[info] Using makefile-style concurrent boot in runlevel 2. [ 42.148142][ T25] audit: type=1800 audit(1574919746.845:21): pid=7555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.172120][ T25] audit: type=1800 audit(1574919746.845:22): pid=7555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.181' (ECDSA) to the list of known hosts. 2019/11/28 05:42:38 fuzzer started 2019/11/28 05:42:40 dialing manager at 10.128.0.105:36065 2019/11/28 05:42:40 syscalls: 2567 2019/11/28 05:42:40 code coverage: enabled 2019/11/28 05:42:40 comparison tracing: enabled 2019/11/28 05:42:40 extra coverage: extra coverage is not supported by the kernel 2019/11/28 05:42:40 setuid sandbox: enabled 2019/11/28 05:42:40 namespace sandbox: enabled 2019/11/28 05:42:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/28 05:42:40 fault injection: enabled 2019/11/28 05:42:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/28 05:42:40 net packet injection: enabled 2019/11/28 05:42:40 net device setup: enabled 2019/11/28 05:42:40 concurrency sanitizer: enabled 2019/11/28 05:42:40 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 60.119853][ T7724] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/28 05:42:53 adding functions to KCSAN blacklist: '__ext4_new_inode' 'add_timer' 'copy_process' 'exit_signals' '__hrtimer_run_queues' 'rcu_gp_fqs_loop' 'snd_seq_prioq_cell_out' 'balance_dirty_pages' '__mark_inode_dirty' 'sit_tunnel_xmit' 'mod_timer' 'wbc_detach_inode' 'xprt_connect' 'xas_find_marked' 'ondemand_readahead' 'tcp_add_backlog' 'pipe_poll' 'tick_sched_do_timer' 'audit_log_start' 'alloc_empty_file' '__remove_hrtimer' 'ktime_get_with_offset' 'blk_mq_sched_dispatch_requests' 'ext4_free_inodes_count' '__snd_rawmidi_transmit_ack' 'poll_schedule_timeout' 'ext4_nonda_switch' 'do_exit' 'futex_wait_queue_me' 'list_lru_count_one' 'ep_poll' 'rcu_gp_fqs_check_wake' 'ext4_has_free_clusters' 'xas_clear_mark' 'do_syslog' 'list_lru_add' 'tomoyo_supervisor' 'blk_mq_get_request' 'tick_do_update_jiffies64' 'ext4_free_inode' 'inet_dgram_connect' 'generic_fillattr' 'lruvec_lru_size' 'd_instantiate_new' 'generic_file_read_iter' 'blk_mq_dispatch_rq_list' 'blk_stat_add' 'tick_nohz_idle_stop_tick' 'dput' 'mem_cgroup_select_victim_node' 'ktime_get_real_seconds' '__skb_try_recv_from_queue' '__perf_event_overflow' 'mm_update_next_owner' 'l2tp_tunnel_del_work' 'find_next_bit' 'wbt_done' 'pid_update_inode' 'timer_clear_idle' 'wbt_issue' 'n_tty_receive_buf_common' 'find_get_pages_range_tag' 'run_timer_softirq' 'pipe_wait' 'iput' 'ktime_get_seconds' 'blk_mq_run_hw_queue' 'icmp_global_allow' 'vm_area_dup' 'generic_write_end' 'do_nanosleep' 'taskstats_exit' 'dd_has_work' 'process_srcu' '__d_lookup_done' 'echo_char' '__delete_from_page_cache' 'kauditd_thread' 'pcpu_alloc' '__dev_queue_xmit' 'p9_poll_workfn' 'd_delete' 'ip6_tnl_start_xmit' 'ext4_mb_good_group' 'relay_switch_subbuf' 05:46:31 executing program 0: [ 286.766867][ T7727] IPVS: ftp: loaded support on port[0] = 21 05:46:31 executing program 1: [ 286.847979][ T7727] chnl_net:caif_netlink_parms(): no params data found [ 286.917122][ T7727] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.931673][ T7727] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.951688][ T7727] device bridge_slave_0 entered promiscuous mode [ 286.958992][ T7727] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.966400][ T7727] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.974468][ T7727] device bridge_slave_1 entered promiscuous mode [ 286.986926][ T7730] IPVS: ftp: loaded support on port[0] = 21 [ 287.007499][ T7727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.033954][ T7727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.062096][ T7727] team0: Port device team_slave_0 added 05:46:31 executing program 2: [ 287.095185][ T7727] team0: Port device team_slave_1 added [ 287.123629][ T7730] chnl_net:caif_netlink_parms(): no params data found [ 287.223373][ T7727] device hsr_slave_0 entered promiscuous mode 05:46:32 executing program 3: [ 287.272391][ T7727] device hsr_slave_1 entered promiscuous mode [ 287.421093][ T7730] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.477703][ T7730] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.498812][ T7730] device bridge_slave_0 entered promiscuous mode [ 287.528393][ T7733] IPVS: ftp: loaded support on port[0] = 21 [ 287.542188][ T7730] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.549242][ T7730] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.582827][ T7730] device bridge_slave_1 entered promiscuous mode [ 287.662589][ T7730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.692496][ T7727] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.699555][ T7727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.706926][ T7727] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.713959][ T7727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.778080][ T7751] IPVS: ftp: loaded support on port[0] = 21 [ 287.803740][ T7730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 05:46:32 executing program 4: [ 287.900393][ T7730] team0: Port device team_slave_0 added [ 287.912680][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.931303][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.006101][ T7730] team0: Port device team_slave_1 added [ 288.034451][ T7727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.088917][ T7733] chnl_net:caif_netlink_parms(): no params data found [ 288.129750][ T7727] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.194605][ T7730] device hsr_slave_0 entered promiscuous mode [ 288.232370][ T7730] device hsr_slave_1 entered promiscuous mode [ 288.261204][ T7730] debugfs: Directory 'hsr0' with parent '/' already present! [ 