[   33.497108] kauditd_printk_skb: 8 callbacks suppressed
[   33.497114] audit: type=1800 audit(1570742648.567:33): pid=6881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0
[   33.524255] audit: type=1800 audit(1570742648.567:34): pid=6881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   38.289945] random: sshd: uninitialized urandom read (32 bytes read)
[   38.565245] audit: type=1400 audit(1570742653.637:35): avc:  denied  { map } for  pid=7054 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[   38.609270] random: sshd: uninitialized urandom read (32 bytes read)
[   39.219726] random: sshd: uninitialized urandom read (32 bytes read)
Warning: Permanently added '10.128.1.7' (ECDSA) to the list of known hosts.
[   44.942277] random: sshd: uninitialized urandom read (32 bytes read)
2019/10/10 21:24:20 fuzzer started
[   45.138443] audit: type=1400 audit(1570742660.207:36): avc:  denied  { map } for  pid=7063 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   45.925218] random: cc1: uninitialized urandom read (8 bytes read)
2019/10/10 21:24:21 dialing manager at 10.128.0.105:34941
2019/10/10 21:24:27 syscalls: 2500
2019/10/10 21:24:27 code coverage: enabled
2019/10/10 21:24:27 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument
2019/10/10 21:24:27 extra coverage: extra coverage is not supported by the kernel
2019/10/10 21:24:27 setuid sandbox: enabled
2019/10/10 21:24:27 namespace sandbox: enabled
2019/10/10 21:24:27 Android sandbox: /sys/fs/selinux/policy does not exist
2019/10/10 21:24:27 fault injection: enabled
2019/10/10 21:24:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/10/10 21:24:27 net packet injection: enabled
2019/10/10 21:24:27 net device setup: enabled
2019/10/10 21:24:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
[   53.782278] random: crng init done
21:25:22 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"])
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]})

21:25:22 executing program 1:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
preadv(r3, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000)

[  107.602043] audit: type=1400 audit(1570742722.677:37): avc:  denied  { map } for  pid=7063 comm="syz-fuzzer" path="/root/syzkaller-shm517977421" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1
21:25:22 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1)

21:25:22 executing program 2:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

21:25:22 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]})
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)

21:25:22 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0xff)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c)
sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0)

[  107.629048] audit: type=1400 audit(1570742722.677:38): avc:  denied  { map } for  pid=7080 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=23 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[  107.930924] IPVS: ftp: loaded support on port[0] = 21
[  108.699217] chnl_net:caif_netlink_parms(): no params data found
[  108.707319] IPVS: ftp: loaded support on port[0] = 21
[  108.741553] bridge0: port 1(bridge_slave_0) entered blocking state
[  108.748295] bridge0: port 1(bridge_slave_0) entered disabled state
[  108.755505] device bridge_slave_0 entered promiscuous mode
[  108.762669] bridge0: port 2(bridge_slave_1) entered blocking state
[  108.769056] bridge0: port 2(bridge_slave_1) entered disabled state
[  108.776131] device bridge_slave_1 entered promiscuous mode
[  108.802525] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  108.813163] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  108.836087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  108.843511] team0: Port device team_slave_0 added
[  108.849125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  108.856383] team0: Port device team_slave_1 added
[  108.857435] IPVS: ftp: loaded support on port[0] = 21
[  108.861730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  108.874177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  108.932508] device hsr_slave_0 entered promiscuous mode
[  108.980335] device hsr_slave_1 entered promiscuous mode
[  109.060818] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  109.071071] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  109.101358] bridge0: port 2(bridge_slave_1) entered blocking state
[  109.107933] bridge0: port 2(bridge_slave_1) entered forwarding state
[  109.115003] bridge0: port 1(bridge_slave_0) entered blocking state
[  109.121402] bridge0: port 1(bridge_slave_0) entered forwarding state
[  109.148702] chnl_net:caif_netlink_parms(): no params data found
[  109.194529] bridge0: port 1(bridge_slave_0) entered blocking state
[  109.201084] bridge0: port 1(bridge_slave_0) entered disabled state
[  109.207982] device bridge_slave_0 entered promiscuous mode
[  109.216529] bridge0: port 2(bridge_slave_1) entered blocking state
[  109.223153] bridge0: port 2(bridge_slave_1) entered disabled state
[  109.229983] device bridge_slave_1 entered promiscuous mode
[  109.251298] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  109.268324] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  109.292518] IPVS: ftp: loaded support on port[0] = 21
[  109.304694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  109.312298] team0: Port device team_slave_0 added
[  109.333372] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  109.341808] team0: Port device team_slave_1 added
[  109.348829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  109.356448] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  109.442942] device hsr_slave_0 entered promiscuous mode
[  109.490412] device hsr_slave_1 entered promiscuous mode
[  109.540378] chnl_net:caif_netlink_parms(): no params data found
[  109.548605] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  109.557528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  109.565385] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  109.571589] 8021q: adding VLAN 0 to HW filter on device bond0
[  109.594682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  109.614859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  109.623283] bridge0: port 1(bridge_slave_0) entered disabled state
[  109.640826] bridge0: port 2(bridge_slave_1) entered disabled state
[  109.649080] IPVS: ftp: loaded support on port[0] = 21
[  109.661623] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  109.667717] 8021q: adding VLAN 0 to HW filter on device team0
[  109.682267] bridge0: port 1(bridge_slave_0) entered blocking state
[  109.688670] bridge0: port 1(bridge_slave_0) entered disabled state
[  109.696135] device bridge_slave_0 entered promiscuous mode
[  109.703274] bridge0: port 2(bridge_slave_1) entered blocking state
[  109.709622] bridge0: port 2(bridge_slave_1) entered disabled state
[  109.716974] device bridge_slave_1 entered promiscuous mode
[  109.732554] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  109.741136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  109.761362] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  109.769630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  109.779586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  109.801773] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  109.809706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  109.817943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  109.825761] bridge0: port 1(bridge_slave_0) entered blocking state
[  109.832142] bridge0: port 1(bridge_slave_0) entered forwarding state
[  109.839019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  109.847452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  109.855063] bridge0: port 2(bridge_slave_1) entered blocking state
[  109.861531] bridge0: port 2(bridge_slave_1) entered forwarding state
[  109.870937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  109.880750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  109.911968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  109.919646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  109.930790] chnl_net:caif_netlink_parms(): no params data found
[  109.953954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  109.967320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  109.979052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  109.986853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  109.994391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  110.002140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  110.009566] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  110.023715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  110.031058] team0: Port device team_slave_0 added
[  110.037722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  110.057375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  110.065530] team0: Port device team_slave_1 added
[  110.070899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  110.078492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  110.091469] bridge0: port 1(bridge_slave_0) entered blocking state
[  110.097830] bridge0: port 1(bridge_slave_0) entered disabled state
[  110.106017] device bridge_slave_0 entered promiscuous mode
[  110.112696] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  110.124276] bridge0: port 2(bridge_slave_1) entered blocking state
[  110.130740] bridge0: port 2(bridge_slave_1) entered disabled state
[  110.137708] device bridge_slave_1 entered promiscuous mode
[  110.144837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  110.155187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  110.178148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  110.188519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  110.198002] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  110.204411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  110.214128] IPVS: ftp: loaded support on port[0] = 21
[  110.272542] device hsr_slave_0 entered promiscuous mode
[  110.310406] device hsr_slave_1 entered promiscuous mode
[  110.355260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  110.364359] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  110.380502] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  110.401094] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  110.438913] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  110.447191] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  110.459474] 8021q: adding VLAN 0 to HW filter on device bond0
[  110.466858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  110.475954] team0: Port device team_slave_0 added
[  110.481850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  110.488861] team0: Port device team_slave_1 added
[  110.534431] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  110.541815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  110.555040] chnl_net:caif_netlink_parms(): no params data found
[  110.568095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  110.575787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  110.584306] 8021q: adding VLAN 0 to HW filter on device batadv0
[  110.595399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  110.607079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  110.630847] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  110.636956] 8021q: adding VLAN 0 to HW filter on device team0
[  110.687030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  110.732129] device hsr_slave_0 entered promiscuous mode
[  110.780428] device hsr_slave_1 entered promiscuous mode
[  110.820583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  110.828272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  110.835982] bridge0: port 1(bridge_slave_0) entered blocking state
[  110.842554] bridge0: port 1(bridge_slave_0) entered forwarding state
[  110.857425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  110.873749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  110.880946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  110.887589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  110.894797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  110.902902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  110.910652] bridge0: port 2(bridge_slave_1) entered blocking state
[  110.917016] bridge0: port 2(bridge_slave_1) entered forwarding state
[  110.924575] bridge0: port 1(bridge_slave_0) entered blocking state
[  110.933004] bridge0: port 1(bridge_slave_0) entered disabled state
[  110.940735] device bridge_slave_0 entered promiscuous mode
[  110.947977] bridge0: port 2(bridge_slave_1) entered blocking state
[  110.954784] bridge0: port 2(bridge_slave_1) entered disabled state
[  110.962204] device bridge_slave_1 entered promiscuous mode
[  111.009835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  111.054271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  111.062880] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  111.072374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  111.089419] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  111.104004] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  111.112666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  111.126679] 8021q: adding VLAN 0 to HW filter on device bond0
[  111.138461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
21:25:26 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"])
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]})

