n1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 23:02:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/234, 0xea}], 0x1, &(0x7f0000000640)=""/4096, 0x1000}, 0x0) fchdir(r0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x9}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendfile(r5, r6, 0x0, 0x7fffffa7) [ 2376.529237] audit: type=1800 audit(1576105357.276:624): pid=12228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3155 res=0 [ 2376.559152] audit: type=1804 audit(1576105357.276:625): pid=12228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3650/file0/file0" dev="loop1" ino=3155 res=1 23:02:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000540)=""/232, 0xe8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/28, 0x1c}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000027c0)=[{&(0x7f0000001640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r4, 0x0) shutdown(r1, 0x0) 23:02:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ad14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:37 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000020100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000040)={0x6, 'yam0\x00', {0xfff}, 0x4}) 23:02:37 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b06, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 23:02:37 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="113c906d6b66cbd4c2e63a288ddd010402000270fff8929baacff487777ce916ad0fad2dcad90900000020000000ef9eb7799482dba617bc6d80", 0x3a}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r3, r4, 0x0, 0x7fffffa7) 23:02:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ae14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:37 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000030100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:37 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b06, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') [ 2376.835941] FAT-fs (loop1): bogus logical sector size 36136 [ 2376.865182] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2376.893660] audit: type=1800 audit(1576105357.646:626): pid=12359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16535 res=0 23:02:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676af14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xffffffff, @ipv4={[], [], @loopback}, 0x9f}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x248000, 0x727d3d338005811b) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$P9_RWALK(r2, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b06, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') [ 2376.960254] audit: type=1804 audit(1576105357.676:627): pid=12359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3651/file0/file0" dev="sda1" ino=16535 res=1 23:02:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000001700)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/193, 0xc1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) shutdown(r5, 0x0) shutdown(r2, 0x0) 23:02:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b014ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:38 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b06, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 23:02:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000180)}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$selinux_create(r10, &(0x7f0000000180)=@access={'system_u:object_r:modules_dep_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x56) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x1) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r3}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={r3, @in={{0x2, 0x4e23, @empty}}, 0x258, 0xfffb}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r4, 0x1, 0x8}, 0x8) 23:02:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b06, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x04\x00\x00\x00@\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') [ 2377.708253] FAT-fs (loop1): bogus number of reserved sectors [ 2377.714512] FAT-fs (loop1): Can't find a valid FAT filesystem 23:02:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b114ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:38 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000050100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2377.794165] audit: type=1800 audit(1576105358.546:628): pid=12730 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16583 res=0 23:02:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b06, 0x0) 23:02:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000140)=0x4) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b214ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2378.114206] audit: type=1800 audit(1576105358.866:629): pid=12959 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3156 res=0 [ 2378.157581] audit: type=1804 audit(1576105358.866:630): pid=12959 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3653/file0/file0" dev="loop1" ino=3156 res=1 23:02:39 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b06, 0x0) 23:02:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x3ff800) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000001}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='c', 0x1}], 0x1) 23:02:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000008a2e210400"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c0080eb8600000075701000200002001c0002000500000000000800050062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792ac1f351b2483d67b19c323679afde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000100)={r4, 0x1, 0x7c, 0x81, 0x6, 0x3f, 0x1f}) r5 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote}}, {{@in6}, 0x0, @in6=@loopback, 0x3503}}, 0xe8) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$netrom(0xffffffffffffffff, 0x0, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:39 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000060100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0xd6ce) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b314ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:39 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b06, 0x0) [ 2378.643517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11914 sclass=netlink_route_socket pig=12981 comm=syz-executor.2 [ 2378.656310] audit: type=1800 audit(1576105359.396:631): pid=12978 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3157 res=0 23:02:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b414ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:39 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:39 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x220081, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x300) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) r3 = dup2(r1, r2) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000300)=0x1000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0xa6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x202800, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x100, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 23:02:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@noop, @timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 23:02:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa", 0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x100, 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) 23:02:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r3, 0x40044103, &(0x7f0000000040)=0x4) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000080)) 23:02:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b514ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:39 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000100)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, 0x0) getresuid(&(0x7f0000000780)=0x0, &(0x7f0000000800), &(0x7f0000000840)) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x2028000, &(0x7f0000000880)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}, {@nodevmap='nodevmap'}, {@fscache='fscache'}, {@fscache='fscache'}, {@dfltuid={'dfltuid'}}], [{@uid_gt={'uid>', r5}}, {@obj_user={'obj_user', 0x3d, 'self&#+:vmnet0*\xe1{posix_acl_access'}}, {@dont_measure='dont_measure'}, {@uid_gt={'uid>', r6}}, {@permit_directio='permit_directio'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x55db871bed5c4ae5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r3, 0xae9a) keyctl$read(0xb, 0x0, &(0x7f0000019600)=""/102388, 0x18ff4) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(r7, 0xffffffffffffffff, 0x0, 0x320c) 23:02:39 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000500000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b614ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000080)={0x2, 0x4, 0x40004, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:02:40 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000600000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b714ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000380)='./file0\x00', 0x9df, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xf}], 0x2000000, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b814ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:40 executing program 4: unshare(0x8020000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f00000000c0)='md5sumc)\xec\xe6\x86p\x13\xb2L\"\xcb\x13?\x91\x84\xa4\xbd\xce\'{[em0vbmxnet1:-md5sum:proc\x00', 0xc1, 0x0, 0x0) close(r2) 23:02:40 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000004000000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000100)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, 0x0) getresuid(&(0x7f0000000780)=0x0, &(0x7f0000000800), &(0x7f0000000840)) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x2028000, &(0x7f0000000880)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}, {@nodevmap='nodevmap'}, {@fscache='fscache'}, {@fscache='fscache'}, {@dfltuid={'dfltuid'}}], [{@uid_gt={'uid>', r5}}, {@obj_user={'obj_user', 0x3d, 'self&#+:vmnet0*\xe1{posix_acl_access'}}, {@dont_measure='dont_measure'}, {@uid_gt={'uid>', r6}}, {@permit_directio='permit_directio'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x55db871bed5c4ae5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r3, 0xae9a) keyctl$read(0xb, 0x0, &(0x7f0000019600)=""/102388, 0x18ff4) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(r7, 0xffffffffffffffff, 0x0, 0x320c) 23:02:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0x1e) r2 = socket$inet6(0xa, 0x805, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) r4 = geteuid() getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), 0x0) r6 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r6, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f00000014c0)}}], 0x1, 0x0) r7 = open$dir(&(0x7f0000000a40)='./file0\x00', 0x600003, 0x8) r8 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r8, &(0x7f00000021c0)=[{{&(0x7f0000001600)={0xa, 0x0, 0x0, @rand_addr="810c1e61a16d963e9f9532fc7815dbf8"}, 0x1c, &(0x7f0000001a80)}}], 0x1, 0x0) r9 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r9, &(0x7f00000021c0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, &(0x7f00000014c0)}}, {{&(0x7f0000001600)={0xa, 0x0, 0x0, @rand_addr="810c1e61a16d963e9f9532fc7815dbf8"}, 0x1c, &(0x7f0000001a80)}}], 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000003240)}, {&(0x7f00000001c0)="228504fd50d5e18b011dc55f", 0xc}], 0x2, &(0x7f0000000c40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="00000082b39c81c6969e003000ec000000000100000001000000", @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="84b138848486d0a550a1a8308c6d6f641f17e7d7c78b021471f06897b291b0bb20750aa59ac465d711a3e237f03e54c1d2b2"], 0xd8}, 0x10000) getresuid(0x0, &(0x7f0000000200)=0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe2(&(0x7f0000000400), 0x800) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x400800) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xfffffeb3) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="02000200ee2afbf9bc12092bf41890dae9281c2f521d09ce5ecafdca0ac7277aac8a946059ef05773d74985e0bbb9992f56fa6d19ff6c077", @ANYBLOB="0200", @ANYRES32, @ANYRES32=r10, @ANYRES32=r14, @ANYBLOB, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="040002000000", @ANYRES32, @ANYBLOB="ac408bb38524fbdc2ae2cff3c3cdd6b4200b67f6d97cd88bcc3c0549aaf44300e10424d35a9324754a5557926c99320fe070b57f6f4ed871bd25bf02dbc5f35d1c6d634cabf1b3fc5172ee3033c243ccb377d9b0813e61ade4716cd3b0144e7e766f1af714deffb23ce77c2c2421627d6ca998598ad983abc74ac01827e5a1b145c896401393ea14af00aec49cb2b6886d470ae1741667fe28ed9db5f12e55a97ba43036e816c3a3464a1d204c171b8a9cb751eae3cf4cc45ed3ec96b523d7c288d2266a9f45d4baee92d595905fae442892be4668c997ba3a50861e6bb7620d0da8a904690000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32=r15, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x14, 0x0) getresuid(0x0, &(0x7f0000000200)=0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r19 = fcntl$dupfd(r17, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r19, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0x3e1) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000001700)=ANY=[@ANYBLOB="02000200ee2afbf9bc12092bf41890dae9281c2f521d09ce5ecafdca0ac7277aac8a946059ef05773d74985e0bbb9992f56fa6d19ff6c077", @ANYBLOB="0200", @ANYRES32, @ANYRES32=r16, @ANYRES32=r20, @ANYBLOB="41c32a7785b91f4e3e89492cf8dbf3c1e1eb1ec4a98ccfaf26e589823f38cf719cafca06ddf27fc4e93d4eb16c52e5ab18dfe42d72460549d6146d2bcb1e0d311bb47c67cb15b10539f297b2d5331fa1e8fc580f8b7967d0cd18bf2a5ba731bbb6b3badbc224e3e65955b87a3fc36533b2391913b66fee0877ac0b9b5cd6f98ffce34cf98f", @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="040002000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRESOCT=r21, @ANYRESDEC=r2, @ANYRES32, @ANYRES32=r22, @ANYBLOB="0cfffbbc9824a419284960c894602d328e81840400000000000000cdf7c7727f61d158cad58895538e2d68a707529cc275747f931d4a0652e40ddcb5a788d0eb1c30d57a0f8b30915abd37cac011bd56865da76267525d834acd023e30309e8e648574c595336477a72c5a1d999891fe04009747364fee6f0f04373500007209b27730e2eee2e2f46ab74fd5ada1fdac6ea9543c08aa5746cd6cfaa5159ad900b8c3abd4e48a728c7725fca729488218849149d9f8993b82b9f29285fd86", @ANYRES32, @ANYBLOB="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"], 0x14, 0x0) getresuid(0x0, &(0x7f0000000200), 0x0) r23 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r23, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xfffffffffffffcc9) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[], 0x0, 0x5) r24 = socket$inet6(0xa, 0x805, 0x0) r25 = socket$inet6(0xa, 0x805, 0x0) r26 = geteuid() getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), 0x0) r28 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r28, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f00000014c0)}}], 0x1, 0x0) r29 = open$dir(&(0x7f0000000a40)='./file0\x00', 0x600003, 0x8) r30 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r30, &(0x7f00000021c0)=[{{&(0x7f0000001600)={0xa, 0x0, 0x0, @rand_addr="810c1e61a16d963e9f9532fc7815dbf8"}, 0x1c, &(0x7f0000001a80)}}], 0x1, 0x0) r31 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r31, &(0x7f00000021c0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, &(0x7f00000014c0)}}, {{&(0x7f0000001600)={0xa, 0x0, 0x0, @rand_addr="810c1e61a16d963e9f9532fc7815dbf8"}, 0x1c, &(0x7f0000001a80)}}], 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000003240)}, {&(0x7f00000001c0)="228504fd50d5e18b011dc55f", 0xc}], 0x2, &(0x7f0000000b00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [r24, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r25]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r26, r27}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r28, 0xffffffffffffffff, r29, r30, 0xffffffffffffffff, 0xffffffffffffffff, r31]}}, @cred={{0x1c}}], 0xd8}, 0x10000) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) getgroups(0x8, &(0x7f0000000380)=[r5, 0xee01, r32, 0x0, r22, r27, 0xffffffffffffffff, 0xee00]) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r1, r33}, 0xc) r34 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r34, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676b914ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x80, r3, 0x31, 0x70bd26, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x69014c2246afcb17}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3a}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7ff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}]}, 0x80}}, 0x10000840) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000402}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8040) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="e6cc39d64e5b987596da1475c4f0fc2213fca074e4", 0x15}], 0x1}}], 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000180)={0x6}) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10}) close(r7) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x25, &(0x7f0000000040)=0x83, 0x4) bind$packet(r11, &(0x7f0000000080)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r11, 0x107, 0xf, &(0x7f00000000c0)=0x5, 0x4) splice(r5, 0x0, r7, 0x0, 0x10003, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:02:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ba14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:40 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000000fe80001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchmod(r0, 0x0) 23:02:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/80, 0x50}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 23:02:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x50) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_setscheduler(r2, 0x5, &(0x7f00000000c0)=0x2ad0) 23:02:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676bb14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:41 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x6, 0x0, &(0x7f000000b000)={0x77359400}, 0x0, 0x0) 23:02:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676bc14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/80, 0x50}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 23:02:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x100) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$CAIFSO_LINK_SELECT(r7, 0x116, 0x7f, &(0x7f0000000080)=0xffff8001, 0x4) 23:02:41 executing program 3: unshare(0x2000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/cgroup\x00') setns(r2, 0x0) 23:02:41 executing program 2: r0 = open(&(0x7f0000000040)='./bus/file0\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:41 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676bd14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0xffffffff, 0x4) syz_emit_ethernet(0x66, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\b\x00', 0x30, 0xffffff3a, 0x0, @remote, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\"\x00', 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 23:02:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/80, 0x50}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 23:02:41 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480)='gfs2\x00', &(0x7f00000004c0)='./bus\x00', 0x4, 0x1, &(0x7f0000000540)=[{&(0x7f0000000500)="2d9a9a050d0923f8ecaf360c9e", 0xd, 0x3}], 0x30010, &(0x7f0000000580)={[{@nobarrier='nobarrier'}, {@barrier='barrier'}, {@suiddir='suiddir'}, {@data_writeback='data=writeback'}, {@noloccookie='noloccookie'}], [{@context={'context', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}eth0'}}, {@hash='hash'}, {@context={'context', 0x3d, 'root'}}]}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[], 0x597) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000440)={0x4, &(0x7f0000000040)=""/208, &(0x7f00000003c0)=[{0xa67a, 0x87, 0xffffffff, &(0x7f0000000140)=""/135}, {0x0, 0x8e, 0x3f, &(0x7f0000000200)=""/142}, {0x9, 0xb7, 0x2, &(0x7f00000002c0)=""/183}, {0x94, 0xf, 0x7, &(0x7f0000000380)=""/15}]}) 23:02:41 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000500000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) fchdir(r0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa", 0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x8000, 0x0) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="2d637075205c637075202b696f2052f56384e0f385c6a1840ae968348c1c31ae398fac7efc86c204884f66618386209bcbdb20666745cb4fce2be0ae95fa04ff8722eb1a35cd83e13ddb9e09cf44ce89ce8ed04d36b3248c7168fc65e5e707c7f54f4f53bfb4c24c607a9e5adeb8607d2ed5b64136f8f01983c45733617ad20641ba8e56411812b28854071a77da60"], 0xe) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x4, 0x4}, &(0x7f0000000140)=0x8) r8 = dup2(r0, r6) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x41a136a2a50a1083, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) setsockopt$RXRPC_SECURITY_KEY(r8, 0x110, 0x1, &(0x7f00000001c0)='\x00', 0x1) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$KVM_GET_PIT2(r9, 0x8070ae9f, &(0x7f0000000640)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={r7, @in6={{0xa, 0x4e24, 0x401, @remote, 0x100}}, 0xfa, 0x20, 0x8, 0x1, 0x30}, 0x98) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x7fffffa7) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r12, 0x401870c8, &(0x7f0000000180)={0x0, 0xfffffffffffffbff, 0x1}) r13 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r13, 0x84, 0x15, &(0x7f00000005c0), 0x1) 23:02:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676be14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x1c}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cc], 0x100000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:02:41 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000600000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676bf14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2381.364974] kvm [14027]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f 23:02:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000240)=0x3, 0x4) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) write(r3, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r3, r4, 0x0, 0x7fffffa7) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BINDER_SET_MAX_THREADS(r9, 0x40046205, &(0x7f0000000080)=0xfffffffe) r10 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f00000001c0)=0x80, 0x80400) getsockopt$inet6_buf(r10, 0x29, 0xca, &(0x7f0000000240), &(0x7f0000000280)) 23:02:42 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0xbc4, 0x2, [], &(0x7f0000000080)=0x1}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000140)=ANY=[], 0x30a) socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x600000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000300)={0x3, 0x1, [0x0, 0x8a5, 0x4, 0x32992d9a, 0x8, 0x6f, 0x7, 0x8000]}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000040), 0xfdef}]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_submit(r4, 0x2, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x712, 0xffffffffffffffff, &(0x7f0000000100)="39d3b3082c26d82cb78c3462123f420856a7834a6ebc25f6181014f18163f0d052e1bd78f18615d82c57879dc60b5a01b06977149b93a98b8154ded6795e3fecba20", 0x42, 0x280000000000000, 0x0, 0x1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x7ff, r0, &(0x7f00000001c0)="a3ac0862ef878e6f15921234da48cecb6bfbd71d655e6fb74c6f2dc6df8eb5dff99185337bdfce11f60651341045e550d0a5c4cfc69f65777632267e5545db073201084285174838285b954ee1b82750dba35782a65b3f5c1be0539b1e7f28", 0x5f, 0x8, 0x0, 0x2, r7}]) 23:02:42 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000003000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2381.411345] kvm [14027]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f [ 2381.445864] kvm [14027]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f 23:02:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c014ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:42 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000080)={0x9, 0x4, 0x4000000004, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) ptrace(0x10, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x400020000000010, 0x2, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) 23:02:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2381.672286] kauditd_printk_skb: 2 callbacks suppressed [ 2381.672301] audit: type=1800 audit(1576105362.416:634): pid=14197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3159 res=0 23:02:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000140)=0xa309) fchdir(r0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) bind$nfc_llcp(r2, &(0x7f00000003c0)={0x27, 0x0, 0x2, 0x4, 0x4, 0x2, "6d8cb6dabd5002e47b12f2dcf34fd753c2f7615b984fd9b40ddaed8af4b39f87f52096c3a4444e03d55d95c6937a340c14173f825668f4376d5a26cb0c084a", 0x17}, 0x60) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x24, &(0x7f0000000180)=""/36}, {0x10000, 0x42, &(0x7f0000000240)=""/66}]}) sendfile(r2, r3, 0x0, 0x7fffffa7) 23:02:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c114ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2381.815289] audit: type=1804 audit(1576105362.436:635): pid=14197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3660/file0/file0" dev="loop1" ino=3159 res=1 23:02:42 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000df1d100001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2403, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) 23:02:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x5, 0xffff78c4, 0x83c, 0x40, 0xe79c, 0x0, 0x4, 0x8}}) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x6, 0x10001}, {0xe2, 0x6}]}, 0x14, 0x1) open(&(0x7f0000000000)='./bus\x00', 0xc1243, 0x199) [ 2382.031182] audit: type=1800 audit(1576105362.776:636): pid=14322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3160 res=0 23:02:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c214ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2382.148699] audit: type=1804 audit(1576105362.806:637): pid=14322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3661/file0/file0" dev="loop1" ino=3160 res=1 23:02:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) dup3(r1, r0, 0x0) 23:02:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x79, &(0x7f0000000a00)='!