288.268732][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.281749][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.430946][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.472066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.511996][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.519157][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.622719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.672345][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.711904][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.718971][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.772169][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.823140][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.872543][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.912217][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.959526][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 05:46:33 executing program 5: [ 289.003060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.033511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 289.062921][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.092187][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 289.123671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.160998][ T7727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 289.235177][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 289.271303][ T7733] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.276275][ T7763] IPVS: ftp: loaded support on port[0] = 21 [ 289.278382][ T7733] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.341952][ T7733] device bridge_slave_0 entered promiscuous mode [ 289.379225][ T7733] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.411186][ T7733] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.424267][ T7733] device bridge_slave_1 entered promiscuous mode [ 289.459905][ T7751] chnl_net:caif_netlink_parms(): no params data found [ 289.506308][ T7794] IPVS: ftp: loaded support on port[0] = 21 [ 289.515014][ T7727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 289.535199][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 289.544810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 289.590771][ T7733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.667596][ T7733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.713292][ T7751] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.720354][ T7751] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.733548][ T7751] device bridge_slave_0 entered promiscuous mode [ 289.773164][ T7751] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.780228][ T7751] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.801896][ T7751] device bridge_slave_1 entered promiscuous mode [ 289.845358][ T7730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.867917][ T7751] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.891945][ T7733] team0: Port device team_slave_0 added [ 289.938601][ T7751] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.988242][ T7733] team0: Port device team_slave_1 added [ 290.033875][ T7751] team0: Port device team_slave_0 added [ 290.098453][ T7730] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.119268][ T7751] team0: Port device team_slave_1 added [ 290.163244][ T7733] device hsr_slave_0 entered promiscuous mode 05:46:34 executing program 0: [ 290.221377][ T7733] device hsr_slave_1 entered promiscuous mode [ 290.261195][ T7733] debugfs: Directory 'hsr0' with parent '/' already present! [ 290.284229][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.293151][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.323469][ T7794] chnl_net:caif_netlink_parms(): no params data found [ 290.344736][ T7763] chnl_net:caif_netlink_parms(): no params data found [ 290.356767][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.366140][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.381727][ T7759] bridge0: port 1(bridge_slave_0) entered blocking state 05:46:35 executing program 0: [ 290.388799][ T7759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.412532][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.421237][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.429511][ T7759] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.436589][ T7759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.460517][ T7730] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 290.482607][ T7730] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 05:46:35 executing program 0: [ 290.518152][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.526607][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.544398][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.563287][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.581859][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.590931][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.601645][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.610342][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 05:46:35 executing program 0: [ 290.625173][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.635892][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.644521][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 05:46:35 executing program 0: [ 290.700917][ T7730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.736057][ T7751] device hsr_slave_0 entered promiscuous mode [ 290.794528][ T7751] device hsr_slave_1 entered promiscuous mode [ 290.854034][ T7751] debugfs: Directory 'hsr0' with parent '/' already present! [ 290.864957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.876173][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.896843][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.904721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.978931][ T7794] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.989375][ T7794] bridge0: port 1(bridge_slave_0) entered disabled state 05:46:35 executing program 0: [ 291.021348][ T7794] device bridge_slave_0 entered promiscuous mode [ 