[  111.158249] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  111.167299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  111.177953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  111.189520] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  111.198113] chnl_net:caif_netlink_parms(): no params data found
[  111.226379] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  111.241803] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  111.249826] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  111.260476] 8021q: adding VLAN 0 to HW filter on device team0
21:25:26 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"])
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]})

[  111.276322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  111.296314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  111.309318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  111.316671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
21:25:26 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006b9"])
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186}]})

[  111.328797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  111.346369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  111.355884] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  111.370710] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  111.389573] team0: Port device team_slave_0 added
21:25:26 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0xa, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10)

[  111.411439] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  111.418745] team0: Port device team_slave_1 added
[  111.433122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  111.447374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  111.460916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  111.468663] bridge0: port 1(bridge_slave_0) entered blocking state
[  111.475066] bridge0: port 1(bridge_slave_0) entered forwarding state
[  111.482623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  111.491529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  111.499183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  111.509172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  111.526216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  111.541112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  111.549420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  111.559479] bridge0: port 2(bridge_slave_1) entered blocking state
[  111.565914] bridge0: port 2(bridge_slave_1) entered forwarding state
[  111.585258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  111.593954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  111.605124] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
21:25:26 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0xa, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10)

[  111.611222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  111.628754] bridge0: port 1(bridge_slave_0) entered blocking state
[  111.636164] bridge0: port 1(bridge_slave_0) entered disabled state
[  111.648890] device bridge_slave_0 entered promiscuous mode
[  111.657040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  111.665252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  111.674263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  111.703738] device hsr_slave_0 entered promiscuous mode
[  111.720314] protocol 88fb is buggy, dev hsr_slave_0
[  111.725594] protocol 88fb is buggy, dev hsr_slave_1
[  111.740569] device hsr_slave_1 entered promiscuous mode
21:25:26 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0xa, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10)

[  111.780709] bridge0: port 2(bridge_slave_1) entered blocking state
[  111.787169] bridge0: port 2(bridge_slave_1) entered disabled state
[  111.794477] device bridge_slave_1 entered promiscuous mode
[  111.805825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  111.817829] 8021q: adding VLAN 0 to HW filter on device bond0
[  111.832173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  111.843161] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  111.856074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  111.864876] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  111.874412] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  111.882272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  111.892052] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  111.899056] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  111.911759] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  111.924767] 8021q: adding VLAN 0 to HW filter on device batadv0
21:25:27 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0xa, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10)

[  111.932057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  111.939660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  111.962854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  111.975911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  111.983708] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  111.997439] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  112.007734] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  112.021913] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  112.035542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  112.046551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  112.067110] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  112.073532] 8021q: adding VLAN 0 to HW filter on device team0
[  112.081353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  112.099691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  112.107183] team0: Port device team_slave_0 added
[  112.114704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  112.123523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  112.131467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  112.139253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  112.147585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  112.157376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  112.167503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  112.175279] team0: Port device team_slave_1 added
[  112.182679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  112.193408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  112.203378] bridge0: port 1(bridge_slave_0) entered blocking state
[  112.209746] bridge0: port 1(bridge_slave_0) entered forwarding state
[  112.218697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  112.229255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  112.237037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  112.244702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  112.252051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  112.259775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  112.267478] bridge0: port 2(bridge_slave_1) entered blocking state
[  112.273855] bridge0: port 2(bridge_slave_1) entered forwarding state
[  112.283375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  112.295010] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  112.302548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  112.324241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
21:25:27 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58)
r2 = accept$alg(r1, 0x0, 0x0)
close(r1)
close(r2)

[  112.348751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  112.362367] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  112.405234] device hsr_slave_0 entered promiscuous mode
[  112.450463] device hsr_slave_1 entered promiscuous mode
[  112.490454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  112.499714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  112.508486] 8021q: adding VLAN 0 to HW filter on device batadv0
[  112.519011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  112.526440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  112.538506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  112.547326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  112.557267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  112.573296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  112.584281] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  112.595804] 8021q: adding VLAN 0 to HW filter on device bond0
[  112.605222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  112.613141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  112.622573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  112.632510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  112.639919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  112.652530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  112.663190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  112.674085] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  112.685152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  112.693856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  112.701952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  112.710773] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  112.719152] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  112.729098] 8021q: adding VLAN 0 to HW filter on device team0
[  112.742692] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  112.750731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  112.757729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  112.768943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  112.778052] 8021q: adding VLAN 0 to HW filter on device batadv0
[  112.785916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  112.794634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  112.806548] bridge0: port 1(bridge_slave_0) entered blocking state
[  112.813167] bridge0: port 1(bridge_slave_0) entered forwarding state
[  112.820477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  112.832483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  112.843513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  112.853800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  112.863894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  112.873927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  112.882407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  112.890623] bridge0: port 2(bridge_slave_1) entered blocking state
[  112.896982] bridge0: port 2(bridge_slave_1) entered forwarding state
[  112.904731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  112.913107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  112.925296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  112.939207] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  112.946932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  112.954995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  112.963698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  112.971560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  112.994519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  113.002996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  113.013489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  113.023420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  113.032552] ISOFS: Invalid session number or type of track
[  113.043727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  113.055467] ISOFS: Invalid session number
[  113.065794] 8021q: adding VLAN 0 to HW filter on device bond0
[  113.080513] ISOFS: Unable to identify CD-ROM format.
[  113.085206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  113.093747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  113.103245] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  113.109264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  113.119120] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  113.151413] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  113.158709] ISOFS: Invalid session number or type of track
[  113.167110] ISOFS: Invalid session number
[  113.175697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  113.187382] ISOFS: Unable to identify CD-ROM format.
[  113.187630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  113.206175] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  113.214830] 8021q: adding VLAN 0 to HW filter on device team0
[  113.226810] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  113.238021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  113.246633] 8021q: adding VLAN 0 to HW filter on device batadv0
[  113.256521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  113.265203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  113.273463] bridge0: port 1(bridge_slave_0) entered blocking state
[  113.279808] bridge0: port 1(bridge_slave_0) entered forwarding state
[  113.293541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  113.302013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  113.313213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  113.321950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  113.329580] bridge0: port 2(bridge_slave_1) entered blocking state
[  113.335989] bridge0: port 2(bridge_slave_1) entered forwarding state
[  113.345246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  113.353240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  113.365313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  113.375787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  113.387891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  113.399059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  113.409247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  113.418813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  113.426648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  113.434682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  113.442452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
21:25:28 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1)