\x8dK\x8d\xc2\xa1\xa9\r\xa9Y\xef\x15\xca\xbbl\xb4\xe7\x84\xc6\x87\xd1a\x8cGk\xf6u,\x87\x1fP\x9e\x00\xff\xff\xffC\xdeG\xe63\xc3\xefA\xac#n/\xa2l\xe22;\xbe\x95%\xcb\xdeP\x80\x85\xab\xe0j\x16\x99\xda\x91\xa5\xee5\x06f>7\x8c\x14\xff\xfe-\x1c\xc5N\x82\xe9\xccY\x95\xc2\x92\xf9Z\xffu\xa5\x18\x01\x16\xbbp0\x81\x04\x1b\xd1\x8e\"z(T\xffLw\xe0\xaf\x06\xe1Q\x9e\xc2k\x1c\xcd\xad\xa1\xd0\x83\xbb\xd0\x99\xb5\xad\xf4b)0T\xba%\xc7\'\x11eaV\x8a\xe1V\x00\xf7j'}, 0x28e) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) waitid(0x1, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12040) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc0000040) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0x10, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x1eed81a1ace33f6a) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) 23:02:43 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000001fffffff01000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c314ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:43 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x9}}, {@common=@cache_mmap='cache=mmap'}, {@sq={'sq', 0x3d, 0x5}}, {@common=@version_L='version=9p2000.L'}], [{@euid_gt={'euid>', r0}}]}}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r7, 0x0) readahead(r7, 0x7, 0x8000) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r10}}, 0x18) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) socket$isdn(0x22, 0x3, 0x3) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000080)=0x400, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) r12 = dup(r11) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80044d10, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) dup3(r1, r0, 0x0) 23:02:43 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000102000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c414ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) dup3(r1, r0, 0x0) [ 2382.636253] audit: type=1800 audit(1576105363.386:638): pid=14485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3161 res=0 23:02:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c514ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:43 executing program 4: socket$packet(0x11, 0x0, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) mkdir(0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc0000040) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) [ 2382.769837] audit: type=1804 audit(1576105363.406:639): pid=14485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3662/file0/file0" dev="loop1" ino=3161 res=1 23:02:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "1963cd79bc0901a7", "2fdde001131baab6dec769bf5ad867f1", "cb1c1c83", "0a6533299f38754d"}, 0x28) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='\x93f_t\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000240)={{0x2, 0x0, @descriptor="d24c766db99f932a"}, 0x78, [], "d51666ecc1b5a0d17ac0b0381ada11efa06adb576291fbc29a7350e5beed68f081f62f44ecfc097624b05d0dc23da287848763c4776f32bcacfcd0b732444b759bb032b8fe5a55f18b98a835b5f93f7c0ba25bde49c79a0258db15b9c1a13093fec74aac00b153ebc65e154ee810cb1b60277937ef9400b3"}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r9, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r5, 0x7, r4, &(0x7f0000000080)={r8, r9, 0x5}) sendfile(r1, r2, 0x0, 0x7fffffa7) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$DRM_IOCTL_WAIT_VBLANK(r12, 0xc018643a, &(0x7f0000000140)={0x1, 0xc52, 0x8}) 23:02:43 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000103000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c614ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2383.045282] audit: type=1800 audit(1576105363.796:640): pid=14593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16538 res=0 23:02:43 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000104000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/117) 23:02:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000140)={r8}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000080)={r8, 0x1c, "51b2bf14e54e38a7ad2633e0b7a66fa3d34611f00e05e6005ff7ae31"}, &(0x7f0000000140)=0x24) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) write$binfmt_elf32(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xfc, 0xf9, 0x1, 0x100000001, 0x2, 0x3, 0x8001, 0x5, 0x38, 0x3d9, 0x0, 0x4, 0x20, 0x1, 0x3b5, 0x1, 0x800}, [{0x6474e553, 0xffffccc9, 0xfffffff8, 0xb3, 0x1f, 0x3f, 0x392, 0x4}, {0x7474e554, 0x8, 0x101, 0xc9b, 0x4, 0x958, 0x0, 0x4}], "f2924716027a67b317d534a5721efa06cb61033061d3fd84aae0a542fc4f", [[], [], [], [], [], [], [], []]}, 0x896) [ 2383.165254] audit: type=1804 audit(1576105363.826:641): pid=14593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3663/file0/file0" dev="sda1" ino=16538 res=1 23:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c714ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x4a0803) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) [ 2383.370655] audit: type=1800 audit(1576105364.086:642): pid=14713 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3162 res=0 23:02:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c814ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000105000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/117) [ 2383.482425] audit: type=1804 audit(1576105364.096:643): pid=14713 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3664/file0/file0" dev="loop1" ino=3162 res=1 23:02:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000106000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676c914ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0xa821c0, 0x80) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 23:02:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x1, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000340)=""/117) 23:02:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)={0x0}) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffa000/0x4000)=nil) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000000c0)={r1, 0xffff, 0x6}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e20, 0x1, @loopback, 0x80}, {0xa, 0x4e20, 0x7, @local, 0x7}, 0x2ac7, [0x10000, 0x8, 0x6, 0x2, 0x9, 0x71, 0x2, 0xa4]}, 0x5c) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ca14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000011c010001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:44 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='cpu.stat\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 23:02:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676cb14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), 0x69357d129cdfb524) 23:02:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x8100, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000040)={0x0, 0x2710}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676cc14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x4}, 0x28, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000240)={0x9, 0xa1, &(0x7f0000000140)="906b9b49e11c1f0c7a25e6606b467f5e55baca20e29aaab2b5f22c9b7ea01d205d631cc66ede3f54380b01dbb70a5ba264fc867ceb57d21c430181673e2fefe05be6c4e81db365d9f96428a1fd74d3e09b3eb21cb619a6552dfff007ac186799da63e8ebdb0b2668c83fc3c6e15011904889ae476f0393cf8f335e8b0271fbdff2840d0835701248553da4b95d42ac7c54df4b6a158ac6a8a739e75754a0683d86"}) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r3, 0x0, 0x7fffffa7) 23:02:45 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100030001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:45 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000180040001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676cd14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20000, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000140)=0x2) setreuid(0x0, r3) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='sec\a\x00\x00\x00\x00\x00\x00\x00pability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x8, 0x8000}, {0xff, 0x4}], r3}, 0x18, 0x2) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x69357d129cdfb524) 23:02:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:45 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100050001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) chdir(&(0x7f0000000080)='./file0\x00') r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ce14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) readlinkat(r0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=""/4096, 0x1000) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0xea) 23:02:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "c71b207080df5a36eb53fb470b1ed154e896eee6"}, 0x15, 0x3) 23:02:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676cf14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:45 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d014ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001011c0001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) 23:02:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYBLOB="047086655f48fb763e02574c02a6c54059589331bdcd35cc8379c531c4da380b0dc279969678e74d4ed8b754dff81dd532da05c1182df4c0a63be5f31c808be1a1d7c57bd49c3dce622ccec0aadd99a0f01c4e963342f114c7513bc86875de2ba64877d735027b80971f8d0c97222539e6a9a50136cfcf704706b372add397681118a5591ffc3562b62d315fbad45c1f3aecaf3efad3c7f839c342f5700b704e4686bee6dc69072f1e2d149108161d9605a2ffc4955ae56d2e5da86cf4f5c9004b87", @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESOCT=r2], 0x109) 23:02:46 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) pkey_alloc(0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x7b6, 0x1000, 0x81, 0x81, 0xa, 0x8, 0x3, 0x28, 0x1, 0x3, 0x80000000, 0x3f}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d114ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000104800001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d214ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, 0x0) 23:02:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001fdef0001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x49617e0d60a710a7, 0x8) mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x4) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d314ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x8000) 23:02:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) 23:02:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d414ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) sendmmsg$inet6(r0, &(0x7f000000a840)=[{{&(0x7f0000002840)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c, &(0x7f0000002a80)=[{&(0x7f0000002880)='*', 0x1}], 0x1}}, {{&(0x7f0000002c80)={0xa, 0x0, 0x0, @loopback={0xfe80000000000000}}, 0x1c, &(0x7f0000005000)=[{&(0x7f0000002cc0)="ea", 0x1}], 0x3b7}}], 0x2, 0x20000040) 23:02:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001effd0001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) 23:02:46 executing program 2: syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x9, &(0x7f0000001500)=[{&(0x7f00000000c0), 0x0, 0xc8a}, {&(0x7f0000000100)="0634c12c5d9413a3569b4945bab8821f387bbf9ef77e113b40d19b9613", 0x1d, 0x8}, {&(0x7f0000000140)="9e1480de006590d35c79e785cd5cb71ad3926057ee82461da0b2d3aaa2212027dd65821ea79498a351c71b88e422fb5fb271256b402103eb7cb3d8305b3cc5a8b8df387382ad4c291949e4ef2fc83f881b091057117c5cb8362aff9ae285c3c0196a322655e82efbb93ec6d6fbd5533c4031df59c54683becf", 0x79, 0xde7}, {&(0x7f00000001c0)="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", 0x1000, 0x8}, {&(0x7f00000011c0)="0c86f7ff271006c1ba23ef65ae33ee0d99d7dbfc96df0fc70f7edf73eeccea112c1b20cfb796efa612c0b428ab5298b14d8a585bd4dccda238792f07b69f3b8317d56d9109e7b1452ff63a09a70c0025eb24e2d0894ea91945380fbc63f750cf3b977833366fe94efd6e6604062a0233cc196261f1505e1fa3d310f24cf2e822d8533424c7df8dedd6650d692673df7302c96a1b2c3b66100f7317dd986a440bdce97952be96f53f746b444432f254f5fe41b7347a13695ab8a1324303989760017f59af7fe7ecdbf0ae478dd8111cd157180e13f7313a5e1e5cc020238c0e", 0xdf, 0x1a53}, {&(0x7f00000012c0)="6264163f10669d07e7ab474e4c876ef7a323460d9a8254d6eaba4ab77f00bf3059f6e1a1b0622075d6ab173afc595b", 0x2f, 0x2}, {&(0x7f0000001300)="e90fa0018fb3a53d88d928e8e5331ac3a03dd0bd1163dc4305406db50839c49eff9235ff0e48f71f5673ab8af6b2fe33b4bf808d182b7100082681ed32d5e54b7a", 0x41, 0x80000001}, {&(0x7f0000001380)="d59b8cf3d0c048fa45011031e624f6d28a535bc0c9536240342fe342bf35c2893192de05e810fdb042c072db3c0cbf3caa3db061db958cc5953486402c29cfbcab2e81bfb64c6589be97b3f7e5cf0ed5163e27b193160e83b3efda05b1c544b39ef3b8fa5e5e135abb0d9290fe4a135bb72068f8de6216e95fea6a87775fa8", 0x7f, 0x7f}, {&(0x7f0000001400)="1eea30af15f67fe5057666eb2b64135ee8135724c1c36ae2c0a42dc963bb550f857d421c58b9eed7ac0b80d0afae270aba95b19cdbb2a5d642fcc649165e3e0d63773d94819f7c37fd3b36f9de20491cbbf543b1ab09e807af089b98ab6787ae3d6f2cc7ef16f0529a6e7d26920bbaabbea89d1fed2c23f78c302120e27f23565f061d8afe75bba1f3c3677605fddb69cafd9800d8f8e5abfb36a5f37116debb9b080bb0e5f8aff291e7311a88ffe66b424ca824206b03fa45514ab087c6ba6e961f822f597162de790f26d18ef2e4debcf4069d45e23e74d91d682ae45f3071", 0xe0, 0x5}], 0x800000, &(0x7f0000001600)='\x00') write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001640)={0x0, 0x0, 0x4, 0x0, [], [{0x8, 0x7, 0x40, 0x9, 0xffffffffffffffc1, 0x3}, {0x1, 0x1, 0x3, 0xffff, 0x9, 0x10000}], [[], [], [], []]}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 23:02:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d514ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:47 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, 0xffffffffffffffff) 23:02:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x400040, 0x0) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r5}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r5, 0x1, 0x800, 0x20, 0x9, 0x2}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r6, 0x7fff, 0x5, 0x3}, 0x10) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:47 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000002000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) [ 2386.311376] CIFS VFS: Malformed UNC in devname. 23:02:47 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x0, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfffffffffffffd7d) setsockopt$inet_mreqn(r2, 0x0, 0x20, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)="e85dfd8ebfe01c1ae31871a5d4dcb27da1f0c160cb2f528c2847f8cefb2e89072ddacf01509b81769134e9ebaa93c84ada92db3007f21b924f53d7301c9bb70412b926c235bf57bed02674416a3fe057b983a5fd40482d1632ea580036dc02d68fff37943e058542e0cbc6c135de6119714acecb93ba74557790ab0d794cf0d3128cd9eeda85cf54d89fedec5cd0debcfb96358abfe48f8834dd753f0515e20028f581504159c00901e91b172c5f2655e31256eba59ed1272e5e1a91b7afa7a310d9b48e6105a76f09ee0e2a39e6f55041e7329b69a4de", 0xd7}, {&(0x7f0000000380)="73ece0c704fa29daf3a4e64c1d2aa2e3019a3b7caec5b289e30ae68261d56319d134d45245b17615f23d", 0x2a}, {&(0x7f00000002c0)}, {&(0x7f0000000580)="3d8e615718e58f42297933791d6b6909bfaa156441e0bed9cdbef54dd6915768efd9781c3cfdaf028c03eb7082ca0470ff276e7947449dc2fc8250dac20fd162732e9ac2811fa402c860fae530a4c301a0d8f7f92663ba6d8e9982596bd58cfeb7d5a95d0b6bfeba69d650d61920f93ab51cd5b03712a962fb67c17bb1fa10efb430e35f6bd5dda7f8aa57", 0x8b}, {&(0x7f0000000640)="398b6d928ae666e8be1ad0c39fed55b3a429b1eda3d01c54a26f95733bbd0793b133b42f655fe3c80b1ef17c49ca3aa2426def9394850cfd9844c137a34199e0b1fad799fe5d6eac59e74462548dcb0757bfd8ecd1ceadc5a8b674166e7f0eaabea38eff2f54b6c0fce154277528ed0df914b628cc1fbec6f1ac037673238ce23887358146473c325a3c", 0x8a}], 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r1, @ANYBLOB="ac14140fac141403000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="ac141421ac1414bb0000000014000000000000000000000002000000db0a00000000000011000000000000000000000001000000090000000000000038000000000000000000"], 0x7e}, 0x40404) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000440)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$smack_current(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="d2a564a592b0f0dc7158f04d589f351779708735afffffff7f5c27df9d502e4b9f731326d12612ac30e6267a130eab"], 0x1) pipe2(0x0, 0x0) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r6, 0x0, r8, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r7, 0x407, 0x8000000) write$eventfd(r7, &(0x7f0000000040), 0x8) 23:02:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d614ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:47 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000003000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:47 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./bus\x00', 0x0, 0x10}, 0xfffffffffffffdf0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:etc_t:s0\x00', 0x1b, 0x3) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x24) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d714ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d814ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000080)) 23:02:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x80) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:47 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000005000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2387.184954] kauditd_printk_skb: 12 callbacks suppressed [ 2387.184969] audit: type=1800 audit(1576105367.936:656): pid=16620 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3171 res=0 [ 2387.235854] audit: type=1804 audit(1576105367.976:657): pid=16620 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3671/file0/file0" dev="loop1" ino=3171 res=1 23:02:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x4a38d1a461902af9, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000040)={'bridge_slave_1\x00', @ifru_addrs=@ethernet={0x0, @local}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="cee07d54289c557f6dc96ce2b6ba45f7e7433124e0b90ba002f387cd9f0e2274da3637d1fc94845a453eb0e0f70708a6beedc85ba34a64df1f46fd22d3c27152f1f5799991ca07ad73d90873f55850bff3236fad7905c9eb7aea41ab0dc6755f4915e0fcd75f8ea040725846caf11f941c583cc32f0f25c47cbe616582d393c19f7ea2198e7703b1155d02113af924274e3f5ff09cfe4f718f7e46a1dacd94b5abefac17fe793e024f0a", 0xaa, 0xfffffffffffffff8) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$perf(&(0x7f000014f000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x1) 23:02:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676d914ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, 0xffffffffffffffff, 0x0) 23:02:48 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000006000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x880803, 0x1) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x7fffffa7) 23:02:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 23:02:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, 0xffffffffffffffff, 0x0) 23:02:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676da14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x2284, &(0x7f0000000100)=0x3) 23:02:48 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001ffffff1f000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, 0xffffffffffffffff, 0x0) 23:02:48 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$SEG6(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001280), 0x0, 0x40}, {0x0, 0x0, &(0x7f0000002340), 0x0, 0x0, 0x0, 0x4000000}], 0x2, 0x0) r3 = getpid() get_robust_list(r3, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f00000001c0)={&(0x7f0000000140)}}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:02:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r5, 0xc0045006, &(0x7f0000000100)=0x80000001) chown(&(0x7f0000000040)='./bus\x00', r2, 0xee01) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676db14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:48 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000040000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000140)={0x20, 0x80000001, 0x9, 0x2c3, 0x0, 0x7, 0x0, 0x4, 0xfff, 0x2, 0x1, 0x6}) 23:02:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676dc14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 23:02:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$tipc(r3, &(0x7f0000000280)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e21}}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)="09a4ea1462e0c72f430f57ca516c1f91d6b98dd2c40e523dec3ff2458e4653efe6e1aba3c21b29256f87253cf8b859fbea8da4f43409d0c73ab07a076573278b47a17640052279836b8d44526175f3194494eb5178f8e01c6b9db3510bc3e9285d694495d851fb7a4126d54f45e754a3cf193ecd94679743872f5fd19d8bf5414d3af3920ae766c6db0d7bf52cd8768f7242a67b47968602975b8c2565758ebe8fa32de50d0121c44d0ee518d6472d855568855652214f31b881ee67577098379a4e3d9890677bb1aa5a5b00529cae9cdbc8474c9625bc6d1ee6dc40f63ed52e402aff09ce9f76af8f", 0xe9}], 0x1, &(0x7f0000000200)="a1f7e791d9da502a2f22810f60d96051d2d1e79746644d6f444ac34a14d16f746cfd6cfd759878a522ac825894d237f5135753cf1ac00f88e3e96847e3311f1d6f3f5ae826b08370da69c252ba1d7f65eab3b75cc22620d7d90c274f186c909f8152ae2180bfd1355650", 0x6a}, 0x20000006) syz_open_dev$radio(&(0x7f0000000040), 0x2, 0x2) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676dd14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:49 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100101ddf000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2388.302370] audit: type=1800 audit(1576105369.046:658): pid=17089 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3172 res=0 23:02:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x3, 0x40, 0x7, 0x6, 0x0, 0x1000, 0x80, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a0abe5, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x25111, 0x7, 0x3f, 0x1, 0x1, 0x3ff, 0xfff9}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f0000000100)=0x9) 23:02:49 executing program 4: 23:02:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676de14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2388.406308] audit: type=1804 audit(1576105369.056:659): pid=17089 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3673/file0/file0" dev="loop1" ino=3172 res=1 23:02:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x180008, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0xc) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:49 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100e80f00000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:49 executing program 4: 23:02:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676df14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:49 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100020001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:49 executing program 4: [ 2388.796590] audit: type=1800 audit(1576105369.546:660): pid=17298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16541 res=0 23:02:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r1, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xa03e78cfc775a22f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xddb5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf0000000}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x40000) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e014ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2388.888839] audit: type=1804 audit(1576105369.576:661): pid=17298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3674/file0/file0" dev="sda1" ino=16541 res=1 23:02:49 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100030001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:49 executing program 4: 23:02:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x800000000000}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x140c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x7fffffa7) 23:02:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e114ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:49 executing program 4: [ 2389.260437] FAT-fs (loop1): bogus number of reserved sectors 23:02:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e214ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:50 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100040001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:50 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000200), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000440)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) pipe2(0x0, 0x80000) write$smack_current(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="d2a564a592b0f0dc7158f04d589f351779708735afffffff7f5c27df9d502e4b9f731326d12612ac30e6267a130eab"], 0x1) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r2, 0x0, r4, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r3, 0x407, 0x8000000) write$eventfd(r3, &(0x7f0000000040), 0x8) [ 2389.340586] FAT-fs (loop1): Can't find a valid FAT filesystem 23:02:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000040)=0x29c42276) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r10, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='9p\x00', 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d66642c7f66646e6f3d", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES32=r8, @ANYPTR, @ANYRESDEC=r10, @ANYRESDEC]], @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=', @ANYRESDEC=r9, @ANYBLOB=',version=9p2000,fsmagic=0x0000000000000004,smackfstransmute=/dev/sg#\x00,smackfsfloor=:vboxnet1,appraise,permit_directio,smackfsroot=,\x00']) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e314ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1, 0x2, 0x7, 0x3, 0x80000001}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:50 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100050001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e414ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) fsync(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x800) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000001040)={0x7, 0x47, 0x1}, 0x7) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000040)=""/4096) [ 2389.836853] audit: type=1800 audit(1576105370.586:662): pid=17786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3173 res=0 23:02:50 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2389.936091] audit: type=1804 audit(1576105370.586:663): pid=17786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3676/file0/file0" dev="loop1" ino=3173 res=1 23:02:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e514ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:51 executing program 4: 23:02:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) sendmmsg$sock(r3, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="efc20948ae782a59a069898bde87d6abc51a783045d41e446386129a709cc48dcbd72598beeb52bc", 0x28}, {&(0x7f0000000140)="40d51e8f8f84ba567e87021bdd542dd361c8c030205f13aac03c2c2919b89f91995c72da4836e8d9011546ebe3ff2609098f0826e1269b669d136ea5535fbf935a995d3709de249b73886a5598ea56692801f78e7c8514a9a4a61d3cb397234173d829247a221b7df59f705ca6a065b98860727d9cb33e9303172195158ee9471b719e89ee674f4584e53c387b50fd6a1fef688d218de4fe4c385430", 0x9c}, {&(0x7f0000000240)="ebba67d3bb93cbc0cecfd1863189ed97450606322bd006e7de4d1b08ada60136b9ecbb6412302973a3ddeb123d34977368eafaf85a7e2e264ddc2343d4684c9d023ee75c155e458e08466ea9796dc2aaf9351955e2243c5ad2cbc8da76b723b7dbf1846f71c20167ca96042da4154f8cba308c87ca416f1c9298bc4e19d5e0bdc1b024c1f73d74a5c475d794b9f2a7e944888acb0bc2dedf", 0x140}, {&(0x7f0000000300)="4197f8", 0x3}, {&(0x7f00000003c0)="81aeab865311db5f992758212c261c7656b284a78714d8d46085c3c58f40d83216eeb1925d19701f775a4e9720474ccd6848163722b6dc7fa738253230b52a67fcc92a599e0f149a3efa1e145a944d490dd0e75d34c57b43fb6810258596c4340508f8c01df413e1bad5ff803f655b303706ca7fc65bd6cccd74ebe0d1fb82e3b3f9a69822143df47cc6bf46882c1b2c66f3d49bb9e012d91814218782b93af4278a4bca3c2dc269fff49ba1bfae70adfd9717c9f059ea00bee2fe969b77d933", 0xc0}, {&(0x7f0000000340)="84882b044955115dd453a8bb3ccab08d7c182a1e00c6ebfbc972bf9b9dd96a91bfb5d2afb2ddf902902cb770ce9f", 0x2e}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000480)="8322a60b7955cf12f8890ba70e3457", 0xf}], 0x8, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xedda}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x78}}, {{&(0x7f0000001640)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f0000003740)=[{&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="e800de", 0x3}, {&(0x7f0000003700)="389dab2766ec674efbb784456235", 0xe}], 0x4}}], 0x2, 0x68000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:51 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001001c0101000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e614ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:51 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) [ 2390.431402] audit: type=1800 audit(1576105371.176:664): pid=18035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3174 res=0 23:02:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000140)={0x3, 0x100, 0x4, {0xfffffffb, 0x9, 0xfc, 0x8f54}}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x78) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e714ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2390.507113] audit: type=1804 audit(1576105371.186:665): pid=18035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3677/file0/file0" dev="loop1" ino=3174 res=1 23:02:51 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000301000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:51 executing program 4: 23:02:51 executing program 4: 23:02:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = getpid() tkill(r4, 0x9) ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000140)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e814ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:51 executing program 4: 23:02:51 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100800401000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(0x0) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = eventfd2(0xeb0, 0x94646fb738a6051a) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x2, r1}) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676e914ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:51 executing program 4: 23:02:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:51 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000501000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(0x0) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ea14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:52 executing program 4: 23:02:52 executing program 2: r0 = open(&(0x7f0000000040)='./bus/file0\x00', 0x141142, 0xa4) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(0x0) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:52 executing program 4: 23:02:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676eb14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:52 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000601000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x4) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0x0) recvmsg(r5, &(0x7f0000000340)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000003c0)=""/235, 0xeb}, {&(0x7f00000002c0)=""/75, 0x4b}], 0x4, &(0x7f0000000640)=""/224, 0xe0}, 0x2000) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:52 executing program 4: 23:02:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ec14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) 23:02:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:52 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100011c01000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:52 executing program 4: 23:02:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ed14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:52 executing program 4: 23:02:52 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100048001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ee14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1bdb3172d67e4b5c, 0x4000010, r2, 0x2d78c000) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r4, 0x80184153, &(0x7f0000000240)={0x0, &(0x7f0000000200)=[&(0x7f0000000040)="479e15986675b466380e6c771159d940de6eed5a1403b9f4c0e83c0fa2afbc400bfbf7de", &(0x7f0000000080)="91fc92c33da5a9db926d2f4e2341efd539cd9851bf7da4f8489599b23fde2cd6e0b7adf92b5f5dbcfc24e535864b76e862e2fb164c8d525aadbdcb", &(0x7f00000000c0)="0061d306c3f30de0cabe52ce6f42830cb3cc852a20be03970b243a0152bd422a1057680d4a7a0e434a2b549f48761e6a058091d1cc7ad2ba195a7f9f7dc1c1e8ec496963736903ba5149caefd0291942685974bbad7cdb5aafe6262a6e4d2903f118c3f180dd27993338ae61f4a61372c4b2e0849030af0e72f4294caf3c52a4ee93c87b854b72005d59438fe6a6942b6722d6d97a4ca12e8bae3af1ffd6782a5ee2", &(0x7f0000000180)="d3d3aae8e0540ab79698c1b03d840f94c03269ac511194c915535c1db2a456ec21deaf34d69625a636c9a5c3bdf36c6b0450784e849efe3bebb64b9838624b11b9107df423587436d71030722a3ec0b49bfddffc29c311b593ad8974efd2ddbf40bdfe67749174b885f10c8cb684ff72876adaa117acf2ea9a0c5f"]}) 23:02:52 executing program 4: 23:02:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0xfffffffffffffe46) truncate(&(0x7f0000000040)='./file0\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r4 = dup(r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="884f95a6df53b7f1f796c9e5a922daf06e4dd28a3205144768ebbc24fdbb36759606e49cfaf2fd5eee510505", 0x2c, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCX25SCAUSEDIAG(r7, 0x89ec, &(0x7f0000000080)={0x8, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r8, 0x0) flock(r8, 0x1) 23:02:52 executing program 4: 23:02:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ef14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100fdef01000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:53 executing program 4: [ 2392.386769] kauditd_printk_skb: 4 callbacks suppressed [ 2392.386782] audit: type=1800 audit(1576105373.136:670): pid=18786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3178 res=0 23:02:53 executing program 4: [ 2392.421462] audit: type=1804 audit(1576105373.166:671): pid=18786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3681/file0/file0" dev="loop1" ino=3178 res=1 23:02:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f014ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100effd01000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) fsetxattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='user.