291.129979][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.203669][ T7763] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.234270][ T7763] device bridge_slave_0 entered promiscuous mode [ 291.276993][ T7794] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.301192][ T7794] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.343426][ T7794] device bridge_slave_1 entered promiscuous mode 05:46:36 executing program 0: [ 291.419195][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.430467][ T7763] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.501977][ T7763] device bridge_slave_1 entered promiscuous mode [ 291.625606][ T7751] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.700557][ T7733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.740529][ T7794] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.802262][ T7751] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.809639][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.841809][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:46:36 executing program 1: [ 291.849713][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.901670][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.912457][ T7763] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.012336][ T7794] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.045405][ T7733] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.106021][ T7763] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.170574][ T7763] team0: Port device team_slave_0 added [ 292.275135][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.301867][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.341553][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.348641][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.434912][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.475085][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.515002][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.522157][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.594231][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.621723][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.681663][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.688768][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.759661][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.801678][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.841498][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.848562][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.921949][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.955592][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.014859][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.042105][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.082173][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.135069][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.161718][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.195017][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.229812][ T7751] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 293.281045][ T7751] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 293.319108][ T7794] team0: Port device team_slave_0 added [ 293.335604][ T7763] team0: Port device team_slave_1 added [ 293.342468][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.381784][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.405614][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.444991][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.461804][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.494700][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.522970][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.555432][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.579734][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.606028][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.618604][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.642474][ T7794] team0: Port device team_slave_1 added [ 293.654535][ T7733] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 293.665269][ T7733] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 293.694617][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 293.704918][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.713379][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.721754][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.730093][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.738375][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.746661][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.754217][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.763518][ T7751] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 293.823374][ T7763] device hsr_slave_0 entered promiscuous mode [ 293.861600][ T7763] device hsr_slave_1 entered promiscuous mode [ 293.901251][ T7763] debugfs: Directory 'hsr0' with parent '/' already present! [ 293.943418][ T7794] device hsr_slave_0 entered promiscuous mode [ 293.991422][ T7794] device hsr_slave_1 entered promiscuous mode [ 294.041708][ T7794] debugfs: Directory 'hsr0' with parent '/' already present! [ 294.049205][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.089666][ T7733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.130522][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.154442][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.426520][ T7763] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.495384][ T7794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.562040][ T7763] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.569198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.598865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.647193][ T7794] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.704153][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.734015][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.771674][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.831600][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.884440][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.891525][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.964838][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.011951][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.044106][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.051195][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.179670][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.211684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.220548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.300775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.355957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.408699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 05:46:40 executing program 2: 05:46:40 executing program 0: [ 295.481717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.554733][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.621698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.629943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.741819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.750083][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.801929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.810333][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.817386][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.921594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.930186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.001556][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.008615][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.061877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 296.070788][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 296.152218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 296.160762][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.213243][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.230175][ T7794] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 296.301167][ T7794] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.402842][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.411749][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.419658][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.492059][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 296.500728][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.561959][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.601809][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.654608][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.701706][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.728158][ T7794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.776418][ T7763] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.810593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.825045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.884559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.911396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.918842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:46:42 executing program 4: 05:46:42 executing program 5: 05:46:42 executing program 1: 05:46:42 executing program 3: 05:46:42 executing program 0: 05:46:42 executing program 2: 05:46:42 executing program 1: 05:46:42 executing program 2: 05:46:42 executing program 5: 05:46:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a4159", 0x2d}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:46:42 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb", 0x4d}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:46:42 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a5633", 0x53}], 0x4, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="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"], 0x240) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 297.655869][ T8015] ptrace attach of "/root/syz-executor.0"[8014] was attempted by "/root/syz-executor.0"[8015] 05:46:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000), 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000100)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) socket$unix(0x1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x24c) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8971495abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 05:46:42 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74dbf8ab321040f6883200b9a0dde9d2b2"], 0x444}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x332, 0x0) 05:46:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x7738f1ae9d486c6a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f80ffd1d3abf9d1a54bfce1e77551a8bd678625f508300200000040847bc2fdffff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f47382bc8117e669c6e3203053a6a05995f5ed199fcf8722be75fa42c080601d48e7081161161a2793d1429196b4d9182f7"], 0x8e) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) 05:46:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x3f, 0x7, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) 05:46:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x10, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x4}}}]}, 0x38}}, 0x0) r4 = getpid() tkill(r4, 0x9) [ 297.703543][ T8020] ptrace attach of "/root/syz-executor.3"[8019] was attempted by "/root/syz-executor.3"[8020] 05:46:42 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x17, 0x0, &(0x7f0000000180)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) [ 297.930102][ C0] hrtimer: interrupt took 25105 ns 05:46:42 executing program 5: readv(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) 05:46:42 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74dbf8ab321040f6883200b9a0dde9d2b2"], 0x444}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x332, 0x0) 05:46:42 executing program 3: io_setup(0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) [ 298.188645][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.223281][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 05:46:42 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 298.278409][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.306752][ T8058] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 298.321457][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.364163][ T8058] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 298.384477][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.402824][ T8060] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 05:46:43 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x30, 0x0, &(0x7f0000000180)) [ 298.416516][ T8052] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.428415][ T8060] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 05:46:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@session={'session', 0x3d, 0x2000057}}]}) 05:46:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x9a6}], 0x1, 0x0, 0x187}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) sendmsg(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="c0831d29e97834af45ba4cbd422047e80d88ab527bae215d0779a01c0607a8447aa37f102ca4c7e89ba16ab90cf7", 0x2e}, {&(0x7f0000000280)="646d66f1fb274041aff71096d579de90d7db37e9f4abea6784e365687424e3d3103d63f1e9b4ea85a00c87ec5cc01925820661672a9e6edf3534dd6b21072bd156c28d4814c965d206b986d2e4fe42b59eef0d22212026bd3f349877973e94", 0x5f}, {&(0x7f0000000340)="b944e47f6b81e988bf1c4786b17a737a5ee12d2ca35e974cf7d1feffdfdd40dea3cef1a10653759816e412b8abc67c03952d8f04e235a44942bfc9cb", 0x3c}], 0x3}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup(r0) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) 05:46:43 executing program 3: io_setup(0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) [ 298.758376][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 298.758396][ T25] audit: type=1804 audit(1574920003.455:31): pid=8048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir456179347/syzkaller.SfXj6f/11/bus/bus" dev="sda1" ino=16557 res=1 05:46:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000), 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000100)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) socket$unix(0x1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x24c) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8971495abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 05:46:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x9, 0x3f, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x151) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) 05:46:43 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x13, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000180)=0x54) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 05:46:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@session={'session', 0x3d, 0x2000057}}]}) [ 298.860893][ T25] audit: type=1804 audit(1574920003.455:32): pid=8048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir456179347/syzkaller.SfXj6f/11/bus/bus" dev="sda1" ino=16557 res=1 05:46:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x31, 0x0, &(0x7f0000000180)) munlock(&(0x7f0000856000/0x2000)=nil, 0x2000) 05:46:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net\x00') getdents64(r0, &(0x7f0000000100)=""/153, 0x99) 05:46:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@loopback, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 05:46:43 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x13, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000180)=0x54) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 05:46:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 05:46:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x21, 0x0, &(0x7f0000000180)) tkill(0x0, 0x9) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:46:44 executing program 5: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x21, 0x0, &(0x7f0000000180)) 05:46:44 executing program 3: io_setup(0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) 05:46:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@loopback, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 05:46:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x110000104e20, @empty}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) recvmmsg(r2, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0xffffffe5}}], 0x400000000000440, 0x2, 0x0) 05:46:44 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x13, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000180)=0x54) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 05:46:44 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000001d40)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) write$cgroup_pid(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0xffe00000, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, r3}, 0x3c) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) write$cgroup_int(r4, &(0x7f0000000080), 0x12) close(0xffffffffffffffff) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000c80)='./cgroup.net/syz0\x00'}, 0x30) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0)=r5, 0xffffffffffffff5f) [ 299.657738][ T8143] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:46:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a5633", 0x53}], 0x4, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 05:46:44 executing program 4: r0 = mq_open(&(0x7f0000001180)='eth0\x00', 0x802, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000001500)=""/4104, 0x1008, 0x0, 0x0) 05:46:44 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socket$netlink(0x10, 0x3, 0x0) semget$private(0x0, 0x2, 0x2) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r1 = accept4$unix(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)) 05:46:44 executing