[  113.467894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  113.478870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  113.487353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  113.501769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  113.511441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  113.518959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  113.528858] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  113.535365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  113.551300] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  113.562270] 8021q: adding VLAN 0 to HW filter on device batadv0
21:25:29 executing program 2:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

21:25:29 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10)
getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000))

21:25:29 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0)

21:25:29 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0xff)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c)
sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0)

21:25:29 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]})
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)

21:25:29 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1)

21:25:29 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0xff)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c)
sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0)

21:25:29 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a240800418e00000004fcff", 0x58}], 0x1)

[  114.685657] ISOFS: Invalid session number or type of track
21:25:29 executing program 2:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

[  114.743877] ISOFS: Invalid session number
21:25:29 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10)
getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000))

21:25:29 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0xff)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c)
sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="f67f98000000000062bcd978b94585b9bf1600ed8bc3b5151e130159f21c57f08af51446c18bf800", 0x28}], 0x1}, 0x0)

21:25:29 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0)

21:25:29 executing program 2:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

[  114.841526] ISOFS: Unable to identify CD-ROM format.
21:25:29 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10)
getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000))

21:25:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0)

21:25:30 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10)
getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000))

21:25:30 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]})
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)

21:25:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020400ff02000223fff8", 0x16}], 0x0, 0x0)

[  115.096793] ISOFS: Invalid session number or type of track
[  115.109950] ISOFS: Invalid session number
[  115.149143] ISOFS: Unable to identify CD-ROM format.
21:25:30 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@norock='norock'}, {@hide='hide'}, {@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@gid={'gid'}}, {@hide='hide'}, {@session={'session', 0x3d, 0x23}}]})
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)

[  115.281358] ISOFS: Invalid session number or type of track
[  115.287034] ISOFS: Invalid session number
[  115.304476] ISOFS: Unable to identify CD-ROM format.
21:25:32 executing program 5:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

21:25:32 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
io_setup(0x3, &(0x7f00000001c0)=<r1=>0x0)
io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}])

21:25:32 executing program 4:
socket$inet(0x2, 0x0, 0x4000000ffff)

21:25:32 executing program 2:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:32 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)
preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0)
stat(&(0x7f00000006c0)='./file0\x00', 0x0)

21:25:32 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})

21:25:32 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}})

21:25:32 executing program 5:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

21:25:32 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})

[  117.369215] hrtimer: interrupt took 38018 ns
21:25:32 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})

21:25:32 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)
preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0)
stat(&(0x7f00000006c0)='./file0\x00', 0x0)

21:25:32 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
io_setup(0x3, &(0x7f00000001c0)=<r1=>0x0)
io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}])

21:25:32 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}})

21:25:32 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})

21:25:32 executing program 5:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1)
getresuid(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000032c0))

[  117.553997] audit: type=1800 audit(1570742732.627:39): pid=7308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0
21:25:32 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}})

21:25:32 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
io_setup(0x3, &(0x7f00000001c0)=<r1=>0x0)
io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}])

21:25:32 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

21:25:32 executing program 2:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

[  117.690487] audit: type=1800 audit(1570742732.747:40): pid=7330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0
21:25:32 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)
preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0)
stat(&(0x7f00000006c0)='./file0\x00', 0x0)

21:25:32 executing program 3:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:32 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @empty}})

21:25:32 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
io_setup(0x3, &(0x7f00000001c0)=<r1=>0x0)
io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}])

21:25:32 executing program 4:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:33 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)
preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0)
stat(&(0x7f00000006c0)='./file0\x00', 0x0)

[  117.972510] audit: type=1800 audit(1570742733.047:41): pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=16559 res=0
[  118.038141] audit: type=1400 audit(1570742733.107:42): avc:  denied  { associate } for  pid=7356 comm="syz-executor.4" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
21:25:33 executing program 0:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:33 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

21:25:33 executing program 4:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:33 executing program 3:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

[  118.176025] audit: type=1800 audit(1570742733.187:43): pid=7359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16577 res=0
21:25:33 executing program 2:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

[  118.301785] audit: type=1800 audit(1570742733.367:44): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16573 res=0
21:25:33 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

21:25:33 executing program 0:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

[  118.360161] audit: type=1800 audit(1570742733.377:45): pid=7374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0
21:25:33 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

[  118.533342] audit: type=1800 audit(1570742733.607:46): pid=7392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16574 res=0
21:25:33 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

[  118.632425] audit: type=1800 audit(1570742733.707:47): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=16573 res=0
21:25:33 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

21:25:33 executing program 4:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:33 executing program 3:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

[  118.813128] audit: type=1800 audit(1570742733.887:48): pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16559 res=0
21:25:33 executing program 2:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x8010000400000084)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c)
listen(r0, 0xffffffff80000001)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x3}, 0x98)

21:25:34 executing program 5:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 0:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 5:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 1:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10)

21:25:34 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071")
r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0)
ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0})

21:25:34 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0)
syz_open_procfs(0x0, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0))
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}})
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = fcntl$dupfd(r4, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0)

21:25:34 executing program 5:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 0:
syz_read_part_table(0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x8bb}, {&(0x7f0000000000)="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", 0x1d2, 0x5}])

21:25:34 executing program 1:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:34 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:34 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:34 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071")
r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0)
ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0})

21:25:34 executing program 5:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:34 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0)
syz_open_procfs(0x0, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0))
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}})
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = fcntl$dupfd(r4, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0)

21:25:34 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071")
r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0)
ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0})

21:25:35 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0)
syz_open_procfs(0x0, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0))
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}})
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = fcntl$dupfd(r4, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0)

[  119.862692] Dev loop0: unable to read RDB block 8
[  119.868061]  loop0: unable to read partition table
[  119.886326] loop0: partition table beyond EOD, truncated
[  119.898650] loop_reread_partitions: partition scan of loop0 () failed (rc=-5)
21:25:35 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:35 executing program 1:
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x8, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x29b3175e}, 0x28, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)

21:25:35 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071")
r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0)
ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0})

[  120.011133] Dev loop0: unable to read RDB block 8
[  120.016438]  loop0: unable to read partition table
[  120.022222] loop0: partition table beyond EOD, truncated
[  120.028017] loop_reread_partitions: partition scan of loop0 () failed (rc=-5)
21:25:35 executing program 0:
syz_read_part_table(0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x8bb}, {&(0x7f0000000000)="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", 0x1d2, 0x5}])

21:25:35 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0)
syz_open_procfs(0x0, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0))
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22}})
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = fcntl$dupfd(r4, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$rtc(0xffffffffffffff9c, 0x0, 0xf39b6ab3db27cef7, 0x0)

21:25:35 executing program 5:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:35 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

21:25:35 executing program 2:
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
ptrace$peekuser(0x3, 0x0, 0x1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, 0x0)
syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0)
socket(0x0, 0x0, 0x0)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0)
close(r0)
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)

21:25:35 executing program 5:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r3, &(0x7f00000001c0), 0x0}, 0x20)