-./wla.0cpusetem1securityppp0*wlan1lo\x00'], &(0x7f0000000140)='/dev/sg#\x00', 0x9, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_destroy(r4) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./bus\x00') r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f0000000040)='\x00', 0x1) 23:02:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x3, 0x40) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x7fffffa7) 23:02:53 executing program 4: 23:02:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f114ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:53 executing program 4: 23:02:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000000030000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:53 executing program 4: 23:02:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="30784d43cbdd81d377b838a68884af53dfc0034f2a051dc7932f8dbce67fc2f30cdb02a8de3b956df2c234d9b13257db204d8e5abc657d6a3b2612e77f9021447ffc75ed4e7f3a7f5c93d72afb09a050b036c481c2694f2eb110bdd7aa9c9cc43ddfd8ea730d50bcc25935b52367dc0a795bfdceefe551c6128efb53a285de7954090f21dbcaee431fbd784335cd556766f672530ecdbe6db9e12652e1a5c85d06df6ea5cee2b435b2ad53bf21591904bad0944e2bb476a9257991e1b14080a6562ab73b7888e409185892c2a8712d71aff7f16322eb5c", @ANYBLOB="45641d85ae126398bfc15ef042f54a2ea89f5d5335be8017573da2b70cd96e662b21f1cd648cb299730f66291ae9f1236fdf4421f09c721e24c8fcd6fe0f1cc177dd9c94c6b76014580e56240e29a792137d7f4830358be11cad7a658ade1f", @ANYRESDEC=r0], 0xde) 23:02:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f214ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:53 executing program 4: 23:02:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000080)='\x00\x00\x00\x00', 0x3) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000300000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:53 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="cd86060533171d0d5cde66cd8dab374c9d8e2be67a9d8aea2abc2661687fd3ef9624aaa479107724065d9d"], 0x2b) 23:02:53 executing program 4: 23:02:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f314ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:54 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000201000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2393.301396] audit: type=1800 audit(1576105374.046:672): pid=19241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3179 res=0 23:02:54 executing program 4: 23:02:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2393.392634] audit: type=1804 audit(1576105374.076:673): pid=19241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3683/file0/file0" dev="loop1" ino=3179 res=1 23:02:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f414ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:54 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000301000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r7 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r7, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r8, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESDEC, @ANYRESOCT=r2, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX=r2, @ANYRESOCT=r0, @ANYRES64, @ANYRES32=0x0], @ANYRES64=r3, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r4, @ANYPTR64, @ANYPTR, @ANYPTR, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRES32=r0], @ANYRESDEC=r5, @ANYRES64=r1, @ANYRESHEX=r2, @ANYRES64=r8, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r1], @ANYRESOCT=r7], @ANYRESOCT, @ANYRESDEC], 0xfffffffffffffe6a) 23:02:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:54 executing program 4: 23:02:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200), &(0x7f0000000300)=0x4) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000140)="590c481dfd83f87fde90a48332468df1f2fb705a2a4c51bb0f2cce77efec48d3e57c2dcd99dde6a969d2280739d906b6c6d8c867dd3f60e5b5ce4f40f1b31e3ec202bbb9cc7c2840be343872fba0b835bdf45a4edcdeb0d4cccce4d2902f24464380d5e33dd7eb82cfd65d97509da434f8d5fe026eb9f9f8630ab71c0567f615110e000084792b134394f92ae7868bf65e") r3 = open(&(0x7f00000002c0)='./file0\x00', 0x11001, 0x18) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r8, 0x84, 0x74, &(0x7f0000000340)=""/6, &(0x7f0000000280)=0x6) write(r4, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200100, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) 23:02:54 executing program 4: 23:02:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f514ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:54 executing program 4: 23:02:54 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000401000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x481) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400140) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_subtree(r3, &(0x7f0000000080)='EEro\xcb\xa6\x8b_\xb3\xe2S!\x95\x96\x0e\xf3\xe9\xe34ro\x05\x00', 0x2, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x1, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x502612}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x1, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x200040a0}, 0x0) 23:02:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f614ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x10001}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0xdb72d000) sendfile(0xffffffffffffffff, r2, 0x0, 0x5f6) r6 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) syncfs(r6) 23:02:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:54 executing program 4: 23:02:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f714ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:54 executing program 4: 23:02:54 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000501000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:55 executing program 4: [ 2394.258305] FAT-fs (loop1): bogus number of reserved sectors [ 2394.283135] FAT-fs (loop1): Can't find a valid FAT filesystem 23:02:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f814ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x400, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000080)={@dev, @loopback}, &(0x7f00000000c0)=0xc) 23:02:55 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000601000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x40000, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x6f, &(0x7f0000000340)={@local, @empty}, &(0x7f0000000400)=0x8) open(&(0x7f0000000080)='./file0\x00', 0x480a02, 0x1) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000240)={0xa, 0x40, &(0x7f0000000140)="fd41e70800e01b1e7b254910dfa47043ca2d9992c76909cba24a40113ecf9faf9ef879e7603c10ee069bc5d38395e9f64789ceb5a6cb59513379a487f3f89593d7e9c6eb9cc42fa1124be204e62db73d5f6bd3a58dffc3bd37f4378797cc36c9978827762db44084e81d3fa69dc29f33af0efa7cf52deebc6732f39e00ceff9bc958", {0x11b4207f, 0x0, 0x35303553, 0x0, 0xfffffffd, 0xfffffffe, 0x1, 0x3}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f0000000480)={0x2, 0x10, 0x4, 0x70000, {}, {0x1, 0xd, 0x3, 0x9f, 0x8, 0x8, "f7ef7ab8"}, 0x2, 0x3, @planes=&(0x7f0000000440)={0x6, 0x7, @fd=r9, 0xc7d}, 0x4}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f00000003c0)='./file0\x00', 0x824) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = dup(r10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendfile(r1, r3, 0x0, 0x7fffffa7) 23:02:55 executing program 4: 23:02:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676f914ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:55 executing program 4: 23:02:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:02:55 executing program 4: 23:02:55 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000003000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2394.774548] audit: type=1800 audit(1576105375.516:674): pid=19792 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3181 res=0 23:02:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676fa14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='romfs\x00', 0x20080, &(0x7f00000001c0)='(\x00') fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x1012c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:55 executing program 4: 23:02:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000200)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x800, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000300)=0x3, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$bt_BT_VOICE(r6, 0x112, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0x2) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xc4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='@\x00roc/self/Attr/exec\x00', 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r8, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r9}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r8, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r9}}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r9, 0x9, 'aA/', "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"}}, 0x110) [ 2394.890787] audit: type=1804 audit(1576105375.566:675): pid=19792 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3686/file0/file0" dev="loop1" ino=3181 res=1 23:02:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) dup3(r1, r0, 0x0) 23:02:55 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000005000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676fb14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x800, 0x2100) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) [ 2395.155724] audit: type=1804 audit(1576105375.906:676): pid=19871 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3687/file0/file0" dev="loop1" ino=3182 res=1 23:02:56 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000006000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) dup3(r1, r0, 0x0) 23:02:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676fc14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) dup3(r1, r0, 0x0) 23:02:56 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x8000, 0x0) write$selinux_validatetrans(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7661725f6c69625f743a73302073797372616e646f6d5f6465766963655f743a73302030303030303030303030303030303030303030372073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733000fa9f511dbb556331782b74873f33dd141f6a13744a5e46cc53c8f957a7ee66a78117d906b606047e0989780557a0d50d31446b1dc7b94fb4f7e512f3ad4d1eb09ae6cb2dc6b716bb29e1986e427d4d22298065b47e9dc9134cefbcb2b716d39c7804aeb19f86e88dc6b1e351e8012213a80bce1217fb456c0f83a46304160a9da3a33627818ec5fd94d27538398a83fd3cb24c0476788d4ebd9950a5f5941613afb1"], 0x77) accept4$nfc_llcp(r0, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x8, &(0x7f00000002c0)) write$P9_RWALK(r2, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:56 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000040000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676fd14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80240}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x78, r6, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x63570d82}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x26}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x857}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0xe09f20d8d25d627d}, 0x8050) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x11, r8, 0x2fa9a000) r9 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676fe14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) 23:02:56 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000000fe800004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ff14ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2396.180015] audit: type=1800 audit(1576105376.926:677): pid=20157 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3183 res=0 23:02:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) close(r4) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SIOCRSGL2CALL(r6, 0x89e5, &(0x7f0000000140)=@default) truncate(&(0x7f0000000040)='./file0\x00', 0xdfe) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x4000) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000180)={0x0, "db3fae5900b6113e1bf72277647421f9f10336d60e296ca02bd31383c44ecb85", 0x1, 0x5, 0x2, 0x80008, 0x4}) write$FUSE_BMAP(r11, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x8}}, 0x18) r12 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) [ 2396.281365] audit: type=1804 audit(1576105376.936:678): pid=20157 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3688/file0/file0" dev="loop1" ino=3183 res=1 23:02:57 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000002000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:57 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x7}, 0x6) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000040)={0x7, 0xfffffffe, 0x3, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x96\xbc\xc4}\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\xff\x00\x00\x00\x04\x00', 0x40}) write$P9_RWALK(r5, &(0x7f0000000140)=ANY=[], 0x30a) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r11, 0x40084504, &(0x7f0000000200)=[0x9, 0x1]) 23:02:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x0) [ 2396.513967] FAT-fs (loop1): bogus number of reserved sectors [ 2396.572581] FAT-fs (loop1): Can't find a valid FAT filesystem 23:02:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:57 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000003000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, 0xffffffffffffffff, 0x0) 23:02:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f00000001c0)) fchdir(r0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r8, 0x0, 0x0, 0x3ff, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) sendfile(r4, r5, 0x0, 0x7fffffa7) 23:02:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, 0xffffffffffffffff, 0x0) 23:02:57 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000005000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:57 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x6, 0x28}, 0xc) preadv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/190, 0xbe}, {&(0x7f0000000240)=""/2, 0x2}, {&(0x7f0000000280)=""/121, 0x79}, {&(0x7f0000000300)=""/40, 0x28}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f0000000380)=""/191, 0xbf}], 0x7, 0xf38b) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000080)={0x2000000, 'syz1\x00'}) open(&(0x7f0000000000)='./bus\x00', 0x5e1842, 0x216) 23:02:57 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2397.140634] QAT: Invalid ioctl 23:02:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, 0xffffffffffffffff, 0x0) 23:02:58 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:58 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000006000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r5, 0x0, r6) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000140)) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) write$binfmt_elf32(r4, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x1, 0xfd, 0x1, 0x2, 0x3, 0x0, 0x100, 0x36, 0x38, 0x55, 0x0, 0xfffd, 0x20, 0x1, 0x1ff, 0x7, 0x101}, [{0x7, 0x2, 0x2, 0x80000001, 0xffffffff, 0x8, 0x6, 0x1f}, {0x3, 0x7, 0x2, 0xffffff80, 0x6, 0xffff, 0x3, 0xba}], "48ccc93904f449d36c05f4c84bb561f2900618476840e850826f5fa9e7b529286db24ea9370846005e39420642808a1e55a271e487db911a8d236cb86ccb3a09cd853a0c8fdd1075446caa3d64ba5ceccbd0752046b54923627e50a6ecf0e33394e2f2896e5ebd0236b5138e20d2d85be85f42474acc98136ef0c973c526480b54eae61f7d05233d53be9f76c6ec24c403ea2f2e62a4d20e08d249905839252f84eef0eb837a410e255cd56da200c15edb57863817fbdc0b19c7f6a918fd2b6fa269fa089f056296950a680c052629ff68f3ea36411a17fcb2add74e96cc664a69276515", [[], []]}, 0x35c) r7 = dup(r3) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000080)={r8}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:58 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 23:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) sendto$inet(r1, &(0x7f0000000140)="e02c2fff59826548cdbb689b4ef8e21b1cae87acf89405c85094f3167bc6c426", 0x20, 0x4001, &(0x7f0000000180)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x20071026, r3}, &(0x7f0000000100)={0x4, 0x7fff, 0x0, 0x2, 0x1, 0x8000}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 23:02:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:58 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000000030000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:58 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2397.612851] audit: type=1800 audit(1576105378.356:679): pid=20640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3184 res=0 23:02:58 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) read$midi(r0, &(0x7f0000000040)=""/30, 0x1e) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2397.750116] audit: type=1804 audit(1576105378.356:680): pid=20640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3691/file0/file0" dev="loop1" ino=3184 res=1 23:02:58 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000df1d1000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:58 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xbda7fbc6a127ffd0}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb0, r1, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffff800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2a3}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4400}, 0x20048088) r2 = open(&(0x7f0000000200)='./file0\x00', 0x10040, 0x85) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x2, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r3, r4, 0x0, 0x7fffffa7) 23:02:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:58 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x400000, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffe58) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) 23:02:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x100000080000000) 23:02:59 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000001fffffff004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) fcntl$addseals(r1, 0x409, 0x8) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000080)=0xfff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:59 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001020000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:59 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x100000080000000) [ 2398.870350] audit: type=1800 audit(1576105379.616:681): pid=21140 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3185 res=0 23:02:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001030000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:02:59 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:02:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0xc, {0x1, 0x3f, 0xffffffff, 0x9}}) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:02:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x101000) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:02:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:02:59 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:00 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001040000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2399.404331] audit: type=1800 audit(1576105380.156:682): pid=21429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3186 res=0 23:03:00 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x40) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000140)={r6}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r6, 0x9, 0x3ff, 0x9}, 0x10) 23:03:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x100000080000000) [ 2399.500189] audit: type=1804 audit(1576105380.186:683): pid=21429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3694/file0/file0" dev="loop1" ino=3186 res=1 23:03:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:00 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001050000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r4, 0x0, r5) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @broadcast}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r8 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x1ff, 0x3, &(0x7f0000000480)=[{&(0x7f0000000240)="65324513f009e805a3486ad46c0c797adfe25fa5ea59897520b7a82c67481c7f9105c838e480bbf2fc4ec57c56562f31d914b757d0ffef3e06273795374c56a14fc8cf718bbeded23a3f51dc3beaddabeec067af09d32b194b1bd21078fee732e8c997377a0ff8e22a480a80cb07e45db7863ef8d8c9639dcb9333167ea4197afb1fecb691b8a0a864891e74662729fd28327cff92c99ddbc5c647da4aa611897cf6d85c2fbb409c1bd47b80331c99d610", 0xb1, 0x5}, {&(0x7f00000003c0)="9dae6a036f6ec9f4dc1b0356800635a386ad28f20ef5e4e07ff65ad06e5684251d4ef3169afb2d87f10ead3867e4f6e1fe04df6c36ea10efa624429d149abab370cd87a99006708eb2c5f0b156b311d12c879e4b2517d1d2e464f9d6165fd4fbc4496f265289dbc8871a7b59345bf1073fac2c34513da5adcd21f00575172753bb72ebe2c2b91e5cf67cfec70c601403ca596dad", 0x94, 0xc78}, {&(0x7f0000000300)="df05786a0138d56dadb9a89edbf2cfc7b2a7526b65ca9fc9eb05da056bbaeee07e25483502eedaf610935c5181c6c924860da1dd2fa4c545a5563e1363633111401effe9a89d77e316f96aac6b9ca7797cb7c7a6e20672258a62c656140f61be58cb93541bf8d10dc80c3b708155903db5511473a7bd739bbba4fcd2f0c5cd", 0x7f, 0x3}], 0x1000000, &(0x7f0000000840)={[{@map_off='map=off'}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@uid={'uid', 0x3d, r3}}, {@check_strict='check=strict'}], [{@euid_gt={'euid>', r6}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r7}}, {@fowner_lt={'fowner<', r8}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@uid_eq={'uid', 0x3d, r9}}]}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$FS_IOC_GETFLAGS(r12, 0x80086601, &(0x7f0000000a40)) r13 = ioctl$TIOCGPTPEER(r11, 0x5441, 0x400) sendfile(r1, r13, 0x0, 0x7fffffa7) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000000)=0x20, 0x4) 23:03:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06760f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:00 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001060000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040), 0x4) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWALK(r3, &(0x7f0000000100)=ANY=[], 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f00000000c0)) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xe2, 0x602400) [ 2399.946649] audit: type=1800 audit(1576105380.696:684): pid=21671 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3187 res=0 23:03:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x100000080000000) [ 2400.018652] audit: type=1804 audit(1576105380.696:685): pid=21671 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3695/file0/file0" dev="loop1" ino=3187 res=1 23:03:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000011c0100004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:01 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 23:03:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000030006000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 23:03:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2400.533555] bridge_slave_1: FDB only supports static addresses 23:03:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100011c01000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:01 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) linkat(r8, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r9 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$search(0xa, r2, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x2}, r10) recvmsg$can_bcm(r8, &(0x7f00000005c0)={&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/63, 0x3f}, {&(0x7f0000000400)=""/1, 0x1}, {&(0x7f0000000440)=""/81, 0x51}], 0x3, &(0x7f0000000500)=""/143, 0x8f}, 0x2) 23:03:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001800400004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:01 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x101000) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_udp_int(r5, 0x11, 0xa, &(0x7f0000000100)=0x400, 0x4) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r3, 0x4144, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) 