program 2: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x13, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000180)=0x54) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) [ 299.925278][ T8154] ================================================================== [ 299.933415][ T8154] BUG: KCSAN: data-race in bio_chain / bio_endio [ 299.939730][ T8154] [ 299.942062][ T8154] read to 0xffff888124829b14 of 2 bytes by interrupt on cpu 1: [ 299.949618][ T8154] bio_endio+0x3e/0x4f0 [ 299.953774][ T8154] blk_update_request+0x427/0x7b0 [ 299.958801][ T8154] scsi_end_request+0x6b/0x3e0 [ 299.963565][ T8154] scsi_io_completion+0x11d/0xc80 [ 299.968596][ T8154] scsi_finish_command+0x280/0x380 [ 299.973708][ T8154] scsi_softirq_done+0x259/0x280 [ 299.978646][ T8154] blk_done_softirq+0x1eb/0x250 [ 299.983507][ T8154] __do_softirq+0x115/0x33f [ 299.988017][ T8154] irq_exit+0xbb/0xe0 [ 299.992017][ T8154] do_IRQ+0x81/0x130 [ 299.995911][ T8154] ret_from_intr+0x0/0x19 [ 300.000244][ T8154] kcsan_setup_watchpoint+0x1d4/0x460 [ 300.005618][ T8154] __tsan_read1+0xc2/0x100 [ 300.010032][ T8154] memcmp+0x48/0x70 [ 300.013850][ T8154] strstr+0x5a/0x80 [ 300.017674][ T8154] tomoyo_supervisor+0xb7d/0xd20 [ 300.022625][ T8154] tomoyo_path_permission+0x121/0x160 [ 300.027992][ T8154] tomoyo_path_perm+0x23e/0x390 [ 300.032833][ T8154] tomoyo_inode_getattr+0x26/0x40 [ 300.037845][ T8154] security_inode_getattr+0x9b/0xd0 [ 300.043038][ T8154] vfs_getattr+0x2e/0x70 [ 300.047271][ T8154] vfs_statx+0x102/0x190 [ 300.051506][ T8154] __do_sys_newlstat+0x51/0xb0 [ 300.056259][ T8154] __x64_sys_newlstat+0x3a/0x50 [ 300.061101][ T8154] do_syscall_64+0xcc/0x370 [ 300.065615][ T8154] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.071486][ T8154] [ 300.073814][ T8154] write to 0xffff888124829b14 of 2 bytes by task 8154 on cpu 0: [ 300.081446][ T8154] bio_chain+0x86/0xb0 [ 300.085518][ T8154] __blk_queue_split+0x745/0xb40 [ 300.090452][ T8154] blk_mq_make_request+0x104/0xf60 [ 300.095552][ T8154] generic_make_request+0x196/0x740 [ 300.100736][ T8154] submit_bio+0x96/0x3c0 [ 300.104973][ T8154] do_blockdev_direct_IO+0x64e1/0x78c0 [ 300.110424][ T8154] __blockdev_direct_IO+0x86/0xa0 [ 300.115437][ T8154] ext4_direct_IO+0x76c/0xfb0 [ 300.120104][ T8154] generic_file_direct_write+0x14d/0x2e0 [ 300.125751][ T8154] __generic_file_write_iter+0x17e/0x380 [ 300.131371][ T8154] ext4_file_write_iter+0x1bd/0xa00 [ 300.136558][ T8154] new_sync_write+0x388/0x4a0 [ 300.141220][ T8154] __vfs_write+0xb1/0xc0 [ 300.145452][ T8154] vfs_write+0x18a/0x390 [ 300.149682][ T8154] ksys_write+0xd5/0x1b0 [ 300.153913][ T8154] __x64_sys_write+0x4c/0x60 [ 300.158492][ T8154] do_syscall_64+0xcc/0x370 [ 300.162986][ T8154] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.168860][ T8154] [ 300.171172][ T8154] Reported by Kernel Concurrency Sanitizer on: [ 300.177318][ T8154] CPU: 0 PID: 8154 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 300.185540][ T8154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.195579][ T8154] ================================================================== [ 300.203626][ T8154] Kernel panic - not syncing: panic_on_warn set ... [ 300.210205][ T8154] CPU: 0 PID: 8154 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 300.218422][ T8154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.228464][ T8154] Call Trace: [ 300.231753][ T8154] dump_stack+0x11d/0x181 [ 300.236081][ T8154] panic+0x210/0x640 [ 300.239973][ T8154] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 300.245860][ T8154] ? vprintk_func+0x8d/0x140 [ 300.250450][ T8154] kcsan_report.cold+0xc/0xd [ 300.255046][ T8154] kcsan_setup_watchpoint+0x3fe/0x460 [ 300.260417][ T8154] __tsan_unaligned_write2+0xc4/0x100 [ 300.265783][ T8154] bio_chain+0x86/0xb0 [ 300.269854][ T8154] __blk_queue_split+0x745/0xb40 [ 300.274814][ T8154] blk_mq_make_request+0x104/0xf60 [ 300.279919][ T8154] ? blk_queue_enter+0x53b/0x610 [ 300.284861][ T8154] generic_make_request+0x196/0x740 [ 300.290058][ T8154] submit_bio+0x96/0x3c0 [ 300.294296][ T8154] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 300.300188][ T8154] ? preempt_count_add+0x6f/0xb0 [ 300.305129][ T8154] do_blockdev_direct_IO+0x64e1/0x78c0 [ 300.310617][ T8154] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 300.316947][ T8154] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 300.323281][ T8154] __blockdev_direct_IO+0x86/0xa0 [ 300.328305][ T8154] ? write_end_fn+0xd0/0xd0 [ 300.332803][ T8154] ext4_direct_IO+0x76c/0xfb0 [ 300.337480][ T8154] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 300.343808][ T8154] generic_file_direct_write+0x14d/0x2e0 [ 300.349440][ T8154] __generic_file_write_iter+0x17e/0x380 [ 300.355071][ T8154] ? constant_test_bit+0x12/0x30 [ 300.360003][ T8154] ext4_file_write_iter+0x1bd/0xa00 [ 300.365198][ T8154] ? iov_iter_init+0xe2/0x120 [ 300.369869][ T8154] new_sync_write+0x388/0x4a0 [ 300.374550][ T8154] __vfs_write+0xb1/0xc0 [ 300.378783][ T8154] vfs_write+0x18a/0x390 [ 300.383017][ T8154] ksys_write+0xd5/0x1b0 [ 300.387254][ T8154] __x64_sys_write+0x4c/0x60 [ 300.391845][ T8154] do_syscall_64+0xcc/0x370 [ 300.396343][ T8154] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.402222][ T8154] RIP: 0033:0x45a649 [ 300.406112][ T8154] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.425711][ T8154] RSP: 002b:00007f92f1f90c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 300.434113][ T8154] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a649 [ 300.442076][ T8154] RDX: 0000000000400c00 RSI: 0000000020000200 RDI: 0000000000000008 [ 300.450039][ T8154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.458010][ T8154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92f1f916d4 [ 300.465973][ T8154] R13: 00000000004cb16b R14: 00000000004e38c0 R15: 00000000ffffffff [ 300.475420][ T8154] Kernel Offset: disabled [ 300.479744][ T8154] Rebooting in 86400 seconds..