[  284.640286] INFO: task syz-executor.0:7083 blocked for more than 140 seconds.
[  284.647745]       Not tainted 4.14.148 #0
[  284.651944] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  284.659996] syz-executor.0  D24992  7083      1 0x00000004
[  284.667156] Call Trace:
[  284.669861]  __schedule+0x7b8/0x1cd0
[  284.673612]  ? __mutex_lock+0x737/0x1470
[  284.677671]  ? pci_mmcfg_check_reserved+0x150/0x150
[  284.682727]  schedule+0x92/0x1c0
[  284.686085]  schedule_preempt_disabled+0x13/0x20
[  284.690872]  __mutex_lock+0x73c/0x1470
[  284.694826]  ? blkdev_reread_part+0x1f/0x40
[  284.699129]  ? mutex_trylock+0x1c0/0x1c0
[  284.703234]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  284.708329]  ? __wake_up_common_lock+0xe3/0x160
[  284.713024]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  284.718122]  mutex_lock_nested+0x16/0x20
[  284.722236]  ? mutex_lock_nested+0x16/0x20
[  284.726460]  blkdev_reread_part+0x1f/0x40
[  284.730648]  loop_reread_partitions+0x7c/0x90
[  284.735160]  loop_clr_fd+0x844/0xae0
[  284.738941]  lo_ioctl+0x8ea/0x1ce0
[  284.742506]  ? debug_check_no_obj_freed+0x2aa/0x7b7
[  284.747513]  ? loop_probe+0x160/0x160
[  284.751339]  blkdev_ioctl+0x96b/0x1860
[  284.755215]  ? blkpg_ioctl+0x980/0x980
[  284.759083]  ? __might_sleep+0x93/0xb0
[  284.762998]  block_ioctl+0xde/0x120
[  284.766615]  ? blkdev_fallocate+0x3b0/0x3b0
[  284.770969]  do_vfs_ioctl+0x7ae/0x1060
[  284.774846]  ? selinux_file_mprotect+0x5d0/0x5d0
[  284.779577]  ? ioctl_preallocate+0x1c0/0x1c0
[  284.784000]  ? putname+0xe0/0x120
[  284.787443]  ? do_sys_open+0x221/0x430
[  284.791359]  ? security_file_ioctl+0x7d/0xb0
[  284.795755]  ? security_file_ioctl+0x89/0xb0
[  284.800185]  SyS_ioctl+0x8f/0xc0
[  284.803547]  ? do_vfs_ioctl+0x1060/0x1060
[  284.807692]  do_syscall_64+0x1e8/0x640
[  284.811605]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  284.816440]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  284.821653] RIP: 0033:0x4598c7
[  284.824829] RSP: 002b:00007fffd7049df8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  284.832906] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598c7
[  284.840195] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003
[  284.847462] RBP: 0000000000000030 R08: 0000000000000000 R09: 000000000000000a
[  284.854758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  284.862051] R13: 00007fffd7049e30 R14: 000000000001d3e1 R15: 00007fffd7049e40
[  284.869339] INFO: task syz-executor.1:7087 blocked for more than 140 seconds.
[  284.876652]       Not tainted 4.14.148 #0
[  284.880850] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  284.888806] syz-executor.1  D24992  7087      1 0x00000004
[  284.894485] Call Trace:
[  284.897068]  __schedule+0x7b8/0x1cd0
[  284.900802]  ? __mutex_lock+0x737/0x1470
[  284.904874]  ? pci_mmcfg_check_reserved+0x150/0x150
[  284.909992]  schedule+0x92/0x1c0
[  284.913453]  schedule_preempt_disabled+0x13/0x20
[  284.918206]  __mutex_lock+0x73c/0x1470
[  284.922133]  ? trace_hardirqs_on+0x10/0x10
[  284.926957]  ? lo_open+0x1d/0xb0
[  284.930384]  ? refcount_inc_not_zero+0x60/0xe0
[  284.934960]  ? mutex_trylock+0x1c0/0x1c0
[  284.939020]  ? find_held_lock+0x35/0x130
[  284.943124]  ? disk_get_part+0x9c/0x140
[  284.947110]  ? lock_downgrade+0x740/0x740
[  284.951296]  ? loop_unregister_transfer+0x90/0x90
[  284.956132]  mutex_lock_nested+0x16/0x20
[  284.960286]  ? mutex_lock_nested+0x16/0x20
[  284.964513]  lo_open+0x1d/0xb0
[  284.967689]  __blkdev_get+0x2c7/0x1120
[  284.971617]  ? __blkdev_put+0x7f0/0x7f0
[  284.975600]  ? bd_acquire+0x178/0x2c0
[  284.979388]  ? find_held_lock+0x35/0x130
[  284.983493]  blkdev_get+0xa8/0x8e0
[  284.987037]  ? bd_may_claim+0xd0/0xd0
[  284.990914]  ? _raw_spin_unlock+0x2d/0x50
[  284.995056]  blkdev_open+0x1d1/0x260
[  284.998757]  ? security_file_open+0x89/0x190
[  285.003229]  do_dentry_open+0x73b/0xeb0
[  285.007217]  ? bd_acquire+0x2c0/0x2c0
[  285.011056]  vfs_open+0x105/0x220
[  285.014501]  path_openat+0x8bd/0x3f70
[  285.018290]  ? trace_hardirqs_on+0x10/0x10
[  285.022572]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  285.027231]  ? find_held_lock+0x35/0x130
[  285.031332]  ? __alloc_fd+0x1d4/0x4a0
[  285.035123]  do_filp_open+0x18e/0x250
[  285.038905]  ? may_open_dev+0xe0/0xe0
[  285.043041]  ? _raw_spin_unlock+0x2d/0x50
[  285.047195]  ? __alloc_fd+0x1d4/0x4a0
[  285.051051]  do_sys_open+0x2c5/0x430
[  285.054766]  ? filp_open+0x70/0x70
[  285.058291]  SyS_open+0x2d/0x40
[  285.061615]  ? do_sys_open+0x430/0x430
[  285.065499]  do_syscall_64+0x1e8/0x640
[  285.069369]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  285.074275]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.079455] RIP: 0033:0x413920
[  285.082672] RSP: 002b:00007ffe02a10388 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  285.090421] RAX: ffffffffffffffda RBX: 000000000001d4b5 RCX: 0000000000413920
[  285.097681] RDX: 00007ffe02a1041a RSI: 0000000000000002 RDI: 00007ffe02a10410
[  285.104976] RBP: 0000000000000029 R08: 0000000000000000 R09: 000000000000000a
[  285.112263] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  285.119513] R13: 00007ffe02a103c0 R14: 000000000001d3ff R15: 00007ffe02a103d0
[  285.126949] INFO: task syz-executor.5:7089 blocked for more than 140 seconds.
[  285.134256]       Not tainted 4.14.148 #0
[  285.138381] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  285.146371] syz-executor.5  D25168  7089      1 0x00000004
[  285.152046] Call Trace:
[  285.154624]  __schedule+0x7b8/0x1cd0
[  285.158333]  ? __mutex_lock+0x737/0x1470
[  285.162462]  ? pci_mmcfg_check_reserved+0x150/0x150
[  285.167480]  schedule+0x92/0x1c0
[  285.170947]  schedule_preempt_disabled+0x13/0x20
[  285.175829]  __mutex_lock+0x73c/0x1470
[  285.179753]  ? __mutex_unlock_slowpath+0x71/0x800
[  285.184660]  ? __blkdev_get+0x145/0x1120
[  285.188736]  ? mutex_trylock+0x1c0/0x1c0
[  285.192858]  ? exact_match+0xd/0x20
[  285.196500]  ? kobj_lookup+0x314/0x400
[  285.200421]  ? blkdev_ioctl+0x1860/0x1860
[  285.204568]  mutex_lock_nested+0x16/0x20
[  285.208609]  ? mutex_lock_nested+0x16/0x20
[  285.212883]  __blkdev_get+0x145/0x1120
[  285.216766]  ? __blkdev_put+0x7f0/0x7f0
[  285.220758]  ? bd_acquire+0x178/0x2c0
[  285.224548]  ? find_held_lock+0x35/0x130
[  285.228591]  blkdev_get+0xa8/0x8e0
[  285.232218]  ? bd_may_claim+0xd0/0xd0
[  285.236115]  ? _raw_spin_unlock+0x2d/0x50
