+0x2c7/0x1120 [ 285.731546] ? __blkdev_put+0x7f0/0x7f0 [ 285.735511] ? bd_acquire+0x178/0x2c0 [ 285.739292] ? find_held_lock+0x35/0x130 [ 285.743479] blkdev_get+0xa8/0x8e0 [ 285.747035] ? bd_may_claim+0xd0/0xd0 [ 285.750879] ? _raw_spin_unlock+0x2d/0x50 [ 285.755019] blkdev_open+0x1d1/0x260 [ 285.758716] ? security_file_open+0x89/0x190 [ 285.763149] do_dentry_open+0x73b/0xeb0 [ 285.767122] ? bd_acquire+0x2c0/0x2c0 [ 285.770972] vfs_open+0x105/0x220 [ 285.774420] path_openat+0x8bd/0x3f70 [ 285.778203] ? trace_hardirqs_on+0x10/0x10 [ 285.782482] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 285.787144] ? find_held_lock+0x35/0x130 [ 285.791243] ? __alloc_fd+0x1d4/0x4a0 [ 285.795037] do_filp_open+0x18e/0x250 [ 285.798816] ? may_open_dev+0xe0/0xe0 [ 285.802652] ? _raw_spin_unlock+0x2d/0x50 [ 285.806788] ? __alloc_fd+0x1d4/0x4a0 [ 285.810641] do_sys_open+0x2c5/0x430 [ 285.814348] ? filp_open+0x70/0x70 [ 285.817867] SyS_open+0x2d/0x40 [ 285.821179] ? do_sys_open+0x430/0x430 [ 285.825071] do_syscall_64+0x1e8/0x640 [ 285.828938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.833817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.839006] RIP: 0033:0x413920 [ 285.842234] RSP: 002b:00007ffd38057e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 285.849936] RAX: ffffffffffffffda RBX: 000000000001d513 RCX: 0000000000413920 [ 285.857241] RDX: 00007ffd38057f0a RSI: 0000000000000002 RDI: 00007ffd38057f00 [ 285.864712] RBP: 0000000000000020 R08: 0000000000000000 R09: 000000000000000a [ 285.872012] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 285.879270] R13: 00007ffd38057eb0 R14: 000000000001d4f2 R15: 00007ffd38057ec0 [ 285.886596] INFO: task blkid:7501 blocked for more than 140 seconds. [ 285.893127] Not tainted 4.14.148 #0 [ 285.897250] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.905231] blkid D29040 7501 7049 0x00000004 [ 285.910918] Call Trace: [ 285.913497] __schedule+0x7b8/0x1cd0 [ 285.917186] ? __mutex_lock+0x737/0x1470 [ 285.921280] ? pci_mmcfg_check_reserved+0x150/0x150 [ 285.926293] schedule+0x92/0x1c0 [ 285.929635] schedule_preempt_disabled+0x13/0x20 [ 285.934439] __mutex_lock+0x73c/0x1470 [ 285.938331] ? lo_open+0x1d/0xb0 [ 285.941733] ? refcount_inc_not_zero+0x60/0xe0 [ 285.946305] ? mutex_trylock+0x1c0/0x1c0 [ 285.950410] ? exact_match+0xd/0x20 [ 285.954050] ? kobj_lookup+0x314/0x400 [ 285.957947] ? loop_unregister_transfer+0x90/0x90 [ 285.962810] mutex_lock_nested+0x16/0x20 [ 285.966872] ? mutex_lock_nested+0x16/0x20 [ 285.971151] lo_open+0x1d/0xb0 [ 285.974332] __blkdev_get+0xaad/0x1120 [ 285.978200] ? __blkdev_put+0x7f0/0x7f0 [ 285.982209] ? bd_acquire+0x178/0x2c0 [ 285.986003] ? find_held_lock+0x35/0x130 [ 285.990100] blkdev_get+0xa8/0x8e0 [ 285.993670] ? bd_may_claim+0xd0/0xd0 [ 285.997452] ? _raw_spin_unlock+0x2d/0x50 [ 286.001705] blkdev_open+0x1d1/0x260 [ 286.005421] ? security_file_open+0x89/0x190 [ 286.009810] do_dentry_open+0x73b/0xeb0 [ 286.013823] ? bd_acquire+0x2c0/0x2c0 [ 286.017631] vfs_open+0x105/0x220 [ 286.021121] path_openat+0x8bd/0x3f70 [ 286.024915] ? trace_hardirqs_on+0x10/0x10 [ 286.029144] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 286.033846] ? find_held_lock+0x35/0x130 [ 286.037920] ? __alloc_fd+0x1d4/0x4a0 [ 286.041758] do_filp_open+0x18e/0x250 [ 286.045634] ? may_open_dev+0xe0/0xe0 [ 286.049429] ? _raw_spin_unlock+0x2d/0x50 [ 286.053623] ? __alloc_fd+0x1d4/0x4a0 [ 286.057426] do_sys_open+0x2c5/0x430 [ 286.061174] ? filp_open+0x70/0x70 [ 286.064708] SyS_open+0x2d/0x40 [ 286.067964] ? do_sys_open+0x430/0x430 [ 286.071907] do_syscall_64+0x1e8/0x640 [ 286.075801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.080704] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.085895] RIP: 0033:0x7f16ec7c3120 [ 286.089582] RSP: 002b:00007fffb66e7878 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 286.097333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f16ec7c3120 [ 286.104620] RDX: 00007fffb66e8f41 RSI: 0000000000000000 RDI: 00007fffb66e8f41 [ 286.111921] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 286.119195] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000172f030 [ 286.126486] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 286.133787] INFO: task blkid:7502 blocked for more than 140 seconds. [ 286.140297] Not tainted 4.14.148 #0 [ 286.144431] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.152429] blkid D29040 7502 7222 0x00000004 [ 286.158067] Call Trace: [ 286.160705] __schedule+0x7b8/0x1cd0 [ 286.164421] ? __mutex_lock+0x737/0x1470 [ 286.168470] ? pci_mmcfg_check_reserved+0x150/0x150 [ 286.173556] schedule+0x92/0x1c0 [ 286.176975] schedule_preempt_disabled+0x13/0x20 [ 286.181753] __mutex_lock+0x73c/0x1470 [ 286.185631] ? trace_hardirqs_on+0x10/0x10 [ 286.189847] ? lo_open+0x1d/0xb0 [ 286.193253] ? refcount_inc_not_zero+0x60/0xe0 [ 286.197847] ? mutex_trylock+0x1c0/0x1c0 [ 286.201943] ? find_held_lock+0x35/0x130 [ 286.205996] ? disk_get_part+0x9c/0x140 [ 286.209955] ? lock_downgrade+0x740/0x740 [ 286.214142] ? loop_unregister_transfer+0x90/0x90 [ 286.218977] mutex_lock_nested+0x16/0x20 [ 286.223061] ? mutex_lock_nested+0x16/0x20 [ 286.227308] lo_open+0x1d/0xb0 [ 286.230545] __blkdev_get+0x2c7/0x1120 [ 286.234424] ? __blkdev_put+0x7f0/0x7f0 [ 286.238376] ? bd_acquire+0x178/0x2c0 [ 286.242204] ? find_held_lock+0x35/0x130 [ 286.246256] blkdev_get+0xa8/0x8e0 [ 286.249777] ? bd_may_claim+0xd0/0xd0 [ 286.253787] ? _raw_spin_unlock+0x2d/0x50 [ 286.257937] blkdev_open+0x1d1/0x260 [ 286.261681] ? security_file_open+0x89/0x190 [ 286.266086] do_dentry_open+0x73b/0xeb0 [ 286.270270] ? bd_acquire+0x2c0/0x2c0 [ 286.274064] vfs_open+0x105/0x220 [ 286.277510] path_openat+0x8bd/0x3f70 [ 286.281376] ? trace_hardirqs_on+0x10/0x10 [ 286.285617] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 286.290344] ? find_held_lock+0x35/0x130 [ 286.294401] ? __alloc_fd+0x1d4/0x4a0 [ 286.298181] do_filp_open+0x18e/0x250 [ 286.302008] ? may_open_dev+0xe0/0xe0 [ 286.305819] ? _raw_spin_unlock+0x2d/0x50 [ 286.309954] ? __alloc_fd+0x1d4/0x4a0 [ 286.313935] do_sys_open+0x2c5/0x430 [ 286.317644] ? filp_open+0x70/0x70 [ 286.321261] SyS_open+0x2d/0x40 [ 286.324544] ? do_sys_open+0x430/0x430 [ 286.328418] do_syscall_64+0x1e8/0x640 [ 286.332450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.337473] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.342693] RIP: 0033:0x7efc43c76120 [ 286.346391] RSP: 002b:00007ffe0d274048 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 286.354137] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efc43c76120 [ 286.361423] RDX: 00007ffe0d275f34 RSI: 0000000000000000 RDI: 00007ffe0d275f34 [ 286.368675] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 286.375986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002542030 [ 286.383274] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 286.390598] INFO: task syz-executor.3:7504 blocked for more than 140 seconds. [ 286.397860] Not tainted 4.14.148 #0 [ 286.402041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.410055] syz-executor.3 D28768 7504 7088 0x00000004 [ 286.415688] Call Trace: [ 286.418262] __schedule+0x7b8/0x1cd0 [ 286.422004] ? __mutex_lock+0x737/0x1470 [ 286.426060] ? pci_mmcfg_check_reserved+0x150/0x150 [ 286.431131] schedule+0x92/0x1c0 [ 286.434487] schedule_preempt_disabled+0x13/0x20 [ 286.439217] __mutex_lock+0x73c/0x1470 [ 286.443153] ? loop_control_ioctl+0x153/0x2f0 [ 286.447642] ? mutex_trylock+0x1c0/0x1c0 [ 286.451735] ? trace_hardirqs_on+0x10/0x10 [ 286.456014] ? __radix_tree_lookup+0x1b3/0x2f0 [ 286.460647] mutex_lock_nested+0x16/0x20 [ 286.464726] ? mutex_lock_nested+0x16/0x20 [ 286.468948] loop_control_ioctl+0x153/0x2f0 [ 286.473303] ? loop_add+0x850/0x850 [ 286.476927] ? loop_add+0x850/0x850 [ 