23:03:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2400.841912] EXT4-fs (loop3): Invalid log block size: 469827585 23:03:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:01 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) linkat(r8, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r9 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$search(0xa, r2, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x2}, r10) recvmsg$can_bcm(r8, &(0x7f00000005c0)={&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/63, 0x3f}, {&(0x7f0000000400)=""/1, 0x1}, {&(0x7f0000000440)=""/81, 0x51}], 0x3, &(0x7f0000000500)=""/143, 0x8f}, 0x2) 23:03:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:03:01 executing program 3 (fault-call:9 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000500004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:01 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) linkat(r8, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r9 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$search(0xa, r2, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x2}, r10) recvmsg$can_bcm(r8, &(0x7f00000005c0)={&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/63, 0x3f}, {&(0x7f0000000400)=""/1, 0x1}, {&(0x7f0000000440)=""/81, 0x51}], 0x3, &(0x7f0000000500)=""/143, 0x8f}, 0x2) 23:03:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2401.244388] audit: type=1800 audit(1576105381.996:686): pid=22093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3188 res=0 23:03:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000600004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x3f00) 23:03:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 2401.366869] audit: type=1804 audit(1576105381.996:687): pid=22093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3698/file0/file0" dev="loop1" ino=3188 res=1 23:03:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) linkat(r8, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r9 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$search(0xa, r2, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x2}, r10) 23:03:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001011c00004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x100000) 23:03:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) linkat(r7, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r8 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r8) 23:03:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2401.806571] audit: type=1800 audit(1576105382.556:688): pid=22131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3189 res=0 23:03:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x1000000) 23:03:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) linkat(r7, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) r8 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') 23:03:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001034000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x7fffffa7) 23:03:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x3f000000) 23:03:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) linkat(r7, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 23:03:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:03 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001048000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) linkat(r7, &(0x7f0000000280)='./bus\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x1000) 23:03:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0xfeffffff) 23:03:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 23:03:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:03 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001fdef00004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 23:03:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0xfffffffe) 23:03:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r6) 23:03:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2402.814262] kauditd_printk_skb: 3 callbacks suppressed [ 2402.814276] audit: type=1800 audit(1576105383.566:692): pid=22227 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3191 res=0 23:03:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x100000000000) 23:03:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) 23:03:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) 23:03:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:03 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001effd00004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x1000000000000) [ 2402.962290] audit: type=1804 audit(1576105383.576:693): pid=22227 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3701/file0/file0" dev="loop1" ino=3191 res=1 23:03:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2403.226838] audit: type=1800 audit(1576105383.976:694): pid=22263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3192 res=0 23:03:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:04 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000016b6b6b004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x100000000000000) 23:03:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 23:03:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 2403.373055] audit: type=1804 audit(1576105383.976:695): pid=22263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3702/file0/file0" dev="loop1" ino=3192 res=1 23:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06761f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 23:03:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x3f00000000000000) 23:03:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2403.592501] audit: type=1800 audit(1576105384.336:696): pid=22298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3193 res=0 23:03:04 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000014000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2403.687675] audit: type=1804 audit(1576105384.376:697): pid=22298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3703/file0/file0" dev="loop1" ino=3193 res=1 23:03:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 23:03:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0xfeffffff00000000) 23:03:04 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000024000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000000c0)={0x9, 0x3}, 0x4) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r0, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000000)={0x9, "fd829ae2b9abb5f24720922f458fafc49ab19869e4a6d9facf130592cbadace5", 0x0, 0x2c76, 0x0, 0x4082a, 0xe}) dup3(r1, r0, 0x0) 23:03:04 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2404.114661] FAULT_INJECTION: forcing a failure. [ 2404.114661] name failslab, interval 1, probability 0, space 0, times 0 23:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2404.186661] CPU: 0 PID: 22371 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2404.195426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2404.205071] Call Trace: [ 2404.207722] dump_stack+0x197/0x210 [ 2404.211547] should_fail.cold+0xa/0x1b [ 2404.215831] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2404.221273] ? lock_downgrade+0x880/0x880 [ 2404.225797] __should_failslab+0x121/0x190 [ 2404.230553] should_failslab+0x9/0x14 23:03:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2404.234739] __kmalloc+0x2e2/0x750 [ 2404.238321] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2404.244475] ? fput+0x128/0x1a0 [ 2404.247973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2404.253641] ? strnlen_user+0x15f/0x1e0 [ 2404.257945] ? __x64_sys_memfd_create+0x13c/0x470 [ 2404.263109] __x64_sys_memfd_create+0x13c/0x470 [ 2404.267936] ? memfd_fcntl+0x1750/0x1750 [ 2404.272861] ? do_syscall_64+0x26/0x620 [ 2404.277250] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2404.281980] ? trace_hardirqs_on+0x67/0x220 23:03:05 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2404.286546] do_syscall_64+0xfd/0x620 [ 2404.286567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2404.286578] RIP: 0033:0x45a849 [ 2404.286591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2404.286599] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2404.295907] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 23:03:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$setlease(r4, 0x400, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2404.295915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2404.295922] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2404.295929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2404.295936] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:05 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2404.537076] audit: type=1800 audit(1576105385.286:698): pid=22468 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3194 res=0 [ 2404.575465] FAULT_INJECTION: forcing a failure. [ 2404.575465] name failslab, interval 1, probability 0, space 0, times 0 23:03:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 0xffffffffffffffec) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x4207c0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @timestamp, @window={0x3, 0xfc00, 0x4}, @mss={0x2, 0x81}], 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00005befdc)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCCONS(r6, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r7, r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup3(r6, r5, 0x0) 23:03:05 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000040034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2404.628997] CPU: 1 PID: 22473 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2404.637117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2404.646521] Call Trace: [ 2404.649150] dump_stack+0x197/0x210 [ 2404.653019] should_fail.cold+0xa/0x1b [ 2404.657300] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2404.662657] ? lock_downgrade+0x880/0x880 [ 2404.667095] __should_failslab+0x121/0x190 [ 2404.671631] should_failslab+0x9/0x14 [ 2404.675645] kmem_cache_alloc+0x2ae/0x700 [ 2404.679833] ? __alloc_fd+0x44d/0x560 [ 2404.683954] ? shmem_destroy_callback+0xc0/0xc0 [ 2404.688667] shmem_alloc_inode+0x1c/0x50 [ 2404.690595] audit: type=1804 audit(1576105385.316:699): pid=22468 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3705/file0/file0" dev="loop1" ino=3194 res=1 [ 2404.693255] alloc_inode+0x64/0x190 [ 2404.693269] new_inode_pseudo+0x19/0xf0 [ 2404.693281] new_inode+0x1f/0x40 [ 2404.693294] shmem_get_inode+0x84/0x780 [ 2404.693312] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2404.693327] shmem_file_setup+0x66/0x90 [ 2404.693342] __x64_sys_memfd_create+0x2a2/0x470 [ 2404.693357] ? memfd_fcntl+0x1750/0x1750 [ 2404.754574] ? do_syscall_64+0x26/0x620 [ 2404.758679] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2404.765315] ? trace_hardirqs_on+0x67/0x220 [ 2404.769744] do_syscall_64+0xfd/0x620 [ 2404.773598] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:03:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x82002) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x5, 0xa4b6, 0xbe3, 0x22f, 0x0, 0x800}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x2, 0x8001, 0x0, 0xffffffff, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x4, 0x101}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCCONS(r2, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) write$FUSE_POLL(r3, &(0x7f0000000100)={0x18, 0xae94f39ddb1768b3, 0x5, {0x6}}, 0x18) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup3(r2, r1, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000140)=""/14, &(0x7f0000000340)=""/4096, &(0x7f0000000200)=""/105, 0x5000}) [ 2404.778831] RIP: 0033:0x45a849 [ 2404.782291] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2404.801967] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2404.810212] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2404.817523] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2404.824920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2404.833173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2404.840846] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:05 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000044000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:05 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2405.040575] FAULT_INJECTION: forcing a failure. [ 2405.040575] name failslab, interval 1, probability 0, space 0, times 0 [ 2405.064021] audit: type=1800 audit(1576105385.806:700): pid=22497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3195 res=0 [ 2405.077458] CPU: 1 PID: 22501 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2405.096192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2405.105610] Call Trace: [ 2405.108260] dump_stack+0x197/0x210 [ 2405.112022] should_fail.cold+0xa/0x1b [ 2405.116644] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2405.122139] ? percpu_ref_put_many+0x94/0x190 [ 2405.126683] __should_failslab+0x121/0x190 [ 2405.131051] should_failslab+0x9/0x14 [ 2405.134885] kmem_cache_alloc+0x2ae/0x700 23:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2405.139165] ? map_id_range_down+0x1ee/0x370 [ 2405.143795] ? __put_user_ns+0x70/0x70 [ 2405.147962] selinux_inode_alloc_security+0xb6/0x2a0 [ 2405.153285] security_inode_alloc+0x8a/0xd0 [ 2405.158230] inode_init_always+0x56e/0xb40 [ 2405.162840] alloc_inode+0x81/0x190 [ 2405.166602] new_inode_pseudo+0x19/0xf0 [ 2405.170827] new_inode+0x1f/0x40 23:03:05 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2405.171827] audit: type=1804 audit(1576105385.846:701): pid=22497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3706/file0/file0" dev="loop1" ino=3195 res=1 [ 2405.174821] shmem_get_inode+0x84/0x780 [ 2405.174843] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2405.174858] shmem_file_setup+0x66/0x90 [ 2405.174874] __x64_sys_memfd_create+0x2a2/0x470 [ 2405.174887] ? memfd_fcntl+0x1750/0x1750 [ 2405.174901] ? do_syscall_64+0x26/0x620 [ 2405.174916] ? lockdep_hardirqs_on+0x415/0x5d0 23:03:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2405.174941] ? trace_hardirqs_on+0x67/0x220 [ 2405.244163] do_syscall_64+0xfd/0x620 [ 2405.248389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.254050] RIP: 0033:0x45a849 [ 2405.257550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2405.277452] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 23:03:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockname$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) [ 2405.285873] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2405.294316] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2405.302024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2405.310462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2405.318206] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:06 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000064000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000140)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x5, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x1, 0x5, 0x3, 0xea}}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:06 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:06 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000011c4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x7fffffff, 0x2, 0x4000000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c464332ff06df0300000000000003000600070000002c010000000000004000000000000000c90300000000000002000000f8ff38000200ff010600e4b8f768a9a0000000000101000000000000050000000000000009000000000000000100000000000000070000000000000004000000000000000200000050000000000000000000000000100000000000008100000000000000ff0f0000000000000010000000000000040000000000000033af2e556798e9b3726d633bbd977f2cd5db13111265f2a1761ec7a4892353e05d6103947427cb229b475e4a33b7d40b898e65711facdeff5d9d0b87c43d8c351cc4ddf61a1a154bc908cfdb325ebefd1d2f17e2dd7a7469647a543453e7f69671c864a7a676f7ab27a21f0bb13a874a33cd6caa72ae49b4d2563a130d18cc9e33fbad172ec76d9350e5852a6eb49726bafa1484dc38aa3bd5d3273ae254f6e097f731f30e95e78d2f3fe97f2d09616e4d7d9bd9134c6966e3447b73d01262ef45ee0301b119a605fdfe145bb283181146462b092f105cda88a3f9327ae40d8c6a86362f51a80548d600"/653], 0x299) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x534e3153293a79bb, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r7 = add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x4e0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r7, 0x0) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000100)={'mangle\x00', 0x6f, "a762d6e5c72fe21b99e024ad03a4356f2dea429958679689782a97455a280ee3f89fc1ddfa47ac1e2a6254d2fcfc0a6b1f63bf3d395902f57c888106a42252f73e1534413d2a64981ba3d201beb745902b76a4b41b8e3118e3614e2b5ae856d57701e869c92031b3d0e94f470c70c3"}, &(0x7f0000000080)=0x93) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r9 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r9, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2405.886808] FAULT_INJECTION: forcing a failure. [ 2405.886808] name failslab, interval 1, probability 0, space 0, times 0 [ 2405.959557] CPU: 0 PID: 22554 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2405.968013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2405.978056] Call Trace: [ 2405.980937] dump_stack+0x197/0x210 [ 2405.984787] should_fail.cold+0xa/0x1b [ 2405.988979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2405.994302] ? percpu_ref_put_many+0x94/0x190 [ 2405.999213] __should_failslab+0x121/0x190 [ 2406.003662] should_failslab+0x9/0x14 [ 2406.007496] kmem_cache_alloc+0x2ae/0x700 [ 2406.011674] ? map_id_range_down+0x1ee/0x370 [ 2406.016373] ? __put_user_ns+0x70/0x70 [ 2406.020375] selinux_inode_alloc_security+0xb6/0x2a0 [ 2406.025550] security_inode_alloc+0x8a/0xd0 [ 2406.030035] inode_init_always+0x56e/0xb40 [ 2406.034554] alloc_inode+0x81/0x190 [ 2406.038350] new_inode_pseudo+0x19/0xf0 [ 2406.042450] new_inode+0x1f/0x40 [ 2406.045859] shmem_get_inode+0x84/0x780 [ 2406.049872] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2406.054749] shmem_file_setup+0x66/0x90 [ 2406.058766] __x64_sys_memfd_create+0x2a2/0x470 [ 2406.063563] ? memfd_fcntl+0x1750/0x1750 [ 2406.067838] ? do_syscall_64+0x26/0x620 [ 2406.071863] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2406.076708] ? trace_hardirqs_on+0x67/0x220 [ 2406.081248] do_syscall_64+0xfd/0x620 [ 2406.085084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.090448] RIP: 0033:0x45a849 23:03:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:06 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001006b6b6b4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400800, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x800) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2406.093667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2406.113312] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2406.121068] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2406.128516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2406.135813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2406.143463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2406.150860] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:06 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:06 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000004804000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(r2, &(0x7f0000000600)={0xc, 0x1000, "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"}, 0x1006) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x3c, r9, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x02\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r7, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, r9, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffba}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20040802}, 0x1) dup3(r1, r0, 0x0) 23:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2406.295213] FAULT_INJECTION: forcing a failure. [ 2406.295213] name failslab, interval 1, probability 0, space 0, times 0 23:03:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2406.417496] CPU: 0 PID: 22578 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2406.427342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.436987] Call Trace: [ 2406.439764] dump_stack+0x197/0x210 [ 2406.443616] should_fail.cold+0xa/0x1b [ 2406.447731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2406.453109] ? lock_downgrade+0x880/0x880 [ 2406.457340] __should_failslab+0x121/0x190 [ 2406.462102] should_failslab+0x9/0x14 [ 2406.466539] kmem_cache_alloc+0x2ae/0x700 [ 2406.471004] __alloc_file+0x27/0x330 [ 2406.475112] alloc_empty_file+0x72/0x170 [ 2406.479380] alloc_file+0x5e/0x4d0 [ 2406.482963] alloc_file_pseudo+0x189/0x280 [ 2406.487240] ? alloc_file+0x4d0/0x4d0 [ 2406.491092] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2406.496676] ? kasan_check_write+0x14/0x20 [ 2406.501042] __shmem_file_setup.part.0+0x108/0x2b0 [ 2406.506152] shmem_file_setup+0x66/0x90 [ 2406.510166] __x64_sys_memfd_create+0x2a2/0x470 [ 2406.515027] ? memfd_fcntl+0x1750/0x1750 [ 2406.519232] ? do_syscall_64+0x26/0x620 [ 2406.523247] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2406.527961] ? trace_hardirqs_on+0x67/0x220 [ 2406.532506] do_syscall_64+0xfd/0x620 [ 2406.536352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.541723] RIP: 0033:0x45a849 [ 2406.544945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:03:07 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001fffffdef4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:07 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001fffffffe4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2406.564223] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2406.572082] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2406.579392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2406.586696] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2406.593983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2406.601275] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x501200, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x9, {{0xa, 0x4e23, 0x3, @rand_addr="02a0145a2076ae22be8c8d2a0ab02490", 0x6}}}, 0x88) dup2(r11, r1) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:07 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2406.824574] FAULT_INJECTION: forcing a failure. [ 2406.824574] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.861004] CPU: 1 PID: 22617 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2406.868864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.878239] Call Trace: [ 2406.880854] dump_stack+0x197/0x210 [ 2406.884505] should_fail.cold+0xa/0x1b [ 2406.888419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2406.893549] ? lock_downgrade+0x880/0x880 [ 2406.897768] __should_failslab+0x121/0x190 [ 2406.902024] should_failslab+0x9/0x14 [ 2406.905832] kmem_cache_alloc+0x2ae/0x700 [ 2406.905852] ? rcu_read_lock_sched_held+0x110/0x130 [ 2406.905868] selinux_file_alloc_security+0xb4/0x190 [ 2406.905882] security_file_alloc+0x63/0xa0 23:03:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:07 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001effdffff4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2406.905898] __alloc_file+0xcf/0x330 [ 2406.905913] alloc_empty_file+0x72/0x170 [ 2406.905928] alloc_file+0x5e/0x4d0 [ 2406.905947] alloc_file_pseudo+0x189/0x280 [ 2406.940264] ? alloc_file+0x4d0/0x4d0 [ 2406.944284] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2406.949858] ? kasan_check_write+0x14/0x20 [ 2406.954124] __shmem_file_setup.part.0+0x108/0x2b0 [ 2406.959082] shmem_file_setup+0x66/0x90 [ 2406.963084] __x64_sys_memfd_create+0x2a2/0x470 [ 2406.967782] ? memfd_fcntl+0x1750/0x1750 [ 2406.971878] ? do_syscall_64+0x26/0x620 [ 2406.975892] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2406.980512] ? trace_hardirqs_on+0x67/0x220 [ 2406.984869] do_syscall_64+0xfd/0x620 [ 2406.988789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.994002] RIP: 0033:0x45a849 [ 2406.997225] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.016152] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 23:03:07 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001feffffff4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PIO_SCRNMAP(r6, 0x4b41, &(0x7f0000000000)="4c7deaf26c5541d7cbcd49cc0716ada113f565b8764969212f280cd1d79e8a2768e2c48aaa765f209e8118137297a61ad487a98563db75f277424a5c838f8b03862ed56d00df7cc46b1d6da1aa331482f1ba302e22e2808e2abd873a6a1de721399cceb8699f7db8fbcb195faa5a98e79a07cb3cb90c92bf09eece55540126f37989924a023300fae8e0feefdd1652e36914cfd18d23000535d8b6e54c745430d75c1f2b4a4fb67f3b503bec350ee4f3f802386b6b58d34660f4e343b865f901290441091e6657b3edb10a57d0ba23c6aa1414169cede8f317") dup3(r1, r0, 0x0) [ 2407.023888] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2407.031177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2407.038476] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2407.045777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2407.053071] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:07 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2407.230389] FAULT_INJECTION: forcing a failure. [ 2407.230389] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.297118] CPU: 0 PID: 22645 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2407.304988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.314359] Call Trace: [ 2407.316984] dump_stack+0x197/0x210 [ 2407.320644] should_fail.cold+0xa/0x1b [ 2407.324564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2407.329695] ? lock_downgrade+0x880/0x880 [ 2407.333875] __should_failslab+0x121/0x190 [ 2407.338278] should_failslab+0x9/0x14 [ 2407.342147] kmem_cache_alloc+0x2ae/0x700 [ 2407.346501] ? rcu_read_lock_sched_held+0x110/0x130 [ 2407.351566] selinux_file_alloc_security+0xb4/0x190 [ 2407.356596] security_file_alloc+0x63/0xa0 [ 2407.360838] __alloc_file+0xcf/0x330 [ 2407.364561] alloc_empty_file+0x72/0x170 [ 2407.368639] alloc_file+0x5e/0x4d0 [ 2407.372201] alloc_file_pseudo+0x189/0x280 [ 2407.376454] ? alloc_file+0x4d0/0x4d0 [ 2407.380263] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2407.385811] ? kasan_check_write+0x14/0x20 [ 2407.390064] __shmem_file_setup.part.0+0x108/0x2b0 [ 2407.395004] shmem_file_setup+0x66/0x90 [ 2407.398984] __x64_sys_memfd_create+0x2a2/0x470 [ 2407.403660] ? memfd_fcntl+0x1750/0x1750 [ 2407.407734] ? do_syscall_64+0x26/0x620 [ 2407.411712] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2407.416298] ? trace_hardirqs_on+0x67/0x220 [ 2407.420653] do_syscall_64+0xfd/0x620 [ 2407.424460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.429651] RIP: 0033:0x45a849 23:03:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000200004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2407.432852] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.451839] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2407.459550] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a849 [ 2407.466820] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf8f2 [ 2407.474098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 2407.481384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2407.488657] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$rds(r3, &(0x7f0000001540)={&(0x7f0000001580)={0x2, 0x4e23, @rand_addr=0x6}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000080)=""/210, 0xd2}, {&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000001340)=""/184, 0xb8}, {&(0x7f0000000280)=""/83, 0x53}], 0x6, &(0x7f00000014c0)=[@rdma_dest={0x18, 0x114, 0x2, {0x8001, 0xfffffffa}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000180)=""/17, 0x11}, &(0x7f0000001480), 0x20}}], 0x48, 0x40}, 0x100) r4 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r4, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCGETD(r8, 0x5424, &(0x7f0000000000)) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup3(r4, r0, 0x0) 