[  285.240295]  blkdev_open+0x1d1/0x260
[  285.244022]  ? security_file_open+0x89/0x190
[  285.248413]  do_dentry_open+0x73b/0xeb0
[  285.252592]  ? bd_acquire+0x2c0/0x2c0
[  285.256403]  vfs_open+0x105/0x220
[  285.259854]  path_openat+0x8bd/0x3f70
[  285.263702]  ? trace_hardirqs_on+0x10/0x10
[  285.267944]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  285.272651]  ? find_held_lock+0x35/0x130
[  285.276708]  ? __alloc_fd+0x1d4/0x4a0
[  285.280549]  do_filp_open+0x18e/0x250
[  285.284368]  ? may_open_dev+0xe0/0xe0
[  285.288167]  ? _raw_spin_unlock+0x2d/0x50
[  285.292387]  ? __alloc_fd+0x1d4/0x4a0
[  285.296247]  do_sys_open+0x2c5/0x430
[  285.299957]  ? filp_open+0x70/0x70
[  285.303614]  SyS_open+0x2d/0x40
[  285.306904]  ? do_sys_open+0x430/0x430
[  285.310845]  do_syscall_64+0x1e8/0x640
[  285.314726]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  285.319555]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.324779] RIP: 0033:0x413920
[  285.327963] RSP: 002b:00007ffcd32c1e08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  285.335710] RAX: ffffffffffffffda RBX: 000000000001d589 RCX: 0000000000413920
[  285.343018] RDX: 00007ffcd32c1e9a RSI: 0000000000000002 RDI: 00007ffcd32c1e90
[  285.350335] RBP: 0000000000000027 R08: 0000000000000000 R09: 000000000000000a
[  285.357595] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  285.365011] R13: 00007ffcd32c1e40 R14: 000000000001d535 R15: 00007ffcd32c1e50
[  285.372347] INFO: task syz-executor.4:7090 blocked for more than 140 seconds.
[  285.379612]       Not tainted 4.14.148 #0
[  285.383779] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  285.391763] syz-executor.4  D25168  7090      1 0x00000004
[  285.397375] Call Trace:
[  285.399946]  __schedule+0x7b8/0x1cd0
[  285.403684]  ? __mutex_lock+0x737/0x1470
[  285.407741]  ? pci_mmcfg_check_reserved+0x150/0x150
[  285.412806]  schedule+0x92/0x1c0
[  285.416161]  schedule_preempt_disabled+0x13/0x20
[  285.420946]  __mutex_lock+0x73c/0x1470
[  285.424844]  ? trace_hardirqs_on+0x10/0x10
[  285.429062]  ? lo_open+0x1d/0xb0
[  285.432460]  ? refcount_inc_not_zero+0x60/0xe0
[  285.437045]  ? mutex_trylock+0x1c0/0x1c0
[  285.441201]  ? find_held_lock+0x35/0x130
[  285.445255]  ? disk_get_part+0x9c/0x140
[  285.449211]  ? lock_downgrade+0x740/0x740
[  285.453401]  ? loop_unregister_transfer+0x90/0x90
[  285.458234]  mutex_lock_nested+0x16/0x20
[  285.462311]  ? mutex_lock_nested+0x16/0x20
[  285.466536]  lo_open+0x1d/0xb0
[  285.469708]  __blkdev_get+0x2c7/0x1120
[  285.473634]  ? __blkdev_put+0x7f0/0x7f0
[  285.477620]  ? bd_acquire+0x178/0x2c0
[  285.481459]  ? find_held_lock+0x35/0x130
[  285.485531]  blkdev_get+0xa8/0x8e0
[  285.489065]  ? bd_may_claim+0xd0/0xd0
[  285.492921]  ? _raw_spin_unlock+0x2d/0x50
[  285.497075]  blkdev_open+0x1d1/0x260
[  285.500811]  ? security_file_open+0x89/0x190
[  285.505228]  do_dentry_open+0x73b/0xeb0
[  285.509181]  ? bd_acquire+0x2c0/0x2c0
[  285.513026]  vfs_open+0x105/0x220
[  285.516470]  path_openat+0x8bd/0x3f70
[  285.521149]  ? trace_hardirqs_on+0x10/0x10
[  285.525379]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  285.530092]  ? find_held_lock+0x35/0x130
[  285.534173]  ? __alloc_fd+0x1d4/0x4a0
[  285.538120]  do_filp_open+0x18e/0x250
[  285.542077]  ? may_open_dev+0xe0/0xe0
[  285.545903]  ? _raw_spin_unlock+0x2d/0x50
[  285.550148]  ? __alloc_fd+0x1d4/0x4a0
[  285.553971]  do_sys_open+0x2c5/0x430
[  285.557678]  ? filp_open+0x70/0x70
[  285.561275]  SyS_open+0x2d/0x40
[  285.564622]  ? do_sys_open+0x430/0x430
[  285.568498]  do_syscall_64+0x1e8/0x640
[  285.572429]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  285.577274]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.582508] RIP: 0033:0x413920
[  285.585829] RSP: 002b:00007ffeefea2558 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  285.593596] RAX: ffffffffffffffda RBX: 000000000001d54f RCX: 0000000000413920
[  285.600899] RDX: 00007ffeefea25ea RSI: 0000000000000002 RDI: 00007ffeefea25e0
[  285.608160] RBP: 0000000000000027 R08: 0000000000000000 R09: 000000000000000a
[  285.615518] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  285.622823] R13: 00007ffeefea2590 R14: 000000000001d4e8 R15: 00007ffeefea25a0
[  285.630148] INFO: task syz-executor.2:7091 blocked for more than 140 seconds.
[  285.637423]       Not tainted 4.14.148 #0
[  285.641608] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  285.649563] syz-executor.2  D25168  7091      1 0x00000004
[  285.655250] Call Trace:
[  285.657831]  __schedule+0x7b8/0x1cd0
[  285.661571]  ? __mutex_lock+0x737/0x1470
[  285.665642]  ? pci_mmcfg_check_reserved+0x150/0x150
[  285.670718]  schedule+0x92/0x1c0
[  285.674076]  schedule_preempt_disabled+0x13/0x20
[  285.678809]  __mutex_lock+0x73c/0x1470
[  285.682739]  ? trace_hardirqs_on+0x10/0x10
[  285.686967]  ? lo_open+0x1d/0xb0
[  285.690372]  ? refcount_inc_not_zero+0x60/0xe0
[  285.694952]  ? mutex_trylock+0x1c0/0x1c0
[  285.698994]  ? find_held_lock+0x35/0x130
[  285.703084]  ? disk_get_part+0x9c/0x140
[  285.707052]  ? lock_downgrade+0x740/0x740
[  285.711241]  ? loop_unregister_transfer+0x90/0x90
[  285.716092]  mutex_lock_nested+0x16/0x20
[  285.720196]  ? mutex_lock_nested+0x16/0x20
[  285.724421]  lo_open+0x1d/0xb0
[  285.727605]  __blkdev_get+0x2c7/0x1120
[  285.731546]  ? __blkdev_put+0x7f0/0x7f0
[  285.735511]  ? bd_acquire+0x178/0x2c0
[  285.739292]  ? find_held_lock+0x35/0x130
[  285.743479]  blkdev_get+0xa8/0x8e0
[  285.747035]  ? bd_may_claim+0xd0/0xd0
[  285.750879]  ? _raw_spin_unlock+0x2d/0x50
[  285.755019]  blkdev_open+0x1d1/0x260
[  285.758716]  ? security_file_open+0x89/0x190
[  285.763149]  do_dentry_open+0x73b/0xeb0
[  285.767122]  ? bd_acquire+0x2c0/0x2c0
[  285.770972]  vfs_open+0x105/0x220
[  285.774420]  path_openat+0x8bd/0x3f70
[  285.778203]  ? trace_hardirqs_on+0x10/0x10
[  285.782482]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  285.787144]  ? find_held_lock+0x35/0x130
[  285.791243]  ? __alloc_fd+0x1d4/0x4a0
[  285.795037]  do_filp_open+0x18e/0x250
[  285.798816]  ? may_open_dev+0xe0/0xe0
[  285.802652]  ? _raw_spin_unlock+0x2d/0x50
[  285.806788]  ? __alloc_fd+0x1d4/0x4a0
[  285.810641]  do_sys_open+0x2c5/0x430
[  285.814348]  ? filp_open+0x70/0x70
[  285.817867]  SyS_open+0x2d/0x40
[  285.821179]  ? do_sys_open+0x430/0x430
[  285.825071]  do_syscall_64+0x1e8/0x640