286.480626] do_vfs_ioctl+0x7ae/0x1060 [ 286.484507] ? selinux_file_mprotect+0x5d0/0x5d0 [ 286.489266] ? lock_downgrade+0x740/0x740 [ 286.493469] ? ioctl_preallocate+0x1c0/0x1c0 [ 286.497871] ? __fget+0x237/0x370 [ 286.501348] ? security_file_ioctl+0x89/0xb0 [ 286.505748] SyS_ioctl+0x8f/0xc0 [ 286.509105] ? do_vfs_ioctl+0x1060/0x1060 [ 286.513290] do_syscall_64+0x1e8/0x640 [ 286.517187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.522068] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.528560] RIP: 0033:0x459a59 [ 286.531793] RSP: 002b:00007fd8a9ac3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.539495] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 286.546785] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 286.554076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.561418] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8a9ac46d4 [ 286.568693] R13: 00000000004c31ed R14: 00000000004d6de0 R15: 00000000ffffffff [ 286.576152] INFO: task syz-executor.3:7508 blocked for more than 140 seconds. [ 286.583438] Not tainted 4.14.148 #0 [ 286.587610] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.595610] syz-executor.3 D29280 7508 7088 0x00000004 [ 286.601260] Call Trace: [ 286.603835] __schedule+0x7b8/0x1cd0 [ 286.607562] ? __mutex_lock+0x737/0x1470 [ 286.611671] ? pci_mmcfg_check_reserved+0x150/0x150 [ 286.616684] schedule+0x92/0x1c0 [ 286.620170] schedule_preempt_disabled+0x13/0x20 [ 286.624919] __mutex_lock+0x73c/0x1470 [ 286.628802] ? loop_control_ioctl+0x65/0x2f0 [ 286.633245] ? mutex_trylock+0x1c0/0x1c0 [ 286.637297] ? trace_hardirqs_on+0x10/0x10 [ 286.641579] ? __might_fault+0x110/0x1d0 [ 286.645632] mutex_lock_nested+0x16/0x20 [ 286.649678] ? mutex_lock_nested+0x16/0x20 [ 286.654034] loop_control_ioctl+0x65/0x2f0 [ 286.658259] ? loop_add+0x850/0x850 [ 286.661907] ? loop_add+0x850/0x850 [ 286.665526] do_vfs_ioctl+0x7ae/0x1060 [ 286.669394] ? selinux_file_mprotect+0x5d0/0x5d0 [ 286.674208] ? lock_downgrade+0x740/0x740 [ 286.678349] ? ioctl_preallocate+0x1c0/0x1c0 [ 286.682780] ? __fget+0x237/0x370 [ 286.686230] ? security_file_ioctl+0x89/0xb0 [ 286.690677] SyS_ioctl+0x8f/0xc0 [ 286.694045] ? do_vfs_ioctl+0x1060/0x1060 [ 286.698175] do_syscall_64+0x1e8/0x640 [ 286.702083] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.706920] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.712140] RIP: 0033:0x459a59 [ 286.715332] RSP: 002b:00007fd8a9aa2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.723088] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 286.730380] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 286.737657] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 286.744976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8a9aa36d4 [ 286.752272] R13: 00000000004c31c2 R14: 00000000004d6db0 R15: 00000000ffffffff [ 286.759543] INFO: task blkid:7505 blocked for more than 140 seconds. [ 286.766066] Not tainted 4.14.148 #0 [ 286.770245] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.778200] blkid D29040 7505 7050 0x00000004 [ 286.783856] Call Trace: [ 286.786441] __schedule+0x7b8/0x1cd0 [ 286.790193] ? __mutex_lock+0x737/0x1470 [ 286.794264] ? pci_mmcfg_check_reserved+0x150/0x150 [ 286.799260] schedule+0x92/0x1c0 [ 286.802670] schedule_preempt_disabled+0x13/0x20 [ 286.807430] __mutex_lock+0x73c/0x1470 [ 286.811344] ? trace_hardirqs_on+0x10/0x10 [ 286.815571] ? lo_open+0x1d/0xb0 [ 286.818918] ? refcount_inc_not_zero+0x60/0xe0 [ 286.823527] ? mutex_trylock+0x1c0/0x1c0 [ 286.827600] ? find_held_lock+0x35/0x130 [ 286.831694] ? disk_get_part+0x9c/0x140 [ 286.835666] ? lock_downgrade+0x740/0x740 [ 286.839801] ? loop_unregister_transfer+0x90/0x90 [ 286.844670] mutex_lock_nested+0x16/0x20 [ 286.848718] ? mutex_lock_nested+0x16/0x20 [ 286.852993] lo_open+0x1d/0xb0 [ 286.856190] __blkdev_get+0x2c7/0x1120 [ 286.860113] ? __blkdev_put+0x7f0/0x7f0 [ 286.864079] ? bd_acquire+0x178/0x2c0 [ 286.867862] ? find_held_lock+0x35/0x130 [ 286.871982] blkdev_get+0xa8/0x8e0 [ 286.875518] ? bd_may_claim+0xd0/0xd0 [ 286.879298] ? _raw_spin_unlock+0x2d/0x50 [ 286.883471] blkdev_open+0x1d1/0x260 [ 286.887176] ? security_file_open+0x89/0x190 [ 286.891629] do_dentry_open+0x73b/0xeb0 [ 286.895622] ? bd_acquire+0x2c0/0x2c0 [ 286.899402] vfs_open+0x105/0x220 [ 286.902884] path_openat+0x8bd/0x3f70 [ 286.906678] ? trace_hardirqs_on+0x10/0x10 [ 286.910966] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 286.915627] ? find_held_lock+0x35/0x130 [ 286.919687] ? __alloc_fd+0x1d4/0x4a0 [ 286.923517] do_filp_open+0x18e/0x250 [ 286.927308] ? may_open_dev+0xe0/0xe0 [ 286.931149] ? _raw_spin_unlock+0x2d/0x50 [ 286.935290] ? __alloc_fd+0x1d4/0x4a0 [ 286.939086] do_sys_open+0x2c5/0x430 [ 286.942840] ? filp_open+0x70/0x70 [ 286.946377] SyS_open+0x2d/0x40 [ 286.949634] ? do_sys_open+0x430/0x430 [ 286.953560] do_syscall_64+0x1e8/0x640 [ 286.957439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.962333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.967512] RIP: 0033:0x7fee6a203120 [ 286.971268] RSP: 002b:00007fff83b5dbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 286.978982] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fee6a203120 [ 286.986284] RDX: 00007fff83b5ff34 RSI: 0000000000000000 RDI: 00007fff83b5ff34 [ 286.993579] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 287.000965] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000019dd030 [ 287.008226] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 287.015540] [ 287.015540] Showing all locks held in the system: [ 287.021905] 1 lock held by khungtaskd/1011: [ 287.027056] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 287.036142] 2 locks held by getty/7041: [ 287.040219] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.048908] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.058236] 2 locks held by getty/7042: [ 287.062400] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.071126] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.080468] 2 locks held by getty/7043: [ 287.084426] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.093134] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.102453] 2 locks held by getty/7044: [ 287.106415] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.115147] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.124461] 2 locks held by getty/7045: [ 287.128431] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.137140] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.146467] 2 locks held by getty/7046: [ 287.150481] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.159161] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.168540] 2 locks held by getty/7047: [ 287.172604] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 287.181319] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 287.190657] 2 locks held by syz-executor.0/7083: [ 287.195395] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x8f/0x1ce0 [ 287.204021] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 287.213014] 2 locks held by syz-executor.1/7087: [ 287.217753] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.226913] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.235031] 1 lock held by syz-executor.5/7089: [ 287.239682] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.248391] 2 locks held by syz-executor.4/7090: [ 287.253196] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.261914] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.270096] 2 locks held by syz-executor.2/7091: [ 287.274844] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.283581] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.291705] 2 locks held by blkid/7501: [ 287.295658] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.304362] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.312473] 2 locks held by blkid/7502: [ 287.316426] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.325147] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.333264] 2 locks held by syz-executor.3/7504: [ 287.338018] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 287.347255] #1: (&lo->lo_ctl_mutex#2){+.