23:03:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='+\x92:posix_acl_access/vboxnet0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06762f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = shmat(0xffffffffffffffff, &(0x7f0000ff1000/0xf000)=nil, 0x4000) shmdt(r4) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000400004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:08 executing program 4 (fault-call:3 fault-nth:7): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400203) dup3(r1, r0, 0x0) [ 2407.932414] kauditd_printk_skb: 10 callbacks suppressed [ 2407.932427] audit: type=1800 audit(1576105388.676:712): pid=22778 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3201 res=0 [ 2408.019720] FAULT_INJECTION: forcing a failure. [ 2408.019720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2408.031596] CPU: 1 PID: 22789 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2408.039408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.048824] Call Trace: [ 2408.051447] dump_stack+0x197/0x210 23:03:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000500004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2408.052185] audit: type=1804 audit(1576105388.716:713): pid=22778 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3712/file0/file0" dev="loop1" ino=3201 res=1 [ 2408.055092] should_fail.cold+0xa/0x1b [ 2408.055109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.055129] ? mark_held_locks+0x100/0x100 [ 2408.055152] __alloc_pages_nodemask+0x1ee/0x750 [ 2408.055171] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2408.055184] ? find_held_lock+0x35/0x130 [ 2408.055209] cache_grow_begin+0x91/0x8c0 [ 2408.055221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:03:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000600004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2408.055239] ? check_preemption_disabled+0x48/0x290 [ 2408.124512] kmem_cache_alloc+0x63b/0x700 [ 2408.128816] ? notify_change+0x6d5/0xfb0 [ 2408.132911] ? do_sys_ftruncate+0x41e/0x550 [ 2408.137259] getname_flags+0xd6/0x5b0 [ 2408.141072] getname+0x1a/0x20 [ 2408.144292] do_sys_open+0x2c9/0x550 [ 2408.148034] ? filp_open+0x80/0x80 [ 2408.151624] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.156401] ? do_syscall_64+0x26/0x620 [ 2408.160399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.165795] ? do_syscall_64+0x26/0x620 23:03:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2408.169923] __x64_sys_open+0x7e/0xc0 [ 2408.173748] do_syscall_64+0xfd/0x620 [ 2408.177660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.182851] RIP: 0033:0x4145e1 [ 2408.186071] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2408.205168] RSP: 002b:00007f5aeddd1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2408.212900] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 00000000004145e1 23:03:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2408.220199] RDX: 00007f5aeddd1b0a RSI: 0000000000000002 RDI: 00007f5aeddd1b00 [ 2408.227487] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2408.234892] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f5aeddd26d4 [ 2408.242236] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:09 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001001c01004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000000)={0x5, 0x8}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) dup3(r1, r0, 0x0) [ 2408.388580] audit: type=1800 audit(1576105389.136:714): pid=22811 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3202 res=0 23:03:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2408.498941] audit: type=1804 audit(1576105389.136:715): pid=22811 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3713/file0/file0" dev="loop1" ino=3202 res=1 23:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:09 executing program 4 (fault-call:3 fault-nth:8): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:09 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000003004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2408.709505] FAULT_INJECTION: forcing a failure. [ 2408.709505] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.724601] audit: type=1800 audit(1576105389.476:716): pid=22836 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3203 res=0 [ 2408.729484] CPU: 0 PID: 22841 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2408.755119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.764495] Call Trace: [ 2408.764519] dump_stack+0x197/0x210 [ 2408.764538] should_fail.cold+0xa/0x1b [ 2408.764559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.780338] ? lock_downgrade+0x880/0x880 [ 2408.784515] __should_failslab+0x121/0x190 [ 2408.784533] should_failslab+0x9/0x14 [ 2408.792630] kmem_cache_alloc+0x2ae/0x700 [ 2408.796815] ? __save_stack_trace+0x99/0x100 [ 2408.801246] __alloc_file+0x27/0x330 [ 2408.804993] alloc_empty_file+0x72/0x170 [ 2408.809240] path_openat+0xef/0x45e0 [ 2408.812980] ? __lock_acquire+0x6ee/0x49c0 [ 2408.817229] ? getname+0x1a/0x20 [ 2408.820594] ? do_sys_open+0x2c9/0x550 [ 2408.820608] ? __x64_sys_open+0x7e/0xc0 [ 2408.828470] ? do_syscall_64+0xfd/0x620 [ 2408.832471] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.837870] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2408.842565] ? __lock_is_held+0xb6/0x140 [ 2408.846665] ? __alloc_fd+0x44d/0x560 [ 2408.850500] do_filp_open+0x1a1/0x280 [ 2408.854331] ? may_open_dev+0x100/0x100 [ 2408.858328] ? lock_downgrade+0x880/0x880 [ 2408.862526] ? do_raw_spin_unlock+0x178/0x270 [ 2408.867070] ? _raw_spin_unlock+0x2d/0x50 [ 2408.871254] ? __alloc_fd+0x44d/0x560 [ 2408.875305] do_sys_open+0x3fe/0x550 [ 2408.879076] ? filp_open+0x80/0x80 [ 2408.882651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.887445] ? do_syscall_64+0x26/0x620 [ 2408.891449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.896855] ? do_syscall_64+0x26/0x620 [ 2408.900851] __x64_sys_open+0x7e/0xc0 [ 2408.904671] do_syscall_64+0xfd/0x620 23:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r1, r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r8, 0x800448d2, &(0x7f0000000000)={0x5, &(0x7f0000000340)=[{}, {}, {}, {}, {}]}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r9, 0x8983, &(0x7f0000000100)={0x8, 'syzkaller0\x00', {'vlan0\x00'}, 0x6}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0xa, 0x1, 0x0) close(r12) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000140)={r14}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r11, 0x84, 0x0, &(0x7f0000000040)={r14, 0x4, 0x769a, 0x1f}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000000c0)={r15, 0x80, 0x5, [0x6, 0x0, 0x2, 0x1, 0x0]}, 0x12) [ 2408.910068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.915277] RIP: 0033:0x4145e1 [ 2408.918483] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2408.937401] RSP: 002b:00007f5aeddd1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2408.945138] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 00000000004145e1 [ 2408.952446] RDX: 00007f5aeddd1b0a RSI: 0000000000000002 RDI: 00007f5aeddd1b00 23:03:09 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001008004004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2408.959824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2408.967359] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f5aeddd26d4 [ 2408.974656] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:09 executing program 4 (fault-call:3 fault-nth:9): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0xed39ba7e264e4cfb, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2409.220614] FAULT_INJECTION: forcing a failure. [ 2409.220614] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.253771] audit: type=1800 audit(1576105390.006:717): pid=22960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3204 res=0 [ 2409.276260] CPU: 0 PID: 22968 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2409.284281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.293670] Call Trace: [ 2409.296286] dump_stack+0x197/0x210 [ 2409.299940] should_fail.cold+0xa/0x1b [ 2409.303863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.308998] ? lock_downgrade+0x880/0x880 [ 2409.313354] __should_failslab+0x121/0x190 23:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2409.317650] should_failslab+0x9/0x14 [ 2409.321493] kmem_cache_alloc+0x2ae/0x700 [ 2409.325661] ? __save_stack_trace+0x99/0x100 [ 2409.329108] audit: type=1804 audit(1576105390.026:718): pid=22960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3715/file0/file0" dev="loop1" ino=3204 res=1 [ 2409.330097] __alloc_file+0x27/0x330 [ 2409.330114] alloc_empty_file+0x72/0x170 [ 2409.330131] path_openat+0xef/0x45e0 23:03:10 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='\x00\x00\x00\f\x02fG\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2409.369124] ? __lock_acquire+0x6ee/0x49c0 [ 2409.373369] ? getname+0x1a/0x20 [ 2409.376751] ? do_sys_open+0x2c9/0x550 [ 2409.380639] ? __x64_sys_open+0x7e/0xc0 [ 2409.384727] ? do_syscall_64+0xfd/0x620 [ 2409.388740] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.394131] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2409.398822] ? __lock_is_held+0xb6/0x140 [ 2409.402906] ? __alloc_fd+0x44d/0x560 [ 2409.406716] do_filp_open+0x1a1/0x280 [ 2409.410535] ? may_open_dev+0x100/0x100 [ 2409.414541] ? lock_downgrade+0x880/0x880 23:03:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2409.418712] ? do_raw_spin_unlock+0x178/0x270 [ 2409.423230] ? _raw_spin_unlock+0x2d/0x50 [ 2409.427405] ? __alloc_fd+0x44d/0x560 [ 2409.431229] do_sys_open+0x3fe/0x550 [ 2409.434964] ? filp_open+0x80/0x80 [ 2409.438525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.443298] ? do_syscall_64+0x26/0x620 [ 2409.443313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.443325] ? do_syscall_64+0x26/0x620 [ 2409.443343] __x64_sys_open+0x7e/0xc0 [ 2409.452720] do_syscall_64+0xfd/0x620 [ 2409.464321] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:03:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000000)=0x1f, &(0x7f0000000040)=0x4) dup2(r2, r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2409.469525] RIP: 0033:0x4145e1 [ 2409.472905] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2409.491837] RSP: 002b:00007f5aeddd1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2409.499570] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 00000000004145e1 [ 2409.506874] RDX: 00007f5aeddd1b0a RSI: 0000000000000002 RDI: 00007f5aeddd1b00 [ 2409.506883] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000005004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2409.506890] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f5aeddd26d4 [ 2409.506897] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:10 executing program 2: write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000006004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2409.760658] audit: type=1800 audit(1576105390.506:719): pid=22993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3205 res=0 23:03:10 executing program 4 (fault-call:3 fault-nth:10): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000200)=ANY=[@ANYBLOB="c8030000000000000109000000000000000000c910fe880000000000000000000000000101000000d574cd9bbc5c3ef19511b3c321ac828df9f3aaedce769ae3ea2fe7eca8139e53deb4c47f24b4e053eb1e735aa205c21b7620d85b0cdb18939a18ca3156885ebcccbda15f632d5e43f9729f7d9fc1e35372b35bf91d333b3bdd53201ce9af4f878ed4184a25959995fe07c842a9ece2c8b02e9b5ecdaed964a2a6fd7445fc7bfaf16038681acd0fbccadb456d8604dc1eef112bf60291a1d0c4c13f9bf1e88f17378e0fb2ae6343490c3384c94be5fbece9030987d76377382d243388"], 0x28) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCCONS(r4, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup3(r4, r3, 0x0) 23:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:10 executing program 2: write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100011c004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2409.868622] audit: type=1804 audit(1576105390.536:720): pid=22993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir518768821/syzkaller.zQXN9M/3716/file0/file0" dev="loop1" ino=3205 res=1 23:03:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2409.983325] FAULT_INJECTION: forcing a failure. [ 2409.983325] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.005071] CPU: 0 PID: 23018 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2410.012925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.022293] Call Trace: [ 2410.024903] dump_stack+0x197/0x210 [ 2410.028561] should_fail.cold+0xa/0x1b 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000480004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:10 executing program 2: write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2410.032507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.037653] ? lock_downgrade+0x880/0x880 [ 2410.041830] __should_failslab+0x121/0x190 [ 2410.046086] should_failslab+0x9/0x14 [ 2410.049919] kmem_cache_alloc_trace+0x2cc/0x760 [ 2410.054605] ? __lockdep_init_map+0x10c/0x5b0 [ 2410.059129] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2410.063907] __kthread_create_on_node+0xf2/0x460 [ 2410.068695] ? lock_acquire+0x16f/0x3f0 [ 2410.072696] ? __kthread_parkme+0x1b0/0x1b0 [ 2410.077049] ? lo_ioctl+0x1c4/0x20e0 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100fdef004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.080798] ? lock_downgrade+0x880/0x880 [ 2410.084981] ? mutex_trylock+0x1e0/0x1e0 [ 2410.089060] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2410.093836] kthread_create_on_node+0xbb/0xf0 [ 2410.098361] ? __kthread_create_on_node+0x460/0x460 [ 2410.103403] ? __lockdep_init_map+0x10c/0x5b0 [ 2410.107912] ? __lockdep_init_map+0x10c/0x5b0 [ 2410.112436] lo_ioctl+0xaf2/0x20e0 [ 2410.116007] ? lo_rw_aio+0x1470/0x1470 [ 2410.119919] blkdev_ioctl+0xc38/0x1ab6 [ 2410.123828] ? blkpg_ioctl+0xa90/0xa90 [ 2410.127744] ? find_held_lock+0x35/0x130 23:03:10 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100effd004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.131845] ? quarantine_put+0x1a0/0x1c0 [ 2410.136023] ? __fget+0x340/0x540 [ 2410.139504] block_ioctl+0xee/0x130 [ 2410.143150] ? blkdev_fallocate+0x410/0x410 [ 2410.147491] do_vfs_ioctl+0xd5f/0x1380 [ 2410.151396] ? selinux_file_ioctl+0x46f/0x5e0 [ 2410.155907] ? selinux_file_ioctl+0x125/0x5e0 [ 2410.160435] ? ioctl_preallocate+0x210/0x210 [ 2410.164867] ? selinux_file_mprotect+0x620/0x620 [ 2410.169655] ? iterate_fd+0x360/0x360 [ 2410.173479] ? do_sys_open+0x31d/0x550 [ 2410.177400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2410.182956] ? security_file_ioctl+0x8d/0xc0 [ 2410.187413] ksys_ioctl+0xab/0xd0 [ 2410.190905] __x64_sys_ioctl+0x73/0xb0 [ 2410.194838] do_syscall_64+0xfd/0x620 [ 2410.198683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.203897] RIP: 0033:0x45a6b7 [ 2410.207109] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.226305] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2410.234742] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2410.242015] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2410.249295] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2410.256664] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2410.263938] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:11 executing program 4 (fault-call:3 fault-nth:11): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000002004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.397114] audit: type=1800 audit(1576105391.146:721): pid=23035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3206 res=0 23:03:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) dup2(r2, r1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x7, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:11 executing program 2: r0 = open(0x0, 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000003004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.502727] FAULT_INJECTION: forcing a failure. [ 2410.502727] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.521015] CPU: 0 PID: 23049 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2410.528870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.538251] Call Trace: [ 2410.540866] dump_stack+0x197/0x210 [ 2410.544523] should_fail.cold+0xa/0x1b 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000004004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.548449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.553597] ? lock_downgrade+0x880/0x880 [ 2410.557785] __should_failslab+0x121/0x190 [ 2410.562050] should_failslab+0x9/0x14 [ 2410.565883] kmem_cache_alloc+0x2ae/0x700 [ 2410.570069] ? __schedule+0x1495/0x1dc0 [ 2410.574179] __kernfs_new_node+0xef/0x680 [ 2410.578361] ? _raw_spin_unlock_irq+0x28/0x90 [ 2410.582915] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2410.587703] ? __lock_acquire+0x6ee/0x49c0 [ 2410.591977] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2410.596508] ? __schedule+0x1495/0x1dc0 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000005004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.600519] ? __lock_is_held+0xb6/0x140 [ 2410.604631] kernfs_new_node+0x99/0x130 [ 2410.608655] kernfs_create_dir_ns+0x52/0x160 [ 2410.613099] internal_create_group+0x1cb/0xc30 [ 2410.617894] ? bd_set_size+0x89/0xb0 [ 2410.621640] ? remove_files.isra.0+0x190/0x190 [ 2410.626269] sysfs_create_group+0x20/0x30 [ 2410.630525] lo_ioctl+0xf8f/0x20e0 [ 2410.634085] ? lo_rw_aio+0x1470/0x1470 [ 2410.637994] blkdev_ioctl+0xc38/0x1ab6 [ 2410.641906] ? blkpg_ioctl+0xa90/0xa90 [ 2410.645816] ? find_held_lock+0x35/0x130 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000006004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.649901] ? debug_check_no_obj_freed+0x200/0x464 [ 2410.654952] ? __fget+0x340/0x540 [ 2410.658440] block_ioctl+0xee/0x130 [ 2410.662092] ? blkdev_fallocate+0x410/0x410 [ 2410.666446] do_vfs_ioctl+0xd5f/0x1380 [ 2410.670370] ? selinux_file_ioctl+0x46f/0x5e0 [ 2410.674907] ? selinux_file_ioctl+0x125/0x5e0 [ 2410.679434] ? ioctl_preallocate+0x210/0x210 [ 2410.683861] ? selinux_file_mprotect+0x620/0x620 [ 2410.688635] ? iterate_fd+0x360/0x360 [ 2410.692455] ? do_sys_open+0x31d/0x550 [ 2410.696496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100001c014000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.702066] ? security_file_ioctl+0x8d/0xc0 [ 2410.706509] ksys_ioctl+0xab/0xd0 [ 2410.710013] __x64_sys_ioctl+0x73/0xb0 [ 2410.713936] do_syscall_64+0xfd/0x620 [ 2410.717759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.722950] RIP: 0033:0x45a6b7 [ 2410.726168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.745108] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2410.752858] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2410.760153] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2410.767460] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2410.774744] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2410.782052] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:11 executing program 4 (fault-call:3 fault-nth:12): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='pids.max\x00', 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000080044000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:11 executing program 2: r0 = open(0x0, 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2411.149702] FAULT_INJECTION: forcing a failure. [ 2411.149702] name failslab, interval 1, probability 0, space 0, times 0 [ 2411.161519] CPU: 1 PID: 23094 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2411.169350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.178722] Call Trace: [ 2411.181343] dump_stack+0x197/0x210 [ 2411.185009] should_fail.cold+0xa/0x1b [ 2411.188913] ? is_bpf_text_address+0xd3/0x170 [ 2411.193438] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:03:11 executing program 2: r0 = open(0x0, 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2411.198628] ? __kernel_text_address+0xd/0x40 [ 2411.203173] ? unwind_get_return_address+0x61/0xa0 [ 2411.208136] __should_failslab+0x121/0x190 [ 2411.212392] should_failslab+0x9/0x14 [ 2411.216223] kmem_cache_alloc+0x47/0x700 [ 2411.220315] ? save_stack+0xa9/0xd0 [ 2411.223972] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2411.229629] idr_get_free+0x527/0xa28 [ 2411.233467] idr_alloc_u32+0x1d6/0x390 [ 2411.237381] ? __fprop_inc_percpu_max+0x230/0x230 [ 2411.242240] ? __lock_is_held+0xb6/0x140 [ 2411.246317] ? should_fail+0x14d/0x85c 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x7, 0x7, 0x1, 0x0, 0x80, 0x9, 0xc2, 0x3, 0x3, 0x2, 0x5}, 0xb) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2411.250226] ? __lock_is_held+0xb6/0x140 [ 2411.254311] idr_alloc_cyclic+0x132/0x270 [ 2411.258480] ? idr_alloc+0x150/0x150 [ 2411.262208] ? kasan_check_write+0x14/0x20 [ 2411.266456] ? do_raw_spin_lock+0xc8/0x240 [ 2411.270717] __kernfs_new_node+0x171/0x680 [ 2411.274981] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2411.279760] ? __lock_acquire+0x6ee/0x49c0 [ 2411.284017] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2411.288540] ? __schedule+0x1495/0x1dc0 [ 2411.292532] ? __lock_is_held+0xb6/0x140 [ 2411.296625] kernfs_new_node+0x99/0x130 [ 2411.300627] kernfs_create_dir_ns+0x52/0x160 [ 2411.305075] internal_create_group+0x1cb/0xc30 [ 2411.309685] ? bd_set_size+0x89/0xb0 [ 2411.313422] ? remove_files.isra.0+0x190/0x190 [ 2411.318048] sysfs_create_group+0x20/0x30 [ 2411.322229] lo_ioctl+0xf8f/0x20e0 [ 2411.325803] ? lo_rw_aio+0x1470/0x1470 [ 2411.329720] blkdev_ioctl+0xc38/0x1ab6 [ 2411.333645] ? blkpg_ioctl+0xa90/0xa90 [ 2411.337556] ? find_held_lock+0x35/0x130 [ 2411.341637] ? debug_check_no_obj_freed+0x200/0x464 [ 2411.346685] ? __fget+0x340/0x540 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000064000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2411.350172] block_ioctl+0xee/0x130 [ 2411.353829] ? blkdev_fallocate+0x410/0x410 [ 2411.358169] do_vfs_ioctl+0xd5f/0x1380 [ 2411.362077] ? selinux_file_ioctl+0x46f/0x5e0 [ 2411.366590] ? selinux_file_ioctl+0x125/0x5e0 [ 2411.371105] ? ioctl_preallocate+0x210/0x210 [ 2411.375531] ? selinux_file_mprotect+0x620/0x620 [ 2411.380325] ? iterate_fd+0x360/0x360 [ 2411.384145] ? do_sys_open+0x31d/0x550 [ 2411.388055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2411.393617] ? security_file_ioctl+0x8d/0xc0 [ 2411.398057] ksys_ioctl+0xab/0xd0 [ 2411.401541] __x64_sys_ioctl+0x73/0xb0 [ 2411.405455] do_syscall_64+0xfd/0x620 [ 2411.409281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.414488] RIP: 0033:0x45a6b7 [ 2411.417690] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2411.436917] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000011c4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2411.444650] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2411.451945] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2411.459233] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2411.466530] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2411.473826] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:12 executing program 4 (fault-call:3 fault-nth:13): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000000)) ioctl$TIOCCONS(r1, 0x541d) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x400, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x40000, r4}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r7, 0xc00c642d, &(0x7f0000000180)={r8, 0x0, r4}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x401c5820, &(0x7f0000000200)={0x4, 0x44, 0x3, 0x7fff, 0xffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_int(r10, 0x29, 0x49, &(0x7f0000000040), &(0x7f0000000080)=0x4) dup2(r10, r1) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000004804000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2411.784172] FAULT_INJECTION: forcing a failure. [ 2411.784172] name failslab, interval 1, probability 0, space 0, times 0 23:03:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/147) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101200, 0x0) ioctl$TIOCCONS(r5, 0x541d) [ 2411.858118] CPU: 0 PID: 23230 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2411.865985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.875366] Call Trace: [ 2411.877983] dump_stack+0x197/0x210 [ 2411.881626] should_fail.cold+0xa/0x1b [ 2411.885534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2411.890676] ? lock_downgrade+0x880/0x880 [ 2411.894862] __should_failslab+0x121/0x190 [ 2411.899121] should_failslab+0x9/0x14 [ 2411.902946] kmem_cache_alloc+0x2ae/0x700 [ 2411.907129] ? lock_downgrade+0x880/0x880 [ 2411.911303] __kernfs_new_node+0xef/0x680 [ 2411.915560] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2411.920347] ? wait_for_completion+0x440/0x440 [ 2411.924971] ? mutex_unlock+0xd/0x10 [ 2411.928701] ? kernfs_activate+0x192/0x1f0 [ 2411.932994] kernfs_new_node+0x99/0x130 [ 2411.937015] __kernfs_create_file+0x51/0x33b [ 2411.941469] sysfs_add_file_mode_ns+0x222/0x560 [ 2411.946174] internal_create_group+0x383/0xc30 [ 2411.950785] ? bd_set_size+0x89/0xb0 [ 2411.954538] ? remove_files.isra.0+0x190/0x190 [ 2411.959150] sysfs_create_group+0x20/0x30 [ 2411.963323] lo_ioctl+0xf8f/0x20e0 [ 2411.966896] ? lo_rw_aio+0x1470/0x1470 [ 2411.970814] blkdev_ioctl+0xc38/0x1ab6 [ 2411.974724] ? blkpg_ioctl+0xa90/0xa90 [ 2411.978635] ? find_held_lock+0x35/0x130 [ 2411.982731] ? debug_check_no_obj_freed+0x200/0x464 [ 2411.987873] ? __fget+0x340/0x540 [ 2411.991365] block_ioctl+0xee/0x130 [ 2411.995015] ? blkdev_fallocate+0x410/0x410 [ 2411.999521] do_vfs_ioctl+0xd5f/0x1380 [ 2412.003451] ? selinux_file_ioctl+0x46f/0x5e0 [ 2412.007976] ? selinux_file_ioctl+0x125/0x5e0 [ 2412.012675] ? ioctl_preallocate+0x210/0x210 [ 2412.017229] ? selinux_file_mprotect+0x620/0x620 [ 2412.022010] ? iterate_fd+0x360/0x360 [ 2412.025828] ? do_sys_open+0x31d/0x550 [ 2412.029754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.035315] ? security_file_ioctl+0x8d/0xc0 [ 2412.039742] ksys_ioctl+0xab/0xd0 [ 2412.043219] __x64_sys_ioctl+0x73/0xb0 [ 2412.047130] do_syscall_64+0xfd/0x620 [ 2412.050962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.056163] RIP: 0033:0x45a6b7 [ 2412.059367] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2412.078285] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2412.086020] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2412.093313] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2412.100605] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000fdef4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000effd4000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000024000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000044000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2412.107897] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2412.115190] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:13 executing program 4 (fault-call:3 fault-nth:14): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x8) sendmmsg$inet(r2, &(0x7f00000000c0), 0x0, 0x10) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r4}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) ftruncate(r3, 0xc9ea) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2412.398965] FAULT_INJECTION: forcing a failure. [ 2412.398965] name failslab, interval 1, probability 0, space 0, times 0 23:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000064000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2412.450253] CPU: 1 PID: 23276 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2412.458116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.467596] Call Trace: [ 2412.470211] dump_stack+0x197/0x210 [ 2412.473967] should_fail.cold+0xa/0x1b [ 2412.477891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2412.483032] ? lock_downgrade+0x880/0x880 [ 2412.487219] __should_failslab+0x121/0x190 [ 2412.491492] should_failslab+0x9/0x14 [ 2412.495436] kmem_cache_alloc+0x2ae/0x700 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004002000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2412.499618] ? lock_downgrade+0x880/0x880 [ 2412.503794] __kernfs_new_node+0xef/0x680 [ 2412.507969] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2412.512761] ? wait_for_completion+0x440/0x440 [ 2412.518159] ? mutex_unlock+0xd/0x10 [ 2412.521892] ? kernfs_activate+0x192/0x1f0 [ 2412.526157] kernfs_new_node+0x99/0x130 [ 2412.530166] __kernfs_create_file+0x51/0x33b [ 2412.534606] sysfs_add_file_mode_ns+0x222/0x560 [ 2412.539599] internal_create_group+0x383/0xc30 [ 2412.544208] ? bd_set_size+0x89/0xb0 [ 2412.547966] ? remove_files.isra.0+0x190/0x190 [ 2412.552600] sysfs_create_group+0x20/0x30 [ 2412.556865] lo_ioctl+0xf8f/0x20e0 [ 2412.560429] ? lo_rw_aio+0x1470/0x1470 [ 2412.564608] blkdev_ioctl+0xc38/0x1ab6 [ 2412.568696] ? blkpg_ioctl+0xa90/0xa90 [ 2412.572607] ? find_held_lock+0x35/0x130 [ 2412.577044] ? debug_check_no_obj_freed+0x200/0x464 [ 2412.582094] ? __fget+0x340/0x540 [ 2412.585977] block_ioctl+0xee/0x130 [ 2412.589612] ? blkdev_fallocate+0x410/0x410 [ 2412.593927] do_vfs_ioctl+0xd5f/0x1380 [ 2412.597819] ? selinux_file_ioctl+0x46f/0x5e0 [ 2412.602301] ? selinux_file_ioctl+0x125/0x5e0 [ 2412.606814] ? ioctl_preallocate+0x210/0x210 [ 2412.611214] ? selinux_file_mprotect+0x620/0x620 [ 2412.616400] ? iterate_fd+0x360/0x360 [ 2412.620443] ? do_sys_open+0x31d/0x550 [ 2412.624599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.630244] ? security_file_ioctl+0x8d/0xc0 [ 2412.634655] ksys_ioctl+0xab/0xd0 [ 2412.638125] __x64_sys_ioctl+0x73/0xb0 [ 2412.642009] do_syscall_64+0xfd/0x620 [ 2412.647487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.652672] RIP: 0033:0x45a6b7 [ 2412.655863] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2412.680397] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2412.688273] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2412.696404] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2412.704571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2412.711862] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2412.719450] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:13 executing program 4 (fault-call:3 fault-nth:15): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004003000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000000)={0x3, 0xffffffffffffffff, 0x3}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) dup2(r6, r5) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x3c, r9, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x02\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r7, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r9, 0x0, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x240ec865}, 0x40000) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2413.006157] FAULT_INJECTION: forcing a failure. [ 2413.006157] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.030179] CPU: 1 PID: 23305 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2413.038034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2413.047408] Call Trace: [ 2413.050393] dump_stack+0x197/0x210 23:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06763f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004004000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.054136] should_fail.cold+0xa/0x1b [ 2413.058050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2413.063365] ? lock_downgrade+0x880/0x880 [ 2413.067564] __should_failslab+0x121/0x190 [ 2413.071933] should_failslab+0x9/0x14 [ 2413.076916] kmem_cache_alloc+0x2ae/0x700 [ 2413.081095] ? lock_downgrade+0x880/0x880 [ 2413.085394] __kernfs_new_node+0xef/0x680 [ 2413.090144] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2413.094943] ? wait_for_completion+0x440/0x440 [ 2413.099570] ? mutex_unlock+0xd/0x10 [ 2413.103323] ? kernfs_activate+0x192/0x1f0 [ 2413.107825] kernfs_new_node+0x99/0x130 [ 2413.111847] __kernfs_create_file+0x51/0x33b [ 2413.116428] sysfs_add_file_mode_ns+0x222/0x560 [ 2413.121147] internal_create_group+0x383/0xc30 [ 2413.125763] ? bd_set_size+0x89/0xb0 [ 2413.129630] ? remove_files.isra.0+0x190/0x190 [ 2413.134345] sysfs_create_group+0x20/0x30 [ 2413.138529] lo_ioctl+0xf8f/0x20e0 [ 2413.142117] ? lo_rw_aio+0x1470/0x1470 [ 2413.146033] blkdev_ioctl+0xc38/0x1ab6 [ 2413.150035] ? blkpg_ioctl+0xa90/0xa90 23:03:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004005000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.154010] ? find_held_lock+0x35/0x130 [ 2413.158108] ? debug_check_no_obj_freed+0x200/0x464 [ 2413.163165] ? __fget+0x340/0x540 [ 2413.166647] block_ioctl+0xee/0x130 [ 2413.170291] ? blkdev_fallocate+0x410/0x410 [ 2413.174636] do_vfs_ioctl+0xd5f/0x1380 [ 2413.178555] ? selinux_file_ioctl+0x46f/0x5e0 [ 2413.183069] ? selinux_file_ioctl+0x125/0x5e0 [ 2413.187594] ? ioctl_preallocate+0x210/0x210 [ 2413.192045] ? selinux_file_mprotect+0x620/0x620 [ 2413.196937] ? iterate_fd+0x360/0x360 [ 2413.200775] ? do_sys_open+0x31d/0x550 [ 2413.204693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2413.210256] ? security_file_ioctl+0x8d/0xc0 [ 2413.214700] ksys_ioctl+0xab/0xd0 [ 2413.218180] __x64_sys_ioctl+0x73/0xb0 [ 2413.222103] do_syscall_64+0xfd/0x620 [ 2413.225929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.231146] RIP: 0033:0x45a6b7 [ 2413.234354] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:03:14 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004006000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.253362] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2413.261092] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2413.268384] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2413.275677] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2413.282967] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2413.290263] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:14 executing program 4 (fault-call:3 fault-nth:16): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:14 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100000000401c010040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.512858] FAULT_INJECTION: forcing a failure. [ 2413.512858] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.515514] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2413.531447] CPU: 0 PID: 23535 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2413.539442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2413.548823] Call Trace: [ 2413.551456] dump_stack+0x197/0x210 [ 2413.555114] should_fail.cold+0xa/0x1b 23:03:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:14 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000030040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.559038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2413.564181] ? lock_downgrade+0x880/0x880 [ 2413.568422] __should_failslab+0x121/0x190 [ 2413.572694] should_failslab+0x9/0x14 [ 2413.576514] kmem_cache_alloc+0x2ae/0x700 [ 2413.580780] ? lock_downgrade+0x880/0x880 [ 2413.585047] __kernfs_new_node+0xef/0x680 [ 2413.589223] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2413.594018] ? wait_for_completion+0x440/0x440 [ 2413.598661] ? mutex_unlock+0xd/0x10 [ 2413.602400] ? kernfs_activate+0x192/0x1f0 [ 2413.606664] kernfs_new_node+0x99/0x130 [ 2413.610671] __kernfs_create_file+0x51/0x33b [ 2413.615107] sysfs_add_file_mode_ns+0x222/0x560 [ 2413.619814] internal_create_group+0x383/0xc30 [ 2413.624426] ? bd_set_size+0x89/0xb0 [ 2413.628165] ? remove_files.isra.0+0x190/0x190 [ 2413.632763] sysfs_create_group+0x20/0x30 [ 2413.636933] lo_ioctl+0xf8f/0x20e0 [ 2413.642234] ? lo_rw_aio+0x1470/0x1470 [ 2413.646141] blkdev_ioctl+0xc38/0x1ab6 [ 2413.650045] ? blkpg_ioctl+0xa90/0xa90 [ 2413.653953] ? find_held_lock+0x35/0x130 [ 2413.653972] ? debug_check_no_obj_freed+0x200/0x464 23:03:14 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004080040040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2413.653991] ? __fget+0x340/0x540 [ 2413.654012] block_ioctl+0xee/0x130 [ 2413.654028] ? blkdev_fallocate+0x410/0x410 [ 2413.663205] do_vfs_ioctl+0xd5f/0x1380 [ 2413.663223] ? selinux_file_ioctl+0x46f/0x5e0 [ 2413.663234] ? selinux_file_ioctl+0x125/0x5e0 [ 2413.663248] ? ioctl_preallocate+0x210/0x210 [ 2413.663260] ? selinux_file_mprotect+0x620/0x620 [ 2413.663282] ? iterate_fd+0x360/0x360 [ 2413.700478] ? do_sys_open+0x31d/0x550 [ 2413.704362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2413.710036] ? security_file_ioctl+0x8d/0xc0 [ 2413.714461] ksys_ioctl+0xab/0xd0 [ 2413.717917] __x64_sys_ioctl+0x73/0xb0 [ 2413.721806] do_syscall_64+0xfd/0x620 [ 2413.725602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.730788] RIP: 0033:0x45a6b7 [ 2413.733977] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2413.752869] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:03:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2413.760570] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2413.767842] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2413.775123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2413.782765] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2413.790120] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 [ 2413.842110] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 23:03:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:14 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000050040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TIOCCONS(r2, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) getresuid(0x0, &(0x7f0000000200)=0x0, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000200ee2afbf9bc12092bf41890dae9281c2f521d09ce5ecafdca0ac7277aac8a946059ef05773d74985e0bbb9992f56fa6d19ff6c077", @ANYBLOB="0200", @ANYRES32, @ANYRES32=r8, @ANYRES32=r10, @ANYBLOB, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="040002000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32=r11, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x14, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r14, 0xb704, &(0x7f0000000240)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x200, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r11}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2436}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r15}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@hash='hash'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:14 executing program 4 (fault-call:3 fault-nth:17): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2414.123921] kauditd_printk_skb: 8 callbacks suppressed [ 2414.123935] audit: type=1800 audit(1576105394.876:730): pid=23564 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=3210 res=0 23:03:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg$nfc_llcp(r7, &(0x7f0000007540)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x5, 0x80, 0x2, "2c6db71151659c0b519e1e6748b39e638dcd526e9d00be2d90c5959451612f6ec541536e2da73a317158c8304e9ec054ccaf7e478cfc89daf1bbd027f4563b", 0x30}, 0x60, &(0x7f00000023c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="8373a41ee5b72dca0a8ebd09810e61e1d613e280074332c04d290fa0dd3a5e49a3340e870d0ba00a553ce49534eb75984cde0181aecda7f3045ee0ae1cd4eb6db4972fec867bc54af0034bb1f4e77952bce03db68f463b3537eb0c4a4c030513375f366b3e7cf6870d2606604cceeffe32a2317d7f345d1fff2aa3f977c321ecdfeac8dbaf3477215ca111e82c5bf4886dba69afbe93d05912ef8bf8f71cc8c384c79467ceb287b6cc9c873cdad08a539b8f9f229b89654029363806e6461862bc19fc5b5ce794", 0xc7}, {&(0x7f0000000340)="11941b0d77a7c9ca6bcaa680daef3377cba18bf064953e3ef6db765b14448577e11ee2bfd0b4279e7c54708ce864c6d2c492e05eb9153376621079ebe088e0baf86bd2c72e26bc6985070e64a437b882d60c6562611ea4b7d14929c0b86f399ca1b566bdb159e2bb01be7c713285e8c79f8af8a8fa9440e87dbaf6096b142c0aa57e9a3ad33a08d20a3b13b88664e25cdc63adb5378240d1f8b7283d3c04679faa684d58b46708e423c29dc9a19f9918ee2186b892edc8324813122c870df3bdf421fe9bd01d198863b5e379d1a15c91f6b825e5fe2e123fe694caba69a1da1d4e24c7f258f97d043b2931110462b6234e420317a5e7c90984b0822f994fea6d3c1ef70bef92d3b4f4c8b6cacad42f9f35c5c2761a2733ff4d7268e6dc3f26453e1b70ff09605c3f74159a670bbd7f2933e6099408066dd98ca0daaf6e93909616a4f12d099bdfc7a3cfc78b3d4525ec0b978a3a0fe1c41ff653597c02a4f6e6129ba2f9b4c34d137d139d97ee60aa6a0df97d970b50193688b13dc3fe2e0fc2b85a5b1f9c51cf22787ca64635ce2749590e2bbf0256aeadf0f0f3408391f3a0665e720e970e962351fffb5afe8a2e763f88a3aba1589c176b31cd3dd4f7dc7dae230dfc51dfccc9b4f6e1b9208b6bd36c11f5ea0884b44874e931a9c4c1a5a742eaa09e38bb0e50f676da06f0a08de6689b27cd068f59b3707aa527991189bd849b11f316d88afa8703e4e04f99798d66b3e119f7ce7d9c8fa4fd2eec277641886121b6fe88e29dae0c06393fef2eb13e363839c28e27f1a742c7211ed75a06650eb693e7a3960dfb282a3fef97cac99cfceb098fc5b4dc22ffb75c42517f368127a401e1d8ab30ea9dd4346b351bc1879d8c078ff30144eef46eb1db73d78b89f0b84e4b32ee968bf83d2528c401d45498b81434d0c73233f26886ce168820b42cd659e5bfbf34b4ff5497783c13caaccbc0d42d3bc6676c7ac0b3ca3726cf2ca646550484149dd6e8a200c3bcbe7b07a6cb079091c84a83aa004ccd4c961051064cc9241157bf8487a2b70ea61e810befa0d721798c07071eb4170a583f384fb5f3dc350f737c750d4447c7322977de0b54a3e1de0ad20e99306bed42566eaf644eb1361156e051731dced048b96cf9ae471fe511c7c93179c76fdb190c7cd6052890324092631ad854cb84d4fba94869255b7bb1ad1abd7e58c38fd90406e79408db9c627aa9a4d9ca823072f0b4fb439ebe2915d7f9a35283b073927a5addf89d9567eb327559885c7a6f5b9d0b719384c054b80b7b3665a8abb9b85a177946c5c2b014976b02fa7da6ccf40393b73f66e53baadfb5870d7b573c6f2225654fc575977a4e437a0912ae1475a234c8aa3d51a61eba9c4e13aba02fd37f77d563c5685860b441c62af0361af595ef1f7dc64f1fd3be47af77c82548024684df7efe37e5b79cdd070378b2a139cf7fc1f3609534d126dead434a193ea3b0d79aec07a583ada8bec9ef5250f75916c280a54f5736ea5acbca821de28f75f0fb57994c7fdbf361bd3f0c7fb80f69007417fdd32f1f8bf303dec0ffeddd0d9280455a5c3b3405ab341da15ea75c08676bbac8adffaa1afe094da107b6a9a6b379151cfa9d460cb28605aa8cc2a0a144b890153160248fddd9b721aa7a52c961021928266c64eac507a460a597428482f7146450558865f0ba6ab957bff74b2a85bb5b4048bee6dbc9525c42e78c5830a9c3f256546898bf3c38e9bbed22ec002b2481f8888495b445958b38d36530a7d40f8e78fa382092e7332fb1bf4ca2154a1bf5d7ab0ede077246040f40625bccf34fa0522b72ab1e0958c7b743e9c808fb2507486519496ffcc650440ed6fc1eb87e66f398374bf72c68c93b209c8d6968c9cc6e73688da9de536c3a2b88adf7fbebf7716ef867fb69dbf3248a104fa1502a0ada093e920869102307c7200785708b99fd3d1a3ed8b9ce4e0d4ceab37716cf0879e31100fa507d6b6fd7ff6213ac275c3cdfaf0ed5e4ffcd1a67dcac1e1abeb9a563a0b7f3f8b10ced2e4f4d72aa6b3f84a21d12058385fc243471478b698b1d40ecb7020e9593353b8731e7ff26c8591a6a5d95e07e1cd60db57907b20ea16088bd3f9b0e19c594632a49c0f772bea8414d418f10ebab3d37f28cbf48201bd551280ecf8b95e2b0d57db35036cd8981db1255ee948f80c25b4caf848132421416eaa6c1ef99136a76cbb88cfdd1a56359ef84d3e5bd1072f173e15673f41b43ce4cf8eb8cbe5659005516327d89e58f1c8d4626d558561b92822dcf31d779e92e56259545026c54a5c6c3dfce62438aa00fda6571b6ad5b3c466bd0df1f5d933f81ebc2fca1a8219e04a50076f7bb1e5fafcd6bccc5d39a4dff4def5e6a4674dc17d311cb15f17e8529d1dc21351892e8c4ef93bad1b9b1faca3ce1ceb704c87ab8a7c9462224e4a4813dd9b24532381cea06b60c5b369bece52ee5611543c3f76177101be529a898ad57bebf4323d2c1ac4d1d75c63a6f0fb5f3aac2109be515a5370796b54c51d57a760eb75d856b2ad98dff8af64e3970ccc9ded5f229cac999f930b7e7ebc2aae7a4e02e442499687e8265fe2782ce5899b7b9b821529debdd8438197b49494656a4892a8382933e066d8bd2bfed07194df82c7c987fbc3b2a6c4e991c5c655bf5ddf9c28177cc15a102449e9eca24988f8eccdaf46a8cf0b95849623806f16913428a885d86502b76cce3ee656be4413b920f6840c42992c83d77491f320dc5d6ac44ea4961b8e2d57ece7aa60915089579722c4b40f29b2757f7fdcaf5c0791ad1c1525951020595f77f82157032308e34b4ef824eac1c2eea010789c7a673eb48429288717fa2a66f4cf51bb24310745976d87efcc9366163401527d2289d5e0366552e4f208732b73c8a1cb1708647c10278427ac557e2dc9c941e2c8ac1a2b4c8049d4c4335272fd9afd3bdf87824ee56eed0a5ac56a81a917ec3bce5f9a159ae2c76ca93ea2c6d9524c5b9813bd316ecaa4659d4bc4dd6f920b470c285cd9d2ff9061a5ace901900dd19deb8b20b795e2b05968db6bc63f2ddb20941ef511c8b9d8057c37b748c3d0772aaf8644b69b67ea4a1549d236158a145bf6b3a586d0f994dd0e0b7d9ef12d0a03ac48ff3a5de1b6433900f076ac4d1e7fbafdccc7547d570d6e001768dc8adaa263106e4ebb1e1afec9083f157f4212b360f36d68eabacaba1ae5cea99b7c6da2414a6c0daa6acd8fc4e9675b73a62e699386de1517babf111e48d25f51e12ced8ccf2da40d11e5af6cad92ffbfe5fae0055f1c3207447ab7b97af5e99e8f8cbb9186ff08715dd476143a5ac374bbfd87c56a5d0e2ae9912a36658a4c68f58b933cb9bed4c1cbfc85cdf392234034a70168efbb2e2cd4a2fb184ad494c60ef6fede08e4eab722223d1e4f4c7c1d0e8c8dc889f56eba8a3509eff0c3921611a608061daa70bd4adef1e42a000ada6b951bbf14e09d5943a0137df5a0aaf34188f4dd8b83284eaa8180a0b0a2328882e2d0696b96ded686093304832114c09629b0b933f6b98503b40fcc69a59c0ef00b49c9044496e740e6700180750d446598c0f784ac9e6f6eb70d534769961e3d6f9e8eaea5205c5f00e91df23154432e16cfca2cde6547ec6ece3ac0ce51df3e8078f52e7c49b922b6f5cfc5fd0af7e14d0e031e3267810f6955797c59a60a072bf722d03b732199d4fc703ea14f82d66711b8ccbff46bb2d96dbd9c8bce5dbb62ae1d12a9e53a24a0fe8e412f15fbe20fce19cd5bcb45a10c4f5096689e6e07e1cf9af834316b0106e67060b23a170a4a5c154ad8eadda7948fcf5a727caa025d6467a033455374a7783096f0d95d16b72d2f7c465f57fda93d5f42c3104cfe98851d2a655627ef0c273d89c242305a10de5b8a133cc186df620e705950429bb6bdcfbe45bf736d09303783b2697c762abad01dbae00ed18afbb9d3c68a9758c19f749d0b7d87f44bc508c0d65ab328310bd78dd9031202a239fa0e78eda1619dc1bd86f422d2aee9dcde52299aecb9d0f399637d3757c4218ffe0edb7c4d1a94adf170872d225bb9743b3825f51277b96d418edde5edff29a9d5e79a14f5b1300aa886e1c7af2ac3e7a69ffbddaf7aa8ff7d4ab6a7072fc41dac2140df0be6d2051d360f630fb058c5ba567ff72deac3734699f0a58f4f771b20cb2436f604920fb66248f3d46ec1caf55996eb6225958a2e16750501500a757bd2ba311e0428200cea9a6333fae8b17833e7891f43ed769e02051c784a2c1a667a05df40bce7d96850e8cdc70680cf52d2026f71e8a3ccdb7a2ef2fa426eed5a478e8cd50191d9cfb0ab0423aef508f16a8eb9dc105d9f2af7c55a280984ec85baf35edda5f8aa677e5caf891b35b6cd1b133973cb125705a430893696aeb63673fe288ae803a9f7ee0a64784e342300630c1fd1e5db9c22ae1ee68bd9590ccba4ce34228206380be6bf2a44eee8379c173bed431c710a2776fc39b41de8feb874e1db0c3ff39e1df9846fd9be1593d3a92c48c048f4e5235f9d90727915d24213fc7a0e49d1e653721d124f644bf749c21ab70d5d264adc6656a4a6bddc7f677117f496d4d3a29cd80bbf29b25e98b69af8a6231dc231fd68a5e014304a4947e0d24590f103886ec233701d7f309c8b28b41ce98b18fd24314bb6755b965029d55ebc71df5d0b6d1ebf8277a1ca9f845b10eba38c2ec156161ff301ccec444bb47acba864a57ab9805dfd492430b27647fd23b8fe7444248abb2e36687d4427167b65d53a88e2055b63a3e63fc6e639f8ed6aaeb5a2d3b7a2ce09360339ee06c6fd9378937540393e1b96ead7ae51cd91ff815c639dedc5e4e9c13ce728d23604f4dd4ed0ee3e812ba9ded8adeab750e20fce84ed239d019b20ec23fb3e1392bf15795364f6e665aa7ccfec2bfd510a68091ee1c7b713752167fb11790e21dee3e700684d67ced1be3e05cf6a95831f635ec76f4fd450fd537f02deedcffab9f77a049cf522ef67fcdbb5a07d05f49fc7e7f02064744a125f77c2cf949a5157af5fba117b9acf6f7d25102537268ba9c0b0c0e207698b11d213c0d2821736723e9c3eefcbac3babe07943fdea8e5488234d8a0f95db337cbe9cc647654ea73c8c274de090d7eca51d588224b727d0262985fd4e78f7546c344e5de6452d212dc885b27c409f629462b6f1a82b1c2b589570d9b3d632a0480e8833a06fb4241cc0f0dd37550e055c128472dc729df5fd594e68a86137e3e2b1a4d0658764213b4f0a9ab698971b8b0bffa92a582e3e86aedef75f2f012984748108a94538b8f5d8ac3b90f80fc30a245bace9f9b0aa391ac12a1ce9479f35cde7f213b8695df7f13e6af762ede24a71b358b0e471a393e6303a5d91da463f059d4e2eb64f48188c41e649f24ac7cc2f71c7270b8bd41372566d1737c66735c611dbddf1b68e0cc1b55795c5ba06532d814d73311acdc17ae4bf5ca20d99a451d09d843833c6455a68ee8b131e3a05b03eba4577f1c9cfe09900c8f99dfc1de0c3cdddbb1751a574e5f7ccab7454632bb6c5ffa0e4a18c4ea4294eab11e578a465b8be947f57efc361294e5940ec20a5fbc167d1123a6c09f4a9cbbba932801740badb59b6c51c78cf139321434d3f46658b103c6d9e1a18a9b940596c4ece490525bc644635058432579ad47f3a57a00b6bd04797065ae56a089f2ed5c5a7f3e5988402dbf6bf2df8000afb17c8baef9cc0900e7fba3ff7cfc3582affef8d7b6de753ff081", 0x1000}, {&(0x7f0000000200)="f839f44783ff0bbd5797a2c1759b011ab23adf115bff9241a8330352d6ab7fa72beaa7f06a82573cbe1466374c5e15b8924976a16a759d220603b433bd4c53b7f81b48f8175967017710a8a3cc39e2d4a9942ff5d20997d72fe4edfc959792faaba8c63c8fd694300f904f446b1126635c80f3626963686ec994816d766e0188d83f4fad6bdd5f1f853a34cf8f78b3d5d70bf199cb", 0x95}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000002340)="b292cbcf0c9156b13183ab9b54e14565a71e24fdf5c331f2cc92e0d99f9900f2991b80c34b19302999118b4dd82c423080a749bbd3e4be9c8b70b1f4aa8438e4963f765f3cea6bd536914393501ccb5316873c8874ea9e70fec1a6d875cd7d171423340a0c93eed29dee782913fdfc79", 0x70}], 0x6, &(0x7f0000002440)={0xf0, 0x116, 0x4, "f868a8d46d14cf02c2b83852cdc38613b5df442ee28c12b60ea550eb75346868f2e0a8d2582bdffe02b57a8eb7ef35eb04d5d83bcea0558d2dc2d3b3bcdd990a35c5f62207238b3f1f9e585ec27e281b75b46ddfad983bb976550f25cb5d5f65a73d5509da32539b697f4faea7bdd2e3d0843cbe272f469bb9243a8993087237ce62d45725e60c639c3dfbc9bf1672c8729f42de116873dbf71e6261948e04607ead07b922b36e16412999cd0fe97ad8507c78caac7fb733566691da3866a837d717b980b8a2180ac65d805470b68e32a3e49952061a1fe72fbe5c695dec81"}, 0xf0, 0x9000}, {&(0x7f0000002540)={0x27, 0x1, 0x1, 0xa6477f63a78277f6, 0x7, 0x3f, "fd002af1201422e9f826a68301b3527a9c2e929d49863b6fd3b31455cf20918db58c2dc9be7bd9e435b9224a1fa0b79d295e0a6b920922e490ec16faf6493c", 0x12}, 0x60, &(0x7f0000002a00)=[{&(0x7f00000025c0)="efdc26eb4c34bc52c9322da4ab44138206c51dc3f16a276081bec6ddd398071fa6277287ccc2e7e095c51d2754d01348b9426ac6a114a8b6e151725df424d73fddb35855181afdf9fd72b0663d78e84290ef3e686a995bc742251c9699d2e9c448fe7312c15bbef9721b5d4e5bb655fe01495b082020ba20ae0eed7e07bab793d161154e18a87c2f83544ce4d1e92c7986708dec0888d53ae903bca749f25b8ab9e34119c258bbefc2868bfc4f5c666b7d10d023ee9ff71ac8293f93b5d31c90efd6286eb11e9ca54d077f37", 0xcc}, {&(0x7f00000026c0)="eb1e27b02e7126ee66528e855aef9ccab9be018c7633063e8cf9f0f858ed2c57b28f893a18d7337e8f059c7f7d52fe55a84ed8614b2d5ea5ff8d3c547c5a9e363c0541a9e97160ea9c97f714b9b66153b9d2f13b522b595d07085416f1bdd19abc9935de61bdb8c7bcb8d193be7ce1fed51b6cff4860ab4a6eac035896e8344476983b75d67d338fb266dd2048a2f7ee3e51b6ba9bc8d041991c4c004ee9343b6813f6a631e4a52c433531438c94f66f79398bdd647b58ee1df40533d48b6b56", 0xc0}, {&(0x7f0000002780)="202cc0e01b1c716165b558ade14adbe8041bf169078342a22570156034842386f32b949ba938678c330ab382b3ccfc584837cb26760ed449e2e1acbf9979104446defce4c2803e9f0e995784357f4887859db0cac98b7bdbb47bc0b625bb2e44e30b9389c8d27ed9bf90733f7a3deaa0ed8c36c6b9774ef20896c6fe2f8e454bd88c3c4e73c8e88563fb005c5189b7a26f3c87bbe7250b6aaa29", 0x9a}, {&(0x7f0000002840)="e447887d691bead537ec3e0e383cdc715159c394e8cd4fc1e9a148bea9b9722a3b746b6e7df5f790b255158ef4096d013353be27c20a3a8659e49481cb8db679f4046f79ab06ef31c358e229d3e7f053e28f857e72f4cb85c2095358975da73e29bca4517e79230fcf6e676228f963aa34a8e7f03946bdda198f21c8a32d41ef71", 0x81}, {&(0x7f0000002900)="6fb54d3049a95e39be42fe247d829699b48752941c54c5da8ec10881b416586169578646241dc2c7e99c63536ada25925f87791345d48b84e08383fdbcefd5748e268505b28f3782fd6e1b40de9f705d", 0x50}, {&(0x7f0000002980)="788a590ad50fecdaabf84ebac3dc2c2ee082a18d86bd6ae28e1f656eba8aaad8f3c0cf68bd0001c04870b168d0e16275213ab491c49ac6d93f3fe5d3ffb16f5976ce28e496fc65938f01db93db6b1b", 0x4f}], 0x6, &(0x7f0000002a80)={0xb0, 0xff, 0x685, "dc9af61defa991e99240aa0675fda89922f4d61d51f94e382ce0704ce53fc1a50563f73a186ed4e6a481aded186ee73b2abb883d949d11d4785b7d5a96bbedb12ac391bcd2c7fd4b5d3dda42701ebe6d6dd66f40f6af6a6b9a1b7f4128f4b5183ff7e64c95a9ad23f27e67387428c87e5ab496ca4d97516f853181ba3ff3bddcc246a33b2950975354f358e205fb515240a29584a73a40dc8d64cdd8"}, 0xb0, 0x24008880}, {&(0x7f0000002b40)={0x27, 0x1, 0x2, 0x1, 0x0, 0x4, "6e6c59325fdd021585373f90f8360680ab2b019c15680c8450eb956d84c9df923a372bf5a7e7750a3bdfd179a1c8201231d5c32db98eb78c0fd79c60c4ec62", 0x10}, 0x60, &(0x7f0000002d40)=[{&(0x7f0000002bc0)="392f540a1ae187fb235dbeaec4b7d563a9dc8fda9ae37826a711c316d306b1ac57b48aeba529855246ca47a396f2c60438e2a8ba76e6d161bc07b85e702d0197e0c9a7f32f54d4787af721141083b1a1a0bb0871ba3e2fbf7d94134660f6bef29abc49df77a01da52eaf16c45b3d5f91713600d11512a38c7990b6ff2701caf53498101abb24a570dd6d1e7dd607f2f562a7b32777b1a68e73ea95832022faff482444d52adba5f21cd7901354bd00b200491549c75978936d0b95cf6e36c5f60bd42f82b12dbde3bd859882f32f666dc42c06b1dd90d497667b9f90ca35dee16f44e2b3", 0xe4}, {&(0x7f00000002c0)}, {&(0x7f0000002cc0)="e4e7d8203465a54c40125865ba3f4b216e9ef702cf7e760dccdd0f32476153a7528e557bca79c69ba47644ce724c96ea37fdedaa8bd414183606a8c2c80e220da55317af9a8c18730169b22b4a4b63efd8621caac87da0147c9fd86690624a4e4862", 0x62}], 0x3, &(0x7f0000002d80)={0xb8, 0x101, 0x3ff, "d89160f6c37346a51f00abd2ad03a62216c1347965a52dc577d21c0b3d2e79a70a941ef1f84c429bf9918ee8daa0d7d6cd9042981f8863a26e7f5bb2d30fdb77899dbffefba70da29e99740d5b54b16668fdbb944bc27da2d8dba07772f761a10812cd94b0be8ec38fb884f1aa0fe6c2ffeeb2733217484b77c4065967fdc04bea665b982258d3bc5a0ff833457c2fc41e3ff430c87ad3b0526993d912160488028b8f29b726f4"}, 0xb8, 0x4}, {&(0x7f0000002e40)={0x27, 0x0, 0x2, 0x1, 0x40, 0xfe, "7fd0e6d5cc6b71746b674f5062fb50aa3d195eec76ccb978bb9f4a48c4976cb902d773c775c3e1972b718a64df7e7bb836f4913212c40eca63d8850dd85f98", 0x23}, 0x60, &(0x7f00000042c0)=[{&(0x7f0000002ec0)="b9e323f854156a38eac8e525bc5ab8b01cfca25e84f8c14ba186e5f5312eeb5670785f4a96a890353ebe433000510b959ed3302a4e07fc8c992170a09b63161358d7a3cdd8e9c5adc9f37986e67fc781507bbd1da1a6786663502c2521f48e94a5cb277d239f9dc127f07c6967af586633e9abc9456bdec8c06d4e8d85ff86e4", 0x80}, {&(0x7f0000002f40)="c1b867c5483e61ee2f109e18857d4539cc2eed959b564890dbb77009f0b7d740b75635079893010351baf064672c53cd52cdd00e5bd2c086bb76fd0023a436e7f09dfa70779f014953e3af490313e7fccca19ffd45c596011e1d08e05da12951ab04234612be7792600d393d687311c6dc0cdd461f878d8f8790fe7dfb51a7d1e4125bb76d4348d40a6e8686dc297cac321b61babd509962723e2f5b226348", 0x9f}, {&(0x7f0000003000)="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", 0x1000}, {&(0x7f0000004000)="89988936fcbfd2882640d6edcf5c29bfe9e4cbe08d2b477f13ff7f905082350e7819a4646346000fbb1629236b17dce0012ca73422fb4f63c25fa8c1711be8c23042090418f261d76d22b0a67cbcca833c68a02d53932b54681a3f8224c25e2f173f635c8943d2278508f6752461bf5d40d19a2083c046731089481fa1c611becd75940a77a4b757c3fdf8aafa159cf8b8add3f88e3df26988f96f3264bc8292dfc2ad89fdd7250cef12b689c72dfe84941e2e06a8bbcd3ea57b41803492d07aad85e6aabad5abb7b77d", 0xca}, {&(0x7f0000004100)="8be77dd55ae354ec3dcc3763c6310adc0f753f6f1fa37b3d8bcbdfc3bf7cedeec0af6b8aec34905cb37425d2edc0863f4719469c354104b7782b238514b531ce566e9a9018579fa6ff9a7d6838566327a59f2bdd1c5307c6224efe86e2887e3b9293d3dd39da41cb75cd33", 0x6b}, {&(0x7f0000004180)="3163764c5fa639cfd2bc61b13615ccb2c249083df68fa76e30bf4ff4283764cc67d88788cc03b76b2fd5e53464ab10dd6ecbb0d09cf0da4338f36956eb813333", 0x40}, {&(0x7f00000041c0)="43e9882303e79326737edacb5c2e05c7e4ac6828f049b76f41d3af3a58ea558563dded9a6f2e9c59156e4721853a8ab1e1709c2ec9711388ef26718b02836e3c827cb06bcd0fdd69df92edc66f1af5620a7ee450c6a769e4c42be6764b8f40ccf659d2b98c735a6abf70aadf2bf426bccfbbc2bf87cc682abbc9e6776d005c63196c23ed45b257fec69329b249ecbd84930764da3d494d83141f446bdc2706758e44b91552974d9e9d6a6a17b3a9f86ee840fb20278b4361791936eb1393f80743a8530de5994cbd39c338905a909012c5bf37", 0xd3}, {0xfffffffffffffffd}], 0x8, &(0x7f0000004340)={0xe8, 0x1, 0x1, "c78e19de6aef91d81b690e519cc4014771b0cf98f95b1d6448642ba02ef100be49b6953fa77ef3781201ab579fae4bb345162f5826e3e28936dd838dcd4aed8914ee722c093b1847aef660e1d5a720099f468dc8c3c2c8ae7d8987a4aafce8e0f9af008b53b5e5b0742e680026e42e9ac34e4b8b50d023ddf01b36e610e00720d8f3785a3d4c213c8829de2045a4dcc4af07a6b11bb04dd3476919118fb0a94fae7e6f4884a48e37aadb9c00352d5ae7ae8a51f4ed6d243d6c0e6a337d7e8eff408c4b84f71ff93acc9dbe2448b2eef3639e9d"}, 0xe8, 0x409c}, {&(0x7f0000004440)={0x27, 0x1, 0x2, 0x3, 0xb1, 0xf8, "145806caf86683ac0064dfe6b8856a890e4053bf717941632d248e04d65e1ca91beb2beca9dbc084d49c8390d60a1c4c279a4c42dcba15faab597fe5011487", 0x31}, 0x60, &(0x7f0000004580)=[{&(0x7f00000044c0)="bc5da2eb5830417e13c2c7ba5c2fec0c57b1bd9da8f62d598d", 0x19}, {&(0x7f0000004500)="5bcd85d1d4f2387ebc0bd131a861ff6ffa281722e651331e7643a1b7bc7864ebd7c5b48900e4c211ad8df4ecc382c875cb08bab14a77d44e74c6bc1b69ee549b409219ebdd47e15b0c93b4a936de206f71b0d798195761d1574db72a327d8429e0890de39152f3eedbe3242143e84d", 0x6f}], 0x2, &(0x7f00000045c0)={0x70, 0x0, 0xad8, "90494c88297117e66c0490d2d827b446b335656d1396bcd93af44014540cbefae5d41e6ab2bd3d32c2b146ddfc59c4e3f1fedc11f0ba7a327d052308f4795807686ae82aa42945b6901abf95c252d73e80a1e2042c27aa682a23c855"}, 0x70, 0x10040000}, {&(0x7f0000004640)={0x27, 0x1, 0x2, 0x0, 0x2, 