[  285.828938]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  285.833817]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.839006] RIP: 0033:0x413920
[  285.842234] RSP: 002b:00007ffd38057e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  285.849936] RAX: ffffffffffffffda RBX: 000000000001d513 RCX: 0000000000413920
[  285.857241] RDX: 00007ffd38057f0a RSI: 0000000000000002 RDI: 00007ffd38057f00
[  285.864712] RBP: 0000000000000020 R08: 0000000000000000 R09: 000000000000000a
[  285.872012] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  285.879270] R13: 00007ffd38057eb0 R14: 000000000001d4f2 R15: 00007ffd38057ec0
[  285.886596] INFO: task blkid:7501 blocked for more than 140 seconds.
[  285.893127]       Not tainted 4.14.148 #0
[  285.897250] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  285.905231] blkid           D29040  7501   7049 0x00000004
[  285.910918] Call Trace:
[  285.913497]  __schedule+0x7b8/0x1cd0
[  285.917186]  ? __mutex_lock+0x737/0x1470
[  285.921280]  ? pci_mmcfg_check_reserved+0x150/0x150
[  285.926293]  schedule+0x92/0x1c0
[  285.929635]  schedule_preempt_disabled+0x13/0x20
[  285.934439]  __mutex_lock+0x73c/0x1470
[  285.938331]  ? lo_open+0x1d/0xb0
[  285.941733]  ? refcount_inc_not_zero+0x60/0xe0
[  285.946305]  ? mutex_trylock+0x1c0/0x1c0
[  285.950410]  ? exact_match+0xd/0x20
[  285.954050]  ? kobj_lookup+0x314/0x400
[  285.957947]  ? loop_unregister_transfer+0x90/0x90
[  285.962810]  mutex_lock_nested+0x16/0x20
[  285.966872]  ? mutex_lock_nested+0x16/0x20
[  285.971151]  lo_open+0x1d/0xb0
[  285.974332]  __blkdev_get+0xaad/0x1120
[  285.978200]  ? __blkdev_put+0x7f0/0x7f0
[  285.982209]  ? bd_acquire+0x178/0x2c0
[  285.986003]  ? find_held_lock+0x35/0x130
[  285.990100]  blkdev_get+0xa8/0x8e0
[  285.993670]  ? bd_may_claim+0xd0/0xd0
[  285.997452]  ? _raw_spin_unlock+0x2d/0x50
[  286.001705]  blkdev_open+0x1d1/0x260
[  286.005421]  ? security_file_open+0x89/0x190
[  286.009810]  do_dentry_open+0x73b/0xeb0
[  286.013823]  ? bd_acquire+0x2c0/0x2c0
[  286.017631]  vfs_open+0x105/0x220
[  286.021121]  path_openat+0x8bd/0x3f70
[  286.024915]  ? trace_hardirqs_on+0x10/0x10
[  286.029144]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  286.033846]  ? find_held_lock+0x35/0x130
[  286.037920]  ? __alloc_fd+0x1d4/0x4a0
[  286.041758]  do_filp_open+0x18e/0x250
[  286.045634]  ? may_open_dev+0xe0/0xe0
[  286.049429]  ? _raw_spin_unlock+0x2d/0x50
[  286.053623]  ? __alloc_fd+0x1d4/0x4a0
[  286.057426]  do_sys_open+0x2c5/0x430
[  286.061174]  ? filp_open+0x70/0x70
[  286.064708]  SyS_open+0x2d/0x40
[  286.067964]  ? do_sys_open+0x430/0x430
[  286.071907]  do_syscall_64+0x1e8/0x640
[  286.075801]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  286.080704]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.085895] RIP: 0033:0x7f16ec7c3120
[  286.089582] RSP: 002b:00007fffb66e7878 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  286.097333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f16ec7c3120
[  286.104620] RDX: 00007fffb66e8f41 RSI: 0000000000000000 RDI: 00007fffb66e8f41
[  286.111921] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  286.119195] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000172f030
[  286.126486] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  286.133787] INFO: task blkid:7502 blocked for more than 140 seconds.
[  286.140297]       Not tainted 4.14.148 #0
[  286.144431] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  286.152429] blkid           D29040  7502   7222 0x00000004
[  286.158067] Call Trace:
[  286.160705]  __schedule+0x7b8/0x1cd0
[  286.164421]  ? __mutex_lock+0x737/0x1470
[  286.168470]  ? pci_mmcfg_check_reserved+0x150/0x150
[  286.173556]  schedule+0x92/0x1c0
[  286.176975]  schedule_preempt_disabled+0x13/0x20
[  286.181753]  __mutex_lock+0x73c/0x1470
[  286.185631]  ? trace_hardirqs_on+0x10/0x10
[  286.189847]  ? lo_open+0x1d/0xb0
[  286.193253]  ? refcount_inc_not_zero+0x60/0xe0
[  286.197847]  ? mutex_trylock+0x1c0/0x1c0
[  286.201943]  ? find_held_lock+0x35/0x130
[  286.205996]  ? disk_get_part+0x9c/0x140
[  286.209955]  ? lock_downgrade+0x740/0x740
[  286.214142]  ? loop_unregister_transfer+0x90/0x90
[  286.218977]  mutex_lock_nested+0x16/0x20
[  286.223061]  ? mutex_lock_nested+0x16/0x20
[  286.227308]  lo_open+0x1d/0xb0
[  286.230545]  __blkdev_get+0x2c7/0x1120
[  286.234424]  ? __blkdev_put+0x7f0/0x7f0
[  286.238376]  ? bd_acquire+0x178/0x2c0
[  286.242204]  ? find_held_lock+0x35/0x130
[  286.246256]  blkdev_get+0xa8/0x8e0
[  286.249777]  ? bd_may_claim+0xd0/0xd0
[  286.253787]  ? _raw_spin_unlock+0x2d/0x50
[  286.257937]  blkdev_open+0x1d1/0x260
[  286.261681]  ? security_file_open+0x89/0x190
[  286.266086]  do_dentry_open+0x73b/0xeb0
[  286.270270]  ? bd_acquire+0x2c0/0x2c0
[  286.274064]  vfs_open+0x105/0x220
[  286.277510]  path_openat+0x8bd/0x3f70
[  286.281376]  ? trace_hardirqs_on+0x10/0x10
[  286.285617]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  286.290344]  ? find_held_lock+0x35/0x130
[  286.294401]  ? __alloc_fd+0x1d4/0x4a0
[  286.298181]  do_filp_open+0x18e/0x250
[  286.302008]  ? may_open_dev+0xe0/0xe0
[  286.305819]  ? _raw_spin_unlock+0x2d/0x50
[  286.309954]  ? __alloc_fd+0x1d4/0x4a0
[  286.313935]  do_sys_open+0x2c5/0x430
[  286.317644]  ? filp_open+0x70/0x70
[  286.321261]  SyS_open+0x2d/0x40
[  286.324544]  ? do_sys_open+0x430/0x430
[  286.328418]  do_syscall_64+0x1e8/0x640
[  286.332450]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  286.337473]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.342693] RIP: 0033:0x7efc43c76120
[  286.346391] RSP: 002b:00007ffe0d274048 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  286.354137] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efc43c76120
[  286.361423] RDX: 00007ffe0d275f34 RSI: 0000000000000000 RDI: 00007ffe0d275f34
[  286.368675] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  286.375986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002542030
[  286.383274] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  286.390598] INFO: task syz-executor.3:7504 blocked for more than 140 seconds.
[  286.397860]       Not tainted 4.14.148 #0
[  286.402041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  286.410055] syz-executor.3  D28768  7504   7088 0x00000004
[  286.415688] Call Trace:
[  286.418262]  __schedule+0x7b8/0x1cd0
[  286.422004]  ? __mutex_lock+0x737/0x1470
[  286.426060]  ? pci_mmcfg_check_reserved+0x150/0x150
[  286.431131]  schedule+0x92/0x1c0