+.}, at: [] loop_control_ioctl+0x153/0x2f0 [ 287.356773] 1 lock held by syz-executor.3/7508: [ 287.361481] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 287.370654] 2 locks held by blkid/7505: [ 287.374612] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 287.383324] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 287.391433] [ 287.393047] ============================================= [ 287.393047] [ 287.400464] NMI backtrace for cpu 1 [ 287.404097] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.148 #0 [ 287.410652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.419983] Call Trace: [ 287.422554] dump_stack+0x138/0x197 [ 287.426163] nmi_cpu_backtrace.cold+0x57/0x94 [ 287.430652] ? irq_force_complete_move.cold+0x7d/0x7d [ 287.435830] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 287.441097] arch_trigger_cpumask_backtrace+0x14/0x20 [ 287.446284] watchdog+0x5e7/0xb90 [ 287.449720] kthread+0x319/0x430 [ 287.453061] ? hungtask_pm_notify+0x50/0x50 [ 287.457382] ? kthread_create_on_node+0xd0/0xd0 [ 287.462043] ret_from_fork+0x24/0x30 [ 287.465941] Sending NMI from CPU 1 to CPUs 0: [ 287.470758] NMI backtrace for cpu 0 [ 287.470761] CPU: 0 PID: 2257 Comm: kworker/u4:4 Not tainted 4.14.148 #0 [ 287.470765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.470767] Workqueue: bat_events batadv_nc_worker [ 287.470771] task: ffff8880a1ec2200 task.stack: ffff8880a1ed0000 [ 287.470773] RIP: 0010:lock_acquire+0x30a/0x430 [ 287.470775] RSP: 0018:ffff8880a1ed7c90 EFLAGS: 00000083 [ 287.470779] RAX: 0000000000000000 RBX: ffff8880a1ec2200 RCX: 0000000000000002 [ 287.470782] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880a1ec2a7c [ 287.470784] RBP: ffff8880a1ed7cd8 R08: 0000000000000000 R09: 0000000000000000 [ 287.470787] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8778f7a0 [ 287.470790] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 287.470793] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 287.470795] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.470798] CR2: 000000000132f000 CR3: 000000009f34e000 CR4: 00000000001406f0 [ 287.470801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.470804] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.470805] Call Trace: [ 287.470807] batadv_nc_worker+0x107/0x6d0 [ 287.470809] ? batadv_nc_worker+0xd3/0x6d0 [ 287.470811] process_one_work+0x863/0x1600 [ 287.470813] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 287.470815] worker_thread+0x5d9/0x1050 [ 287.470817] kthread+0x319/0x430 [ 287.470819] ? process_one_work+0x1600/0x1600 [ 287.470821] ? kthread_create_on_node+0xd0/0xd0 [ 287.470823] ret_from_fork+0x24/0x30 [ 287.470824] Code: 48 85 c0 75 9c 44 8b 5d c0 65 ff 0d 41 9b b9 7e 0f 85 2c fe ff ff e8 ea ef b7 ff e9 22 fe ff ff 44 89 5d c0 65 ff 05 26 9b b9 7e <48> 8b 05 77 90 d9 06 e8 aa db 04 00 44 8b 5d c0 85 c0 74 09 80 [ 287.471479] Kernel panic - not syncing: hung_task: blocked tasks [ 287.648615] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.148 #0 [ 287.655171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.664514] Call Trace: [ 287.667090] dump_stack+0x138/0x197 [ 287.670713] panic+0x1f2/0x426 [ 287.673901] ? add_taint.cold+0x16/0x16 [ 287.677870] ? irq_force_complete_move.cold+0x7d/0x7d [ 287.683105] watchdog+0x5f8/0xb90 [ 287.686595] kthread+0x319/0x430 [ 287.690073] ? hungtask_pm_notify+0x50/0x50 [ 287.694385] ? kthread_create_on_node+0xd0/0xd0 [ 287.699159] ret_from_fork+0x24/0x30 [ 287.704562] Kernel Offset: disabled [ 287.708188] Rebooting in 86400 seconds..