audit: type=1804 audit(1670851196.270:249): pid=27536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/636/bus" dev="sda1" ino=15025 res=1 overlayfs: unrecognized mount option "obj_user=]" or missing value INFO: task kworker/u4:0:8332 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. audit: type=1804 audit(1670851196.340:250): pid=27541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir597329573/syzkaller.5FgpXm/143/bus" dev="sda1" ino=14033 res=1 Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! kworker/u4:0 D26728 8332 2 0x80000000 Workqueue: netns cleanup_net audit: type=1804 audit(1670851196.350:251): pid=27544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/636/bus" dev="sda1" ino=15025 res=1 File: /root/syzkaller-testdir917949156/syzkaller.iU2XdP/636/bus PID: 27544 Comm: syz-executor.5 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 audit: type=1804 audit(1670851196.350:252): pid=27544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/636/bus" dev="sda1" ino=15025 res=1 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 kauditd_printk_skb: 1 callbacks suppressed audit: type=1804 audit(1670851196.820:254): pid=27567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir597329573/syzkaller.5FgpXm/144/bus" dev="sda1" ino=15403 res=1 schedule_timeout+0x92d/0xfe0 kernel/time/timer.c:1794 overlayfs: unrecognized mount option "obj_user=]" or missing value audit: type=1804 audit(1670851196.970:255): pid=27589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/637/bus" dev="sda1" ino=14753 res=1 do_wait_for_common kernel/sched/completion.c:83 [inline] __wait_for_common kernel/sched/completion.c:104 [inline] wait_for_common+0x29c/0x470 kernel/sched/completion.c:115 overlayfs: unrecognized mount option "obj_user=]" or missing value overlayfs: unrecognized mount option "upperdi" or missing value audit: type=1804 audit(1670851196.980:256): pid=27596 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/637/bus" dev="sda1" ino=14753 res=1 flush_workqueue+0x40b/0x13e0 kernel/workqueue.c:2713 audit: type=1804 audit(1670851196.980:257): pid=27595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/637/bus" dev="sda1" ino=14753 res=1 flush_scheduled_work include/linux/workqueue.h:599 [inline] tipc_exit_net+0x38/0x60 net/tipc/core.c:100 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:554 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 2 locks held by kworker/1:0/19: #0: 000000006e2d5c71 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 0000000086f17a1b ((work_completion)(&m->rq)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 1 lock held by khungtaskd/1571: audit: type=1804 audit(1670851197.150:258): pid=27603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir597329573/syzkaller.5FgpXm/145/bus" dev="sda1" ino=14834 res=1 #0: 000000001c8a8f1d (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7824: #0: 000000003c376c0e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 audit: type=1804 audit(1670851197.210:259): pid=27610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/638/bus" dev="sda1" ino=14753 res=1 3 locks held by kworker/u4:0/8332: #0: 000000007f333112 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000dfcb62ca (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 audit: type=1804 audit(1670851197.300:260): pid=27624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/638/bus" dev="sda1" ino=14753 res=1 #2: 00000000561207b7 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:521 3 locks held by kworker/u4:8/9593: 1 lock held by syz-executor.3/27534: #0: 00000000e6b4f336 (loop_ctl_mutex){+.+.}, at: loop_set_fd drivers/block/loop.c:956 [inline] #0: 00000000e6b4f336 (loop_ctl_mutex){+.+.}, at: lo_ioctl+0x1bb/0x20e0 drivers/block/loop.c:1576 audit: type=1804 audit(1670851197.300:261): pid=27624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917949156/syzkaller.iU2XdP/638/bus" dev="sda1" ino=14753 res=1 hfsplus: unable to parse mount options ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8160 Comm: syz-fuzzer Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0033:0x4fa019 Code: 4c 89 d0 e8 89 bd f6 ff e8 44 bd f6 ff 4d 8d 4a 01 4d 39 c8 0f 8e 8d 00 00 00 4c 39 88 d8 00 0a 00 7e 7c 48 8b 90 88 00 0a 00 <4c> 8b 90 78 00 0a 00 49 8d 49 04 48 39 ca 0f 82 a0 00 00 00 49 39 RSP: 002b:000000c00023b858 EFLAGS: 00000206 RAX: 000000c048a80000 RBX: 000000c048b22000 RCX: 000000000000f0b3 RDX: 0000000000010000 RSI: 00000000000028e1 RDI: 0000000000004001 RBP: 000000c00023b8b8 R08: 000000000000f195 R09: 000000000000f0b0 R10: 000000000000f0af R11: 0000000000000000 R12: 000000000028f0b0 R13: 000000000028f0af R14: 000000c01b2ac820 R15: 0000000000007093 FS: 000000c01edcb090 GS: 0000000000000000