[  286.434487]  schedule_preempt_disabled+0x13/0x20
[  286.439217]  __mutex_lock+0x73c/0x1470
[  286.443153]  ? loop_control_ioctl+0x153/0x2f0
[  286.447642]  ? mutex_trylock+0x1c0/0x1c0
[  286.451735]  ? trace_hardirqs_on+0x10/0x10
[  286.456014]  ? __radix_tree_lookup+0x1b3/0x2f0
[  286.460647]  mutex_lock_nested+0x16/0x20
[  286.464726]  ? mutex_lock_nested+0x16/0x20
[  286.468948]  loop_control_ioctl+0x153/0x2f0
[  286.473303]  ? loop_add+0x850/0x850
[  286.476927]  ? loop_add+0x850/0x850
[  286.480626]  do_vfs_ioctl+0x7ae/0x1060
[  286.484507]  ? selinux_file_mprotect+0x5d0/0x5d0
[  286.489266]  ? lock_downgrade+0x740/0x740
[  286.493469]  ? ioctl_preallocate+0x1c0/0x1c0
[  286.497871]  ? __fget+0x237/0x370
[  286.501348]  ? security_file_ioctl+0x89/0xb0
[  286.505748]  SyS_ioctl+0x8f/0xc0
[  286.509105]  ? do_vfs_ioctl+0x1060/0x1060
[  286.513290]  do_syscall_64+0x1e8/0x640
[  286.517187]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  286.522068]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.528560] RIP: 0033:0x459a59
[  286.531793] RSP: 002b:00007fd8a9ac3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  286.539495] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59
[  286.546785] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006
[  286.554076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  286.561418] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8a9ac46d4
[  286.568693] R13: 00000000004c31ed R14: 00000000004d6de0 R15: 00000000ffffffff
[  286.576152] INFO: task syz-executor.3:7508 blocked for more than 140 seconds.
[  286.583438]       Not tainted 4.14.148 #0
[  286.587610] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  286.595610] syz-executor.3  D29280  7508   7088 0x00000004
[  286.601260] Call Trace:
[  286.603835]  __schedule+0x7b8/0x1cd0
[  286.607562]  ? __mutex_lock+0x737/0x1470
[  286.611671]  ? pci_mmcfg_check_reserved+0x150/0x150
[  286.616684]  schedule+0x92/0x1c0
[  286.620170]  schedule_preempt_disabled+0x13/0x20
[  286.624919]  __mutex_lock+0x73c/0x1470
[  286.628802]  ? loop_control_ioctl+0x65/0x2f0
[  286.633245]  ? mutex_trylock+0x1c0/0x1c0
[  286.637297]  ? trace_hardirqs_on+0x10/0x10
[  286.641579]  ? __might_fault+0x110/0x1d0
[  286.645632]  mutex_lock_nested+0x16/0x20
[  286.649678]  ? mutex_lock_nested+0x16/0x20
[  286.654034]  loop_control_ioctl+0x65/0x2f0
[  286.658259]  ? loop_add+0x850/0x850
[  286.661907]  ? loop_add+0x850/0x850
[  286.665526]  do_vfs_ioctl+0x7ae/0x1060
[  286.669394]  ? selinux_file_mprotect+0x5d0/0x5d0
[  286.674208]  ? lock_downgrade+0x740/0x740
[  286.678349]  ? ioctl_preallocate+0x1c0/0x1c0
[  286.682780]  ? __fget+0x237/0x370
[  286.686230]  ? security_file_ioctl+0x89/0xb0
[  286.690677]  SyS_ioctl+0x8f/0xc0
[  286.694045]  ? do_vfs_ioctl+0x1060/0x1060
[  286.698175]  do_syscall_64+0x1e8/0x640
[  286.702083]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  286.706920]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.712140] RIP: 0033:0x459a59
[  286.715332] RSP: 002b:00007fd8a9aa2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  286.723088] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59
[  286.730380] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006
[  286.737657] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
[  286.744976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8a9aa36d4
[  286.752272] R13: 00000000004c31c2 R14: 00000000004d6db0 R15: 00000000ffffffff
[  286.759543] INFO: task blkid:7505 blocked for more than 140 seconds.
[  286.766066]       Not tainted 4.14.148 #0
[  286.770245] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  286.778200] blkid           D29040  7505   7050 0x00000004
[  286.783856] Call Trace:
[  286.786441]  __schedule+0x7b8/0x1cd0
[  286.790193]  ? __mutex_lock+0x737/0x1470
[  286.794264]  ? pci_mmcfg_check_reserved+0x150/0x150
[  286.799260]  schedule+0x92/0x1c0
[  286.802670]  schedule_preempt_disabled+0x13/0x20
[  286.807430]  __mutex_lock+0x73c/0x1470
[  286.811344]  ? trace_hardirqs_on+0x10/0x10
[  286.815571]  ? lo_open+0x1d/0xb0
[  286.818918]  ? refcount_inc_not_zero+0x60/0xe0
[  286.823527]  ? mutex_trylock+0x1c0/0x1c0
[  286.827600]  ? find_held_lock+0x35/0x130
[  286.831694]  ? disk_get_part+0x9c/0x140
[  286.835666]  ? lock_downgrade+0x740/0x740
[  286.839801]  ? loop_unregister_transfer+0x90/0x90
[  286.844670]  mutex_lock_nested+0x16/0x20
[  286.848718]  ? mutex_lock_nested+0x16/0x20
[  286.852993]  lo_open+0x1d/0xb0
[  286.856190]  __blkdev_get+0x2c7/0x1120
[  286.860113]  ? __blkdev_put+0x7f0/0x7f0
[  286.864079]  ? bd_acquire+0x178/0x2c0
[  286.867862]  ? find_held_lock+0x35/0x130
[  286.871982]  blkdev_get+0xa8/0x8e0
[  286.875518]  ? bd_may_claim+0xd0/0xd0
[  286.879298]  ? _raw_spin_unlock+0x2d/0x50
[  286.883471]  blkdev_open+0x1d1/0x260
[  286.887176]  ? security_file_open+0x89/0x190
[  286.891629]  do_dentry_open+0x73b/0xeb0
[  286.895622]  ? bd_acquire+0x2c0/0x2c0
[  286.899402]  vfs_open+0x105/0x220
[  286.902884]  path_openat+0x8bd/0x3f70
[  286.906678]  ? trace_hardirqs_on+0x10/0x10
[  286.910966]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  286.915627]  ? find_held_lock+0x35/0x130
[  286.919687]  ? __alloc_fd+0x1d4/0x4a0
[  286.923517]  do_filp_open+0x18e/0x250
[  286.927308]  ? may_open_dev+0xe0/0xe0
[  286.931149]  ? _raw_spin_unlock+0x2d/0x50
[  286.935290]  ? __alloc_fd+0x1d4/0x4a0
[  286.939086]  do_sys_open+0x2c5/0x430
[  286.942840]  ? filp_open+0x70/0x70
[  286.946377]  SyS_open+0x2d/0x40
[  286.949634]  ? do_sys_open+0x430/0x430
[  286.953560]  do_syscall_64+0x1e8/0x640
[  286.957439]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  286.962333]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.967512] RIP: 0033:0x7fee6a203120
[  286.971268] RSP: 002b:00007fff83b5dbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  286.978982] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fee6a203120
[  286.986284] RDX: 00007fff83b5ff34 RSI: 0000000000000000 RDI: 00007fff83b5ff34
[  286.993579] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  287.000965] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000019dd030
[  287.008226] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  287.015540] 
[  287.015540] Showing all locks held in the system:
[  287.021905] 1 lock held by khungtaskd/1011:
[  287.027056]  #0:  (tasklist_lock){.+.+}, at: [<ffffffff814875e8>] debug_show_all_locks+0x7f/0x21f