0x40, "a4a19ddbefaa18ba0d3f91842d95e7701a163b661399b672351dd2dcff00aebbad6e2d523e781600007a7e3b4945afd960d9a3fb2dedfe2af53cea4ca4576f", 0x3a}, 0x60, &(0x7f00000049c0)=[{&(0x7f00000046c0)="0d995184218cc9eb689b9641bc08e3113705049d0c7325e4a5a831f4343dd260198e65300161015cec903f0f186b4eff632ef241d9594f6cce46c1127cdcf39af1ec41f29c37a7e0606b1093c77db4c3b57be1904d1b9ee8b0c7a8197d806276f17864631dab3e09c229e1aa81a99a17e82ba4eccf758f57e4715220fa0926157b9721d8968203c8e21ca72900d29b05b040d34956d2c1b047aa77e4aa61c0594140", 0xa2}, {&(0x7f0000004780)="3dae5b1e4dfe8f1ab38df75f01412f3e0f2e58eb20321c8c719e69fedea0f0e9c92fa1b24dc7", 0x26}, {&(0x7f00000047c0)="6a7e2e09556c44b699cc3d1eb60299cf6a14b9ba16a96607ee12535300ab19a07c0e81211c36bc7a96009d19462e6b744fad145fb49f82e200b2fcb0e38e447bd2ad987df41f0af260bc23e658a112eeb04511a6ff2db42e5a7717c41f7595ecf94ac505652ae58a62e51ffd3dcd04042ed0c8d9f9fafc8ba3c7401cba88ce9745e2ef8d2cd40c8714efc1bc77a44770b392e324ed9167e535f649821ff6d0a7b3e0fb1a58ed70013c91fcb005c5cfa2ec83654d404d349592ba68a81be6ab7be982a5c4e4aa020799ea35e7ac79012886e1b9e6a6415dec8e9aea3cea8c38b61fba3e155f13c9e47ae01dd094db8c747771e95ddd5320f889", 0xf9}, {&(0x7f00000048c0)="443a1005c9a5d269c6cb94120ee631cc0d5c8328d0a9ffcfec5a996c6002f661e60c12f9fa11e72688f16349c2794806595b33460617cc045fc6862fad31c82f9677791501b40ca01a58401fbeef5d146bf0cdd60000427fed0f3546597456da588dbee5cbaf46c062ad9be28198ef2dc51fef1427439074dec60488858fd21d283209ee50d327386fcfa2fdcab602d734ddcc143a537c41114e60d5737c8a58fd34ac2b82eb97e8c1f9058cc9da9e7b765333a308cc6e614b5a4f715e28213bc01d311da250b1588e1aa68401600129ba98c39e15db6ee7b780e1aae8fa55467a74f7b6eb3b5d9a76f35dfbd53f629256", 0xf1}], 0x4, &(0x7f0000004a00)={0x1010, 0x107, 0x48, "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"}, 0x1010, 0x4004000}, {&(0x7f0000005a40)={0x27, 0x0, 0x2, 0x3, 0xff, 0xfb, "54d9e3bb1b004d90db32cd29e71121ac737cd9784e856a2c268133936a2053584305067bf3cdf5b6251674fdeb6ca4e50a517a4c0943caf4ee77500f8dcb65", 0xc}, 0x60, &(0x7f0000005e40)=[{&(0x7f0000005ac0)="623dbdeadd53cbc7b6fe4bfd357dd9b22b45e5f57eda826aadb1e55b960a657f3d8fab4a52f348a5c8586ff6d0c21916b1d23b561cb33ac90a90af9922792ef8f74982189c5c21d253540d9ed97cf38d1a6b676907af775879775f2ae0a54ac0b031e3351ff05546a8e382e3de0c015f2a2576de38526ad0c450af15313b7533896c1dbdbe1f7d4b578fb3c539b7d690992b9f1e51c7dfb505e316c5f64f791647f40a3d0bc49f55", 0xa8}, {&(0x7f0000005b80)="8b04e8eb07f02400906b60a1d11bca318205", 0x12}, {&(0x7f0000005bc0)="b74f0440c774dd5ff70a76dcc0b4ff731ae842146115abe499b15aaf2980dc0b181c28629bbeed67532dec9b634e8720fe2305852dbc497b35", 0x39}, {&(0x7f0000005c00)="e76d9909e4feca330128b300bc0817f8385ac01c4b64b9a05d4f425257c4bd4f256ad3eb8b40e3f2a917fc57680855afb4017127f8831169eb140480192db81abc5ad6e9f551249274a72cabbd307de5ed", 0x51}, {&(0x7f0000005c80)="24349a136264aaa089bf6eacb06ad11aea6d16a062ceefd600694349b97db9c7e1de9ceec02fd527ace02096fae4f62770ab0761cb47c97ef561c9a2efb633cd86fb3074aceeb200b8bb956a87530acae25798ce7cbc383082022fafdc2e98b7e99632035cc4bb16af5fc7c963d91201627e90", 0x73}, {&(0x7f0000005d00)="6228a22881e59de3aea0fa0a2b3316f5a9b284bf06696a18f9ed1599e4af9e905c94f508b9405f256ce01e34f9b04a08ee4f7c1e2fe5953cca8d573f09f85a77a5f17e6fc0ceac0543a1490c6c7b55550297bbd8096489138d8e453276da4cd0cb1bcba549287c4bec077ff560364bec1d03d35cd54a65da18e625e3efb54ef5667ecd2371820eaad127f8831c", 0x8d}, {&(0x7f0000005dc0)="d9c5126d541798078c30b0e11f77662d2c609fd4bda42a8a1dfc5fcf63957be4389d87e5c4", 0x25}, {&(0x7f0000005e00)="fdf7578c28efe109d49e7f1cd6f15814fba7faac0224140610d30fa5faec1b", 0x1f}], 0x8, 0x0, 0x0, 0x80c2}, {&(0x7f0000005ec0)={0x27, 0x0, 0x0, 0x0, 0x4, 0xfd, "d665383c27d85cc9ac3c5e2778523eb2201317370d18c8e953944100423784402041a89318b4b735767e4662770cceaf90d93bb3d529710574e95d203a8eaa", 0x17}, 0x60, &(0x7f0000007440)=[{&(0x7f0000005f40)="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", 0xfb}, {&(0x7f0000006040)="c92f000d7f01580d0ddf82a63941b2a102bb24ebea3d958fa90b7b38041c81632998e539baa89b1fe212769c415b37e6684d8caa6e8667b497153875391d58a204e388cf9060a48c76637a53551323c394178af00a12de215d324afdc2913e0c73b524e26ed78ef09fffe7680a0b44ce4d93c44c296e85a02ffb04f59e9e790df8ca7b0ffc7b26fb54f3ad6cd96a1e44096a6357113dba463d1d56f67415a9189da506c33c57a424ef5c1a42b47e2982a35ddb0d1f83689d95f7b5f59bf5e16708a50a51fae0c580058b06465d", 0xcd}, {&(0x7f0000006140)="96566758d31a0c215285748754ea524e2d2149cafa832f104c177ef8a647095d41990be9bf16478888744f41d6ab510027066056aa91b710d2ce7079f1165a217fd494fa3fc2a72e72451ca97e950b5edd61e29c3d28f0b6a3c1438851cd05d5f76a9827713fe8bc618ba68f51f991ad64aeaf04b63d36f78dd3c90e9faa23cd8c6203c35e3a94720dba1e2bab25887cbfddd946a0fcd83bfb9c2c3b", 0x9c}, {&(0x7f0000006200)="2d3f28b0c61422a0a77827a75ef051e234c702f892737ee02ef886ff299ef79a6e464c3caccef4b4bfe84f09b698438790dd7b06b5688696aaeef1d27bb92b325ca5c33bd4eda2e4177d1233afac36fbf02b24e0006a4366779b0ba0f2385d028edf4446b02e8f59a0464c8180ae53637a822044348f0bad585050766ca693621e8edfef4c56856bfffaddeadda9c2bd3bd8afe3d0ad322121401e3fe18dc2cebf6df11b7b42d678441fc19f9700aca3dbea588bd815080031fbffee04d7b8bc1bd498b66b", 0xc5}, {&(0x7f0000006300)="5909845e77c5dd42ddda8c6454fe134c7ce76c169041d42d835c137714ac72e8141f1ef81316cc78edfd8c6f83c4b648a2528f60576d5ec78a37e3c9c384358c824777d53157cd72eec524626a6eb04282baefc3e9b927384b8254ad6718da33784331fb3846f7999f52cf1ccc0c72812b2262a25fc9bc061ca8676b11c746a7f4dc39ef950df737a511caa5a9ab7b938317657b3ebaf0054883f0700a6eefe39572a0013f90b16afb595b53432b548aad93f3b95bebcd976de5e67755714a51eb75a647ea814fabffc395a32ba4fba95a5b14209f5cd2456198b3bc025415d0b719f513dad66f29d7657843155b07567dd02607fde77649393152b05ef3222952b76f8743ef2a06ea3c1d62b0ee0e42a271887c04becf3b8477e575236b469cd4f037aded3c92d55589bd6a21a66383bae39098ea2970edf8c19187af466ce5bbe76e39dfec78bca4ec1a8007eb74eb2f438aff26ff5da26a585e4bd4a9576ca30d607e14e24bd49cf9315964a44ed1c14c0c3f9ae36ac4260155927b06a1e58fe5408e4e855138c6fa81ad0b0d9f81a39009743aa4d22577cec190b9cc4b230caabec36b8f9d25cd4b7b82e3894f1ddc1b72c99f362b20b04795082238e01473fc9caa519e725e74e9ec9bdfdb08f440dd47220015b4ab51c2fe6990ce8812276d8fc4ccd557c2708579b32746ba8c6bc3b9e84b37d8fe091cab2871a5b5a79dca51a7b6504bf1cb597586406aa07a79a22ddc2dd7514895c92c6ab9355a0d3d805c6525c77b0a13335ab622568d67dcf22f183baf0b514347a439acf71ea8a37b82289897cd4cd8504c6a9db8469de0bbd6731097a994913da285603941cef5b4a201c404413b7df7bcb34ae7f5d4541024f1bfe910ce31b0714505d68c63f1df452055675c57c2b271d957324f43371f4597fcac4cdc70aac34531419a21c81a663bcb0816c1ea9c312bff6a0eceddfb6ea87d92c8e8a721f9e39bbebcc8610d17ab1096cfca727f64611495b90b36d59ffc740ea58f07dc54fd632683fdd179ccdd30f84d5abc1b67a7140c610c2a8ce8cd7ebcdba04561f68321162a50ff0bc5f879fda1d358656fef53c630623a9183ac9283e8b8d6b2d1cbf88abb8cef20ea175e7c83510c2a6c570eb4dfb46851a0fbc1f80cdca2c6f05d0a38264480d2060aefabd8e2b6bb8aba94b34e9c78c9827f0f0ee0067e2a00ab5dbfe1995450421a633b9e93d1ae9f52746e7ce4407d30a7bf933fc5b2626ce01e9083cac48bbe112d52be6557ee1b92ec695a474681772f4ac5545418543a211fc3170a2ba55824847569f1c98b2acb30a62cca65531a8c3b29aa811a49e805d557d6b2dc3e7a838ac86765e2d87a5d87ea8f7e156e4db28f7a5bf6cbc712df68b57a48f07763ed81c6466b898989600b03a8278edbed0781021dc5287eac217360306db7e84f535d1ce1a8ebc1e4da0c7134066b71d5642ea41d521bed6d912734daa35fd73bd54b05e25da1c34eb1a6017efc693743ea2d1228d4130a94fd2697c70622f8156dd119ba7d611b7a17a4c5c592083abb5141c8aae2fe62e3fc604a5beb66ca7039d05a00ac60f4b14015fe395b3c822c6ff1b583345dfd185888ce7cb9659ce3556e3b9d52f90d198f37acf860bdf4a4fac138a301acfc27c78a0a11fdc3c9aa10c717122ca464bed7d96661f8c6011969bc2d09fa2e6b108a047275217e0755de907c642778d7fc33eccb2b2bc3012f396d9a979915531e8034144d805d5a8ea219ebd11da93da16912b8f9b168360e5f99cda3b7154dcebba1a6257142f417b90f98c3086159aaab8b822e0d692691cde6250489c9e5a47f98c9399514831de5fbfe6e8fd2804f8127e1401179fed3b0e3f094e939f6c0b1d729fe5075351473e37a6ce5ef7bb2a80a88a4f1920ac59429acb900de589e9b2ece15c49ecd33344fe39c02476e5137c290ad957dea7602bcb813d75e32bfa9cad18a297c269a8aec7406905fca55270d6783e50b0698a54d7a184019ea6b24c75ef17933c3fe94a59a1a5abd37b6bc7bd8a68ac64649ba1ea71e9057a50f1c96ba00b648081c7ca45bc1daa8cdbe85f98157b59faeae1572cf42178ae5b71bc47096f0b781135d8b2bffee8730e60ae98e5c9402d58ad8686e40e971e35ec12d2ac32457c05a93d502be6c424018ff62ce708ac45c8052e2b919dd514a5e800362350b4ce3a91b964d8ae76144422c6927474e036135ac5f56f43957e460b837a12a3088dceb54762a5b1e72c356cbb480518c2b633c9576013f95639b9c26083af55bdae25e22b00b54a5c2c232ab0c62d58136733262d86c36b8efb400796c9d340c6cb9bfc1079e15b59aace365aa49cdf460bf11c79d1448199af3c87bbed56ea5dd217369be08f77a5b93010fe98df0f9b4ee15405d507c19bda0341607d6c40c54367f19141e537f8408e5251ad0163c3875780d31288f1fd8c1264753753bbd5282041c5010223c24a475efc7bcd153e45c7bd4952f2dacebaff87015fb8b1f5eade551f07a9ae54e30ba37288e238926702917c0defcedd853ca1d71d7f0ef921a3a10cf46e192b44d7d4b4b2e8df80c7c1d16b52de69f3b80c57741b7a8a5a992044f9730749d77f94e727031529266973c852219e1706b407ef771daf19380421c4c2d3909a1ee0e4728a837485f816baf4447b5941e8a6742ca7546f8ea0453582d6146fc08383f36275aacaead0b3f69a3b29c884eab5a5dbb8fa99943297532f44209f938954d9cd20363c600afa2b69d167709d5d2fa2e2fdeff518fc6e7226423f952c3870fd8f7a7b46c41f7cb393cd228f5b1b143b2b0f6a5f99262d2ff648238b8eeea2de834afd65a47c4ea28529669503b268fc83d4db8360416e3f0216eb08aeae4a16c7449bc855266a76704f90e0af28a5d4c51f228456b9242edce7282b9a5ba96d8c49fc98d8f9e402face0115d6c776c6941bce21e45791fd9a942b51c6ed0218bae059d4bab7a336b6dbdd71ae681d5ba7b9c3355a952c12a1187e18523b0843fe0c6e264b6ef0094fe0547175beb4d8e4a8add4394422b874691d19df663cd93acf2bd94fc4c3a00b784558054ed98f76dc884dd3789f794dfcd0dbafa110225123be035c4a6660aa8f6829f5dd43273a40cf9bea1e20dc466a96a1ccb9804a63b92b3808802f84afbd159b1427787884594dbc0d8fbb68d41dae7dd8f5e95a95dfac4995a51749a9c79cb5253e2b2a8a7091d7c37683853e65b8ee3acce279eb2ca3db2eaf32b234d71eac9478b18b8734b0ec9d989e5c17c224c8d8ffa7083672208647de00a501ff601a19166e1de2c39da86df12a35c80bc024d8210ec5b30fe8d3503a1f5f36ed87062071ec991a1aa91bdaa5960855be858bd68163c0de209bfbd7c1a7cd8ebf083cf5d767ba2b1b8b6d2f6d02a116345e7d9cca96899da7918d54f105f423c737871d8772844d5639a623d8e508997e8f8f3f74d3b0b689f1b1744cfc67cb7f9ae7d263b90f997ec2d74b607c3b238e2ff238d6b1c5a1cdc5458400c92510c1c3d89a732dbcf1b828a9d85dc5b26ab41ce62ea81aeaee3f14388cc1864593fdd633688eabc5139069307c3cf8469dca67204e7a17e84ab0acf1d2bda1ed5695e6464b5a6fd577cb11ccd78d216904747c4ae5056640f6027b750c0a4c22193a418fe3fd3ad21790c1b9ac750e06fd357aff08bbe4f158d0394224bc93af5f3e90d3d7311d929a8e935924be69216621f635a47a98b3edb5d2fe32351c0647e6af34a47c6628dff0b4f2b4fbe084a4a6da92989f44f3f417a45457037ffd6f275a354513912aa55bc975e4f6eea0985f28fe742f902d74a73af46dd71f9be466f02de75cd08b6a79cf4c56a05fad804997fd22eab7b71bf7a51e363b69cc2b87ffa5a0fdbf966e5f91fe89b6c93d8e3deb934ec74c687c1d81786e9bfdc13aa01c2224f82791c7667ce7a12c4ad44274c985d478a10ce8d1a3b58ae2ada2d5f5e45d0d819142391a5c97000399f857ed47b30fcba4d39e93032a4cf711c1161a1f90626d8dea9a43be8904b763103fc7b81a85cd47c0a1b3da676ec3bea7de89ea902d23e67f71eaa7fcc8a831d215081ccb90c9bb08cf4e69b2085770ae0884de8aae66061fe89e926096c09133c87caf88245b749c9af086fcc0c590f27414c0f3b8f6bd27b791c01255813947f93f4c326653e9543a9e2f19bff446258e1f55597050c8ba381db31599f3ef655a69f2c6af4b1daebc0675970dfe6dee5c88868dd49a94d2c29764c47b38dc8ff08a059c7037774d4e0fecf6ff9fbafd04c5c4f92ab15b89ceb5c3b55153a4974fba2f4ba708a8ee1bb917f124ad941653ed6cabf98d884a7bbba8ef16071dd13105e81d33bf57330ffe5fd0a7d938aaba2bc5e2262d88968bb74ceb8812a97c7523003e387d486c29ae7c4b5a8afd070e15fb10a931925b610af45694571a5c6235ba390a351c21302eec8aba6a9598780b4e5826009f22d3e10b314f29b0751274cfb39004b70c2264139e6ad2f2aa7e1a0c93755f2d8c2d6cba3371decc8e27ff03d9bfadf80607f0d3e4dee92098768a03236373e683e2cde753d82925bc57844509d40904a6601b1bf55ab60a274bf9aea7430573edaf60f93a92fe731295372b1f2d298e98fa76fbbbc7fb264ba75abf4aa001622c990785c1edee30434c3dc43928badec030f9aa219c60ff990e4fe806a877941357daf56e91844b245ffbda8f86a144944210c9df2a8fc3395920ab990ae355c592a1fce9976116c6e895cf04a9629604a41d2fab7785e3e42c81553536600f0fd2a6962d77956f4f8bd7abdf995a3e7b2d04b08f394209e0424692b7baab87454b8cc5fc8e4452fd85cfbe4e23dad42dc5d71b583860fac69f320522211dff414fe0fd1845ddf3327226248260bd2fcf4007c419073076ab18128f310d961d79f0afed9c9d00bb35a09355a3fd2e7cb5c24c8fefab58c72e41260ef37fda28fd44f27ba2c5ebf9c2a3fb81d2f2c7a21eee366dca0023f0f737662ae415da41462aba99413d01332f8af38d159e99559cbac82135c63413ce62a1973499e16516ede40f44257bd64a02f1169751b6265019dd72036cff72a7bcd679af1a2b74073ba6e54507f71fb3b36ecd2bd08230a3c57fa8ec89426e2b8cad9ee9c5f4fc64ba67d270ff2c1d239e4bdcfc3ddf4e2ab8fa97cadb1babb32ce873956d11a4ba36c5e3d68657133ae63a63d67711de97439b6d6dd5b6ff1d294ba1e47bbc616fe502b2936ae1ed7ff99f604daf698a18ffcc2c47a342e501587d46ddb3f31880ca346e6870118ce8e0c24b996619c75da8dd3a980732993340fefb8ba48c414096cd8ddf195bdde9a300e9aef826e64b615880d685b89667dca08ef7222053cf7b9869ef98ccb228e63b3fda921de059370eaf683a6da9b9b99e26e099851d386a921c095eebe06b42b7bb6b4d9e97d521f9e969fa3fa31243a19859acc593d5b113180501e01207ded7e5a6c898c46e8e2762bd303e42c71e72a97d3d32bed9ab4b3186dab985ba5950e6b7a4a4c52d6e64996ee1eeb52b7386527563d1f2a5f5be69294f163ffbaf07680a36a1a5e6daf0a51e6649806c6b91c37ec9dcd761394084f4deec7de7a2e8505b5711b1157d04be3a194ec60a014ec496bdbe796cbf85f9a3ed028260d8f44ce027f27e35858ab397aa79f1cf2f738a0634fd5f02ea6ed9c8ec6a302ef2ff4d2f5678ba1727a215c64004226d1ba8330accf778362c5e60d6b47", 0x1000}, {&(0x7f0000007300)="e0132ffa451ef93d74fb161100f77ca4b756c3d70af87e10914ab3c78f5a34a4d0f32141f164adf84fa81c752160a218151ab2b45669becc7ad9caf45f402471dc5749b114ed4820c2edd183902e7496e09cbfb8119eeff291778afbe635dddba9b98480692df6991dc7107caee77e85bf09570a919bba3117da8cedab838b81c8a1da43b9a220c837", 0x89}, {&(0x7f00000073c0)="8b1bdecd228a68235baa8e19db045bd15760d43db28bda400fa709ce0d23d0e374d080a9541d2165043766b8d4f85bd6636726455de4b0275fbd932574750c4bf98c5bf495c89a9f1ccaca50b796149fecda4e7f99359f1181384a2ae47dcaf7fd", 0x61}], 0x7, &(0x7f00000074c0)={0x68, 0x105, 0xffff, "0b82d742c0c8bf5e264571067f258a61419998a3385e4eef6e2bcd2b9c835a82172ace8589c871ed247380d20be33bca27f0228e439489ad6a06066d19d12c99b23200fad326b00a3522ba1fd3558841257ec5bdee7acb"}, 0x68, 0x4000019}], 0x8, 0x4000000) 23:03:15 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000060040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2414.279332] FAULT_INJECTION: forcing a failure. [ 2414.279332] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.298105] CPU: 0 PID: 23579 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2414.305972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.315502] Call Trace: [ 2414.320121] dump_stack+0x197/0x210 [ 2414.323779] should_fail.cold+0xa/0x1b 23:03:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2414.327689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2414.332803] ? lock_downgrade+0x880/0x880 [ 2414.337064] __should_failslab+0x121/0x190 [ 2414.341311] should_failslab+0x9/0x14 [ 2414.345119] kmem_cache_alloc+0x2ae/0x700 [ 2414.349285] ? lock_downgrade+0x880/0x880 [ 2414.353535] __kernfs_new_node+0xef/0x680 [ 2414.357731] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2414.362506] ? wait_for_completion+0x440/0x440 [ 2414.367339] ? mutex_unlock+0xd/0x10 [ 2414.371060] ? kernfs_activate+0x192/0x1f0 [ 2414.375305] kernfs_new_node+0x99/0x130 [ 2414.379513] __kernfs_create_file+0x51/0x33b [ 2414.384080] sysfs_add_file_mode_ns+0x222/0x560 [ 2414.388759] internal_create_group+0x383/0xc30 [ 2414.393337] ? bd_set_size+0x89/0xb0 [ 2414.397074] ? remove_files.isra.0+0x190/0x190 [ 2414.401656] sysfs_create_group+0x20/0x30 [ 2414.405816] lo_ioctl+0xf8f/0x20e0 [ 2414.409366] ? lo_rw_aio+0x1470/0x1470 [ 2414.413254] blkdev_ioctl+0xc38/0x1ab6 [ 2414.417179] ? blkpg_ioctl+0xa90/0xa90 [ 2414.421066] ? find_held_lock+0x35/0x130 [ 2414.425147] ? debug_check_no_obj_freed+0x200/0x464 [ 2414.430190] ? __fget+0x340/0x540 [ 2414.433656] block_ioctl+0xee/0x130 [ 2414.437273] ? blkdev_fallocate+0x410/0x410 [ 2414.441585] do_vfs_ioctl+0xd5f/0x1380 [ 2414.445555] ? selinux_file_ioctl+0x46f/0x5e0 [ 2414.450080] ? selinux_file_ioctl+0x125/0x5e0 [ 2414.454574] ? ioctl_preallocate+0x210/0x210 [ 2414.458984] ? selinux_file_mprotect+0x620/0x620 [ 2414.464634] ? iterate_fd+0x360/0x360 [ 2414.468443] ? do_sys_open+0x31d/0x550 [ 2414.472327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2414.477888] ? security_file_ioctl+0x8d/0xc0 [ 2414.482304] ksys_ioctl+0xab/0xd0 [ 2414.485761] __x64_sys_ioctl+0x73/0xb0 [ 2414.489644] do_syscall_64+0xfd/0x620 [ 2414.493466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.498662] RIP: 0033:0x45a6b7 [ 2414.501879] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2414.521122] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:03:15 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040011c0040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2414.529170] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2414.536445] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2414.544085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2414.551518] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2414.559271] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:15 executing program 4 (fault-call:3 fault-nth:18): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0xfffff233, 0x10001, 0x800}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2414.871130] FAULT_INJECTION: forcing a failure. [ 2414.871130] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.904356] CPU: 0 PID: 23612 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2414.912225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.921633] Call Trace: [ 2414.924342] dump_stack+0x197/0x210 [ 2414.928005] should_fail.cold+0xa/0x1b [ 2414.932102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2414.937222] ? lock_downgrade+0x880/0x880 [ 2414.941386] __should_failslab+0x121/0x190 [ 2414.945646] should_failslab+0x9/0x14 [ 2414.949465] kmem_cache_alloc_trace+0x2cc/0x760 [ 2414.954141] kobject_uevent_env+0x387/0x101f [ 2414.958567] kobject_uevent+0x20/0x26 [ 2414.962390] lo_ioctl+0x100b/0x20e0 [ 2414.966152] ? lo_rw_aio+0x1470/0x1470 [ 2414.970127] blkdev_ioctl+0xc38/0x1ab6 [ 2414.974013] ? blkpg_ioctl+0xa90/0xa90 [ 2414.977895] ? find_held_lock+0x35/0x130 [ 2414.981965] ? debug_check_no_obj_freed+0x200/0x464 [ 2414.986974] ? __fget+0x340/0x540 [ 2414.990433] block_ioctl+0xee/0x130 [ 2414.994045] ? blkdev_fallocate+0x410/0x410 [ 2414.998444] do_vfs_ioctl+0xd5f/0x1380 [ 2415.002319] ? selinux_file_ioctl+0x46f/0x5e0 [ 2415.006803] ? selinux_file_ioctl+0x125/0x5e0 [ 2415.011301] ? ioctl_preallocate+0x210/0x210 [ 2415.015699] ? selinux_file_mprotect+0x620/0x620 [ 2415.020457] ? iterate_fd+0x360/0x360 [ 2415.024257] ? do_sys_open+0x31d/0x550 [ 2415.028159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.033722] ? security_file_ioctl+0x8d/0xc0 [ 2415.038123] ksys_ioctl+0xab/0xd0 [ 2415.041567] __x64_sys_ioctl+0x73/0xb0 [ 2415.045448] do_syscall_64+0xfd/0x620 [ 2415.049258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.054442] RIP: 0033:0x45a6b7 23:03:15 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004004800040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2415.057629] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.076642] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.084343] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2415.092068] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2415.099344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2415.106644] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2415.113922] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:16 executing program 4 (fault-call:3 fault-nth:19): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040fdef0040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040effd0040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2415.441118] FAULT_INJECTION: forcing a failure. [ 2415.441118] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.471168] CPU: 1 PID: 23644 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2415.479032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.488558] Call Trace: 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000020040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2415.491180] dump_stack+0x197/0x210 [ 2415.494847] should_fail.cold+0xa/0x1b [ 2415.498767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2415.503912] ? lock_downgrade+0x880/0x880 [ 2415.508133] __should_failslab+0x121/0x190 [ 2415.512405] should_failslab+0x9/0x14 [ 2415.516230] __kmalloc+0x2e2/0x750 [ 2415.519808] ? rcu_read_lock_sched_held+0x110/0x130 [ 2415.524942] ? kobject_get_path+0xc4/0x1b0 [ 2415.529289] kobject_get_path+0xc4/0x1b0 [ 2415.533368] kobject_uevent_env+0x3ab/0x101f [ 2415.537799] kobject_uevent+0x20/0x26 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000030040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2415.541623] lo_ioctl+0x100b/0x20e0 [ 2415.545278] ? lo_rw_aio+0x1470/0x1470 [ 2415.549192] blkdev_ioctl+0xc38/0x1ab6 [ 2415.553099] ? blkpg_ioctl+0xa90/0xa90 [ 2415.557010] ? find_held_lock+0x35/0x130 [ 2415.561097] ? debug_check_no_obj_freed+0x200/0x464 [ 2415.566140] ? __fget+0x340/0x540 [ 2415.569615] block_ioctl+0xee/0x130 [ 2415.573256] ? blkdev_fallocate+0x410/0x410 [ 2415.577632] do_vfs_ioctl+0xd5f/0x1380 [ 2415.581536] ? selinux_file_ioctl+0x46f/0x5e0 [ 2415.586067] ? selinux_file_ioctl+0x125/0x5e0 [ 2415.590590] ? ioctl_preallocate+0x210/0x210 [ 2415.595091] ? selinux_file_mprotect+0x620/0x620 [ 2415.599925] ? iterate_fd+0x360/0x360 [ 2415.603755] ? do_sys_open+0x31d/0x550 [ 2415.607788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.613357] ? security_file_ioctl+0x8d/0xc0 [ 2415.617984] ksys_ioctl+0xab/0xd0 [ 2415.621633] __x64_sys_ioctl+0x73/0xb0 [ 2415.625544] do_syscall_64+0xfd/0x620 [ 2415.629370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.634575] RIP: 0033:0x45a6b7 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000040040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2415.637792] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.656866] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.664743] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2415.672071] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2415.679369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000050040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2415.686664] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2415.693961] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:16 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000060040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:16 executing program 4 (fault-call:3 fault-nth:20): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$unix(r5, &(0x7f0000000200)="04fff6c9a1b010123a841679fe66c3e8af0c79cae7bb20d7875c7ae42cb55cf978b5224544206d900b1159a7ef5b19c66cb0e4524243ed1edc777b5259090e1b898d8a913680f4e58833c60c19d4b2f5438c46a5b117fb71f75b0ccc468086e71fad28504e0a738610de59029ee9058231a753e99a794923a98e54025e7ada63abdbc9ebf9f6adb36eaf40c85dad31c2766a9d2e02955fa871bc5cb4ffc9a9453206043db25121a829da371eb7ddee21161e350d8c6fdd", 0xb7, 0x8024, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = dup2(r2, r1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDCTL_DSP_POST(r6, 0x5008, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$USBDEVFS_GETDRIVER(r10, 0x41045508, &(0x7f0000000000)={0x80000001, "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"}) r11 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2416.011328] FAULT_INJECTION: forcing a failure. [ 2416.011328] name failslab, interval 1, probability 0, space 0, times 0 23:03:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2416.055880] CPU: 0 PID: 23683 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2416.063737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.073110] Call Trace: [ 2416.075729] dump_stack+0x197/0x210 [ 2416.079391] should_fail.cold+0xa/0x1b [ 2416.083306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2416.088561] ? lock_downgrade+0x880/0x880 [ 2416.092803] __should_failslab+0x121/0x190 [ 2416.097032] should_failslab+0x9/0x14 [ 2416.101088] kmem_cache_alloc_node+0x26c/0x710 [ 2416.105829] ? find_held_lock+0x35/0x130 [ 2416.109901] __alloc_skb+0xd5/0x5f0 [ 2416.113634] ? skb_trim+0x190/0x190 [ 2416.117394] ? kasan_check_read+0x11/0x20 [ 2416.121661] alloc_uevent_skb+0x83/0x1e2 [ 2416.125728] kobject_uevent_env+0xaa3/0x101f [ 2416.130225] kobject_uevent+0x20/0x26 [ 2416.134044] lo_ioctl+0x100b/0x20e0 [ 2416.137689] ? lo_rw_aio+0x1470/0x1470 [ 2416.141706] blkdev_ioctl+0xc38/0x1ab6 [ 2416.145590] ? blkpg_ioctl+0xa90/0xa90 [ 2416.149470] ? find_held_lock+0x35/0x130 [ 2416.153530] ? debug_check_no_obj_freed+0x200/0x464 [ 2416.158636] ? __fget+0x340/0x540 [ 2416.162084] block_ioctl+0xee/0x130 [ 2416.165698] ? blkdev_fallocate+0x410/0x410 [ 2416.170012] do_vfs_ioctl+0xd5f/0x1380 [ 2416.173980] ? selinux_file_ioctl+0x46f/0x5e0 [ 2416.178492] ? selinux_file_ioctl+0x125/0x5e0 [ 2416.182978] ? ioctl_preallocate+0x210/0x210 [ 2416.187376] ? selinux_file_mprotect+0x620/0x620 [ 2416.192127] ? iterate_fd+0x360/0x360 [ 2416.195930] ? do_sys_open+0x31d/0x550 [ 2416.199830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2416.205378] ? security_file_ioctl+0x8d/0xc0 [ 2416.209790] ksys_ioctl+0xab/0xd0 [ 2416.213242] __x64_sys_ioctl+0x73/0xb0 [ 2416.217131] do_syscall_64+0xfd/0x620 [ 2416.221074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.226379] RIP: 0033:0x45a6b7 [ 2416.229574] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.248888] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:03:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040001c0140000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x808a22, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0xff}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2416.257109] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2416.265753] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2416.273273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2416.280542] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2416.288237] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000340000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:17 executing program 4 (fault-call:3 fault-nth:21): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0xa) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000000)={0x2, 0x6, 0x10000, 0x3f, 0x5}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2416.580928] FAULT_INJECTION: forcing a failure. [ 2416.580928] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.609698] CPU: 1 PID: 23713 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2416.617920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.627383] Call Trace: 23:03:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2416.629988] dump_stack+0x197/0x210 [ 2416.633617] should_fail.cold+0xa/0x1b [ 2416.637504] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2416.642740] ? lock_downgrade+0x880/0x880 [ 2416.647941] __should_failslab+0x121/0x190 [ 2416.652782] should_failslab+0x9/0x14 [ 2416.656728] kmem_cache_alloc_node+0x26c/0x710 [ 2416.661457] ? find_held_lock+0x35/0x130 [ 2416.665517] __alloc_skb+0xd5/0x5f0 [ 2416.669535] ? skb_trim+0x190/0x190 [ 2416.673163] ? kasan_check_read+0x11/0x20 [ 2416.677929] alloc_uevent_skb+0x83/0x1e2 [ 2416.682140] kobject_uevent_env+0xaa3/0x101f [ 2416.687000] kobject_uevent+0x20/0x26 [ 2416.690814] lo_ioctl+0x100b/0x20e0 [ 2416.694541] ? lo_rw_aio+0x1470/0x1470 [ 2416.698431] blkdev_ioctl+0xc38/0x1ab6 [ 2416.702314] ? blkpg_ioctl+0xa90/0xa90 [ 2416.706206] ? find_held_lock+0x35/0x130 [ 2416.710262] ? debug_check_no_obj_freed+0x200/0x464 [ 2416.715298] ? __fget+0x340/0x540 [ 2416.718749] block_ioctl+0xee/0x130 [ 2416.722367] ? blkdev_fallocate+0x410/0x410 [ 2416.726682] do_vfs_ioctl+0xd5f/0x1380 [ 2416.730581] ? selinux_file_ioctl+0x46f/0x5e0 [ 2416.735074] ? selinux_file_ioctl+0x125/0x5e0 [ 2416.739561] ? ioctl_preallocate+0x210/0x210 [ 2416.743956] ? selinux_file_mprotect+0x620/0x620 [ 2416.748726] ? iterate_fd+0x360/0x360 [ 2416.752532] ? do_sys_open+0x31d/0x550 [ 2416.756414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2416.761957] ? security_file_ioctl+0x8d/0xc0 [ 