[  287.036142] 2 locks held by getty/7041:
[  287.040219]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.048908]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.058236] 2 locks held by getty/7042:
[  287.062400]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.071126]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.080468] 2 locks held by getty/7043:
[  287.084426]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.093134]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.102453] 2 locks held by getty/7044:
[  287.106415]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.115147]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.124461] 2 locks held by getty/7045:
[  287.128431]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.137140]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.146467] 2 locks held by getty/7046:
[  287.150481]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.159161]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.168540] 2 locks held by getty/7047:
[  287.172604]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861c3dc3>] ldsem_down_read+0x33/0x40
[  287.181319]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff83111466>] n_tty_read+0x1e6/0x17b0
[  287.190657] 2 locks held by syz-executor.0/7083:
[  287.195395]  #0:  (&lo->lo_ctl_mutex/1){+.+.}, at: [<ffffffff8373c94f>] lo_ioctl+0x8f/0x1ce0
[  287.204021]  #1:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff82cafd0f>] blkdev_reread_part+0x1f/0x40
[  287.213014] 2 locks held by syz-executor.1/7087:
[  287.217753]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.226913]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.235031] 1 lock held by syz-executor.5/7089:
[  287.239682]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.248391] 2 locks held by syz-executor.4/7090:
[  287.253196]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.261914]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.270096] 2 locks held by syz-executor.2/7091:
[  287.274844]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.283581]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.291705] 2 locks held by blkid/7501:
[  287.295658]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.304362]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.312473] 2 locks held by blkid/7502:
[  287.316426]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.325147]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.333264] 2 locks held by syz-executor.3/7504:
[  287.338018]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff8373c4d5>] loop_control_ioctl+0x65/0x2f0
[  287.347255]  #1:  (&lo->lo_ctl_mutex#2){+.+.}, at: [<ffffffff8373c5c3>] loop_control_ioctl+0x153/0x2f0
[  287.356773] 1 lock held by syz-executor.3/7508:
[  287.361481]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff8373c4d5>] loop_control_ioctl+0x65/0x2f0
[  287.370654] 2 locks held by blkid/7505:
[  287.374612]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a8dd5>] __blkdev_get+0x145/0x1120
[  287.383324]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff837360fd>] lo_open+0x1d/0xb0
[  287.391433] 
[  287.393047] =============================================
[  287.393047] 
[  287.400464] NMI backtrace for cpu 1
[  287.404097] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.148 #0
[  287.410652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.419983] Call Trace:
[  287.422554]  dump_stack+0x138/0x197
[  287.426163]  nmi_cpu_backtrace.cold+0x57/0x94
[  287.430652]  ? irq_force_complete_move.cold+0x7d/0x7d
[  287.435830]  nmi_trigger_cpumask_backtrace+0x141/0x189
[  287.441097]  arch_trigger_cpumask_backtrace+0x14/0x20
[  287.446284]  watchdog+0x5e7/0xb90
[  287.449720]  kthread+0x319/0x430
[  287.453061]  ? hungtask_pm_notify+0x50/0x50
[  287.457382]  ? kthread_create_on_node+0xd0/0xd0
[  287.462043]  ret_from_fork+0x24/0x30
[  287.465941] Sending NMI from CPU 1 to CPUs 0:
[  287.470758] NMI backtrace for cpu 0
[  287.470761] CPU: 0 PID: 2257 Comm: kworker/u4:4 Not tainted 4.14.148 #0
[  287.470765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.470767] Workqueue: bat_events batadv_nc_worker
[  287.470771] task: ffff8880a1ec2200 task.stack: ffff8880a1ed0000
[  287.470773] RIP: 0010:lock_acquire+0x30a/0x430
[  287.470775] RSP: 0018:ffff8880a1ed7c90 EFLAGS: 00000083
[  287.470779] RAX: 0000000000000000 RBX: ffff8880a1ec2200 RCX: 0000000000000002
[  287.470782] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880a1ec2a7c
[  287.470784] RBP: ffff8880a1ed7cd8 R08: 0000000000000000 R09: 0000000000000000
[  287.470787] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8778f7a0
[  287.470790] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002
[  287.470793] FS:  0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
[  287.470795] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  287.470798] CR2: 000000000132f000 CR3: 000000009f34e000 CR4: 00000000001406f0
[  287.470801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  287.470804] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  287.470805] Call Trace:
[  287.470807]  batadv_nc_worker+0x107/0x6d0
[  287.470809]  ? batadv_nc_worker+0xd3/0x6d0
[  287.470811]  process_one_work+0x863/0x1600
[  287.470813]  ? pwq_dec_nr_in_flight+0x2e0/0x2e0
[  287.470815]  worker_thread+0x5d9/0x1050
[  287.470817]  kthread+0x319/0x430
[  287.470819]  ? process_one_work+0x1600/0x1600
[  287.470821]  ? kthread_create_on_node+0xd0/0xd0
[  287.470823]  ret_from_fork+0x24/0x30
[  287.470824] Code: 48 85 c0 75 9c 44 8b 5d c0 65 ff 0d 41 9b b9 7e 0f 85 2c fe ff ff e8 ea ef b7 ff e9 22 fe ff ff 44 89 5d c0 65 ff 05 26 9b b9 7e <48> 8b 05 77 90 d9 06 e8 aa db 04 00 44 8b 5d c0 85 c0 74 09 80 
[  287.471479] Kernel panic - not syncing: hung_task: blocked tasks
[  287.648615] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.148 #0
[  287.655171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.664514] Call Trace:
[  287.667090]  dump_stack+0x138/0x197
[  287.670713]  panic+0x1f2/0x426
[  287.673901]  ? add_taint.cold+0x16/0x16
[  287.677870]  ? irq_force_complete_move.cold+0x7d/0x7d
[  287.683105]  watchdog+0x5f8/0xb90
[  287.686595]  kthread+0x319/0x430
[  287.690073]  ? hungtask_pm_notify+0x50/0x50
[  287.694385]  ? kthread_create_on_node+0xd0/0xd0
[  287.699159]  ret_from_fork+0x24/0x30
[  287.704562] Kernel Offset: disabled
[  287.708188] Rebooting in 86400 seconds..