2416.766364] ksys_ioctl+0xab/0xd0 [ 2416.769823] __x64_sys_ioctl+0x73/0xb0 [ 2416.773718] do_syscall_64+0xfd/0x620 [ 2416.777526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.782968] RIP: 0033:0x45a6b7 [ 2416.786168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.805213] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2416.812922] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2416.820218] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 23:03:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000800440000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2416.827595] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2416.834878] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2416.842487] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:17 executing program 4 (fault-call:3 fault-nth:22): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000000)=0x1f, 0x4) dup2(r2, r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(0xffffffffffffffff, 0xc0884123, &(0x7f0000000040)={0x2, "069f76d9c1ea6f91aa7d9c4ec3d9d67aaf21d87ca130bcde55a7d387fb8277eac67c8792094852dd9b8a74b30ccce017dff5505393e79944626593465d498476", {0x80000000, 0xef}}) dup3(r1, r0, 0x0) 23:03:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000540000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2417.130755] FAULT_INJECTION: forcing a failure. [ 2417.130755] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.152515] CPU: 1 PID: 23741 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2417.160460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2417.170098] Call Trace: [ 2417.172740] dump_stack+0x197/0x210 [ 2417.177183] should_fail.cold+0xa/0x1b 23:03:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000640000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2417.181193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2417.186498] ? lock_downgrade+0x880/0x880 [ 2417.190679] __should_failslab+0x121/0x190 [ 2417.195024] should_failslab+0x9/0x14 [ 2417.198878] kmem_cache_alloc+0x2ae/0x700 [ 2417.203331] ? lock_downgrade+0x880/0x880 [ 2417.207509] skb_clone+0x156/0x3e0 [ 2417.211161] netlink_broadcast_filtered+0x875/0xb30 [ 2417.216219] netlink_broadcast+0x3a/0x50 [ 2417.220302] kobject_uevent_env+0xad6/0x101f [ 2417.224740] kobject_uevent+0x20/0x26 23:03:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000011c40000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2417.228564] lo_ioctl+0x100b/0x20e0 [ 2417.232217] ? lo_rw_aio+0x1470/0x1470 [ 2417.236154] blkdev_ioctl+0xc38/0x1ab6 [ 2417.240068] ? blkpg_ioctl+0xa90/0xa90 [ 2417.244425] ? find_held_lock+0x35/0x130 [ 2417.248533] ? debug_check_no_obj_freed+0x200/0x464 [ 2417.253585] ? __fget+0x340/0x540 [ 2417.257067] block_ioctl+0xee/0x130 [ 2417.260706] ? blkdev_fallocate+0x410/0x410 [ 2417.265043] do_vfs_ioctl+0xd5f/0x1380 [ 2417.269067] ? selinux_file_ioctl+0x46f/0x5e0 [ 2417.273855] ? selinux_file_ioctl+0x125/0x5e0 23:03:18 executing program 3: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x8000, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r6, r1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2417.278649] ? ioctl_preallocate+0x210/0x210 [ 2417.283234] ? selinux_file_mprotect+0x620/0x620 [ 2417.288019] ? iterate_fd+0x360/0x360 [ 2417.291866] ? do_sys_open+0x31d/0x550 [ 2417.295793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2417.301810] ? security_file_ioctl+0x8d/0xc0 [ 2417.306251] ksys_ioctl+0xab/0xd0 [ 2417.309740] __x64_sys_ioctl+0x73/0xb0 [ 2417.313686] do_syscall_64+0xfd/0x620 [ 2417.317520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.322829] RIP: 0033:0x45a6b7 23:03:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000048040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2417.326037] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.345128] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2417.353411] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2417.360736] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2417.368028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 23:03:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2417.375326] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2417.382622] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:18 executing program 4 (fault-call:3 fault-nth:23): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000fdef40000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, &(0x7f0000000080)=0xcb80, 0x4) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r8}) ioctl$SIOCX25SDTEFACILITIES(r9, 0x89eb, &(0x7f0000000040)={0xf0a7, 0x9, 0x8001, 0x3, 0x3, 0x5, 0x1f, "a45c7e02b192d40a4669a211b6f3bd189a7a2c96", "5d8508bef40838d582822ae6bca8b2aea95a210d"}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2417.645303] FAULT_INJECTION: forcing a failure. [ 2417.645303] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.665468] CPU: 1 PID: 23772 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2417.673787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2417.683167] Call Trace: [ 2417.685782] dump_stack+0x197/0x210 [ 2417.689434] should_fail.cold+0xa/0x1b 23:03:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000effd40000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2417.693351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2417.698483] ? lock_downgrade+0x880/0x880 [ 2417.702678] __should_failslab+0x121/0x190 [ 2417.706943] should_failslab+0x9/0x14 [ 2417.710845] kmem_cache_alloc+0x2ae/0x700 [ 2417.715023] ? lock_downgrade+0x880/0x880 [ 2417.719384] skb_clone+0x156/0x3e0 [ 2417.722958] netlink_broadcast_filtered+0x875/0xb30 [ 2417.728008] netlink_broadcast+0x3a/0x50 [ 2417.732204] kobject_uevent_env+0xad6/0x101f [ 2417.736643] kobject_uevent+0x20/0x26 [ 2417.740468] lo_ioctl+0x100b/0x20e0 [ 2417.744117] ? lo_rw_aio+0x1470/0x1470 [ 2417.748019] blkdev_ioctl+0xc38/0x1ab6 [ 2417.751925] ? blkpg_ioctl+0xa90/0xa90 [ 2417.755824] ? find_held_lock+0x35/0x130 [ 2417.759919] ? debug_check_no_obj_freed+0x200/0x464 [ 2417.764966] ? __fget+0x340/0x540 [ 2417.768600] block_ioctl+0xee/0x130 [ 2417.772483] ? blkdev_fallocate+0x410/0x410 [ 2417.776844] do_vfs_ioctl+0xd5f/0x1380 [ 2417.780819] ? selinux_file_ioctl+0x46f/0x5e0 [ 2417.785339] ? selinux_file_ioctl+0x125/0x5e0 [ 2417.789858] ? ioctl_preallocate+0x210/0x210 [ 2417.794303] ? selinux_file_mprotect+0x620/0x620 [ 2417.799105] ? iterate_fd+0x360/0x360 [ 2417.802938] ? do_sys_open+0x31d/0x550 [ 2417.806858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2417.812549] ? security_file_ioctl+0x8d/0xc0 [ 2417.816986] ksys_ioctl+0xab/0xd0 [ 2417.820461] __x64_sys_ioctl+0x73/0xb0 [ 2417.824363] do_syscall_64+0xfd/0x620 [ 2417.828439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.833635] RIP: 0033:0x45a6b7 [ 2417.836838] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.855947] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2417.863685] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 000000000045a6b7 [ 2417.870976] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 2417.878365] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2417.885748] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 23:03:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2417.893043] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000240000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r3, &(0x7f0000000000)=0x7ff, 0x12) r4 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r4, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup3(r4, r0, 0x0) 23:03:18 executing program 4 (fault-call:3 fault-nth:24): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x15) ioctl$TIOCCONS(r6, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r1) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$x25(r8, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) r11 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) read$fb(r12, &(0x7f0000000000)=""/170, 0xaa) r13 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2418.195729] FAULT_INJECTION: forcing a failure. [ 2418.195729] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.230122] CPU: 0 PID: 23798 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000340000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2418.237983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.247356] Call Trace: [ 2418.249990] dump_stack+0x197/0x210 [ 2418.253665] should_fail.cold+0xa/0x1b [ 2418.257588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2418.262734] ? lock_downgrade+0x880/0x880 [ 2418.267024] __should_failslab+0x121/0x190 [ 2418.271486] should_failslab+0x9/0x14 [ 2418.275689] kmem_cache_alloc+0x2ae/0x700 [ 2418.279875] getname_flags+0xd6/0x5b0 [ 2418.283711] do_mkdirat+0xa0/0x2a0 [ 2418.287284] ? __ia32_sys_mknod+0xb0/0xb0 [ 2418.291460] ? trace_hardirqs_on_thunk+0x1a/0x1c 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000440000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2418.296242] ? do_syscall_64+0x26/0x620 [ 2418.300230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2418.305618] ? do_syscall_64+0x26/0x620 [ 2418.309626] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2418.314235] __x64_sys_mkdir+0x5c/0x80 [ 2418.318146] do_syscall_64+0xfd/0x620 [ 2418.322123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2418.327514] RIP: 0033:0x459c67 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000540000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06764f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2418.330733] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2418.349761] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2418.357496] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2418.364796] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2418.372092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2418.379585] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2418.387039] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000640000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000000)=0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:19 executing program 4 (fault-call:3 fault-nth:25): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040020080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040030080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:19 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2418.871804] FAULT_INJECTION: forcing a failure. [ 2418.871804] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.904397] CPU: 1 PID: 23838 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2418.912415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.921798] Call Trace: [ 2418.924434] dump_stack+0x197/0x210 [ 2418.928109] should_fail.cold+0xa/0x1b [ 2418.932145] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2418.937281] ? lock_downgrade+0x880/0x880 [ 2418.941485] __should_failslab+0x121/0x190 [ 2418.945762] should_failslab+0x9/0x14 [ 2418.950312] kmem_cache_alloc+0x2ae/0x700 [ 2418.954496] ? __d_lookup+0x433/0x760 [ 2418.958441] ? lookup_dcache+0x23/0x140 [ 2418.962457] ? d_lookup+0xf9/0x260 [ 2418.966037] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2418.970661] __d_alloc+0x2e/0x9c0 [ 2418.974154] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2418.979213] d_alloc+0x4d/0x280 [ 2418.982536] __lookup_hash+0xcd/0x190 [ 2418.986434] filename_create+0x1a7/0x4f0 [ 2418.990539] ? kern_path_mountpoint+0x40/0x40 [ 2418.995081] ? strncpy_from_user+0x21b/0x2d0 [ 2418.999524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.005166] ? getname_flags+0x277/0x5b0 [ 2419.009283] do_mkdirat+0xb5/0x2a0 [ 2419.012853] ? __ia32_sys_mknod+0xb0/0xb0 [ 2419.017025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2419.021812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.027300] ? do_syscall_64+0x26/0x620 [ 2419.031313] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2419.035931] __x64_sys_mkdir+0x5c/0x80 [ 2419.039843] do_syscall_64+0xfd/0x620 [ 2419.043683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.048894] RIP: 0033:0x459c67 [ 2419.052107] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2419.071027] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2419.078996] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2419.086294] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2419.093928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2419.101220] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2419.108537] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:19 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2419.173340] audit: type=1800 audit(1576105399.926:731): pid=24006 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16566 res=0 23:03:20 executing program 4 (fault-call:3 fault-nth:26): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:20 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040040080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:20 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2419.286700] audit: type=1800 audit(1576105399.966:732): pid=24018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16566 res=0 23:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2419.371808] FAULT_INJECTION: forcing a failure. [ 2419.371808] name failslab, interval 1, probability 0, space 0, times 0 [ 2419.421688] audit: type=1800 audit(1576105400.146:733): pid=24062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16610 res=0 [ 2419.429042] CPU: 1 PID: 24055 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2419.452213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2419.461588] Call Trace: [ 2419.464205] dump_stack+0x197/0x210 [ 2419.467858] should_fail.cold+0xa/0x1b 23:03:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2419.471771] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2419.476904] ? lock_downgrade+0x880/0x880 [ 2419.481086] __should_failslab+0x121/0x190 [ 2419.485353] should_failslab+0x9/0x14 [ 2419.489182] kmem_cache_alloc+0x2ae/0x700 [ 2419.493360] ? __d_lookup+0x433/0x760 [ 2419.497191] ? lookup_dcache+0x23/0x140 [ 2419.501193] ? d_lookup+0xf9/0x260 [ 2419.504759] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2419.509371] __d_alloc+0x2e/0x9c0 [ 2419.512854] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2419.517896] d_alloc+0x4d/0x280 [ 2419.521209] __lookup_hash+0xcd/0x190 [ 2419.525035] filename_create+0x1a7/0x4f0 [ 2419.529131] ? kern_path_mountpoint+0x40/0x40 [ 2419.533663] ? strncpy_from_user+0x21b/0x2d0 [ 2419.538248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.543809] ? getname_flags+0x277/0x5b0 [ 2419.547922] do_mkdirat+0xb5/0x2a0 [ 2419.551495] ? __ia32_sys_mknod+0xb0/0xb0 [ 2419.555668] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2419.560455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.565856] ? do_syscall_64+0x26/0x620 [ 2419.569861] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2419.574477] __x64_sys_mkdir+0x5c/0x80 [ 2419.578401] do_syscall_64+0xfd/0x620 [ 2419.582236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.587657] RIP: 0033:0x459c67 [ 2419.590868] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2419.609804] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:03:20 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2419.617829] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2419.625126] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2419.633634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2419.640926] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2419.648227] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:20 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040050080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:20 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2419.769784] audit: type=1800 audit(1576105400.516:734): pid=24168 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16532 res=0 23:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:20 executing program 4 (fault-call:3 fault-nth:27): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, 0x0, 0x0) 23:03:20 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040060080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, 0x0, 0x0) 23:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:20 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:20 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401c0180000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, 0x0, 0x0) 23:03:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2420.365655] audit: type=1800 audit(1576105401.116:735): pid=24301 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16555 res=0 23:03:21 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000380000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2420.509047] FAULT_INJECTION: forcing a failure. [ 2420.509047] name failslab, interval 1, probability 0, space 0, times 0 [ 2420.534192] CPU: 1 PID: 24311 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2420.542056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2420.551454] Call Trace: [ 2420.554073] dump_stack+0x197/0x210 [ 2420.557731] should_fail.cold+0xa/0x1b [ 2420.561652] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2420.566812] ? lock_downgrade+0x880/0x880 [ 2420.571011] __should_failslab+0x121/0x190 [ 2420.575291] should_failslab+0x9/0x14 [ 2420.579124] kmem_cache_alloc+0x2ae/0x700 [ 2420.583304] ? __d_lookup+0x433/0x760 [ 2420.587130] ? lookup_dcache+0x23/0x140 [ 2420.591131] ? d_lookup+0xf9/0x260 [ 2420.594829] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2420.599448] __d_alloc+0x2e/0x9c0 [ 2420.602928] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2420.607974] d_alloc+0x4d/0x280 [ 2420.611290] __lookup_hash+0xcd/0x190 [ 2420.615128] filename_create+0x1a7/0x4f0 [ 2420.619233] ? kern_path_mountpoint+0x40/0x40 [ 2420.623901] ? strncpy_from_user+0x21b/0x2d0 [ 2420.628373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2420.633957] ? getname_flags+0x277/0x5b0 [ 2420.638052] do_mkdirat+0xb5/0x2a0 [ 2420.641618] ? __ia32_sys_mknod+0xb0/0xb0 [ 2420.645803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2420.650587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.655978] ? do_syscall_64+0x26/0x620 [ 2420.660000] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2420.664624] __x64_sys_mkdir+0x5c/0x80 [ 2420.668554] do_syscall_64+0xfd/0x620 [ 2420.672397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.677613] RIP: 0033:0x459c67 [ 2420.680834] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2420.699758] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2420.707500] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2420.714803] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2420.722101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2420.729402] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2420.736695] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:21 executing program 4 (fault-call:3 fault-nth:28): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x0, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:21 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040800480000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2421.205556] audit: type=1800 audit(1576105401.956:736): pid=24318 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16568 res=0 23:03:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2421.257219] FAULT_INJECTION: forcing a failure. [ 2421.257219] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.324127] CPU: 1 PID: 24327 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2421.331986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2421.341361] Call Trace: [ 2421.343977] dump_stack+0x197/0x210 [ 2421.347646] should_fail.cold+0xa/0x1b [ 2421.351566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2421.356702] ? lock_downgrade+0x880/0x880 [ 2421.360888] __should_failslab+0x121/0x190 [ 2421.365157] should_failslab+0x9/0x14 [ 2421.368990] kmem_cache_alloc+0x2ae/0x700 [ 2421.373164] ? __d_lookup+0x433/0x760 [ 2421.376988] ? lookup_dcache+0x23/0x140 [ 2421.380988] ? d_lookup+0xf9/0x260 [ 2421.384558] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2421.389198] __d_alloc+0x2e/0x9c0 [ 2421.392683] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2421.397732] d_alloc+0x4d/0x280 [ 2421.401031] __lookup_hash+0xcd/0x190 [ 2421.404863] filename_create+0x1a7/0x4f0 [ 2421.408949] ? kern_path_mountpoint+0x40/0x40 [ 2421.413470] ? strncpy_from_user+0x21b/0x2d0 [ 2421.417918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2421.423478] ? getname_flags+0x277/0x5b0 [ 2421.427567] do_mkdirat+0xb5/0x2a0 [ 2421.431138] ? __ia32_sys_mknod+0xb0/0xb0 [ 2421.435309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2421.440095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.445488] ? do_syscall_64+0x26/0x620 [ 2421.449498] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2421.454110] __x64_sys_mkdir+0x5c/0x80 [ 2421.458028] do_syscall_64+0xfd/0x620 [ 2421.461860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.467090] RIP: 0033:0x459c67 [ 2421.470301] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2421.489221] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2421.496958] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2421.504249] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2421.511541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 23:03:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x0, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:22 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000580000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2421.518836] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2421.526121] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:22 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000680000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2421.635865] audit: type=1800 audit(1576105402.386:737): pid=24338 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16611 res=0 23:03:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2421.815582] audit: type=1800 audit(1576105402.566:738): pid=24346 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16541 res=0 23:03:22 executing program 4 (fault-call:3 fault-nth:29): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x0, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:22 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040011c80000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2422.166506] FAT-fs (loop1): bogus number of reserved sectors [ 2422.204609] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06765f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:23 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040048080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0x0, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:23 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040fdef80000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2422.448849] FAULT_INJECTION: forcing a failure. [ 2422.448849] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.502338] CPU: 0 PID: 24469 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2422.510198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.519657] Call Trace: [ 2422.522278] dump_stack+0x197/0x210 [ 2422.525949] should_fail.cold+0xa/0x1b [ 2422.529874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2422.535014] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2422.535043] __should_failslab+0x121/0x190 [ 2422.535059] should_failslab+0x9/0x14 [ 2422.535086] kmem_cache_alloc+0x2ae/0x700 [ 2422.543954] ? map_id_range_down+0x1ee/0x370 [ 2422.543970] ? __put_user_ns+0x70/0x70 [ 2422.543989] selinux_inode_alloc_security+0xb6/0x2a0 [ 2422.544006] security_inode_alloc+0x8a/0xd0 [ 2422.544028] inode_init_always+0x56e/0xb40 [ 2422.561909] FAT-fs (loop1): bogus number of reserved sectors [ 2422.565508] alloc_inode+0x81/0x190 [ 2422.565523] new_inode_pseudo+0x19/0xf0 [ 2422.565536] new_inode+0x1f/0x40 [ 2422.565550] __ext4_new_inode+0x3cb/0x52d0 [ 2422.565567] ? kasan_check_read+0x11/0x20 [ 2422.565590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2422.574183] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2422.579964] ? ext4_free_inode+0x1470/0x1470 [ 2422.579985] ? dquot_get_next_dqblk+0x180/0x180 [ 2422.580005] ? selinux_determine_inode_label+0x1b1/0x360 [ 2422.626592] ext4_mkdir+0x3d5/0xdf0 [ 2422.630255] ? ext4_init_dot_dotdot+0x520/0x520 [ 2422.634964] ? selinux_inode_mkdir+0x23/0x30 [ 2422.639498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2422.645082] ? security_inode_mkdir+0xe4/0x120 [ 2422.649694] vfs_mkdir+0x42e/0x690 [ 2422.653269] do_mkdirat+0x234/0x2a0 [ 2422.656923] ? __ia32_sys_mknod+0xb0/0xb0 [ 2422.661110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2422.665901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.671300] ? do_syscall_64+0x26/0x620 [ 2422.675306] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2422.679919] __x64_sys_mkdir+0x5c/0x80 [ 2422.683844] do_syscall_64+0xfd/0x620 [ 2422.687678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.693003] RIP: 0033:0x459c67 [ 2422.696218] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2422.715148] RSP: 002b:00007f5aeddb0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2422.722882] RAX: ffffffffffffffda RBX: 00007f5aeddb0c90 RCX: 0000000000459c67 [ 2422.730169] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2422.737460] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 000000000000000a [ 2422.744753] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddb16d4 [ 2422.752053] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000003 23:03:23 executing program 4 (fault-call:3 fault-nth:30): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0x0, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:23 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040effd80000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0x0, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2422.935481] FAT-fs (loop1): bogus number of reserved sectors [ 2422.941450] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2422.968668] FAULT_INJECTION: forcing a failure. [ 2422.968668] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.022831] CPU: 0 PID: 24590 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2423.030694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.040073] Call Trace: [ 2423.042687] dump_stack+0x197/0x210 [ 2423.046341] should_fail.cold+0xa/0x1b [ 2423.050256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2423.055398] __should_failslab+0x121/0x190 [ 2423.059657] should_failslab+0x9/0x14 [ 2423.063478] __kmalloc+0x2e2/0x750 [ 2423.067047] ? ext4_find_extent+0x76e/0x9d0 [ 2423.071398] ext4_find_extent+0x76e/0x9d0 [ 2423.075748] ext4_ext_map_blocks+0x1c3/0x55c0 [ 2423.080294] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 2423.085349] ? __lock_is_held+0xb6/0x140 [ 2423.089533] ? lock_acquire+0x16f/0x3f0 [ 2423.093534] ? ext4_map_blocks+0x4cf/0x1b20 [ 2423.097888] ext4_map_blocks+0xf83/0x1b20 [ 2423.102063] ? ext4_issue_zeroout+0x170/0x170 [ 2423.106667] ? kasan_check_write+0x14/0x20 [ 2423.110917] ? __brelse+0x95/0xb0 [ 2423.114388] ext4_getblk+0xc4/0x510 [ 2423.118027] ? ext4_iomap_begin+0xfd0/0xfd0 [ 2423.122369] ? ext4_free_inode+0x1470/0x1470 [ 2423.126790] ext4_bread+0x8f/0x230 [ 2423.130354] ? ext4_getblk+0x510/0x510 [ 2423.134280] ext4_append+0x155/0x370 [ 2423.138028] ext4_mkdir+0x61b/0xdf0 [ 2423.141686] ? ext4_init_dot_dotdot+0x520/0x520 [ 2423.146375] ? selinux_inode_mkdir+0x23/0x30 [ 2423.150803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.156462] ? security_inode_mkdir+0xe4/0x120 [ 2423.161198] vfs_mkdir+0x42e/0x690 [ 2423.164793] do_mkdirat+0x234/0x2a0 [ 2423.168443] ? __ia32_sys_mknod+0xb0/0xb0 [ 2423.172609] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.177381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.182756] ? do_syscall_64+0x26/0x620 [ 2423.186746] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2423.191378] __x64_sys_mkdir+0x5c/0x80 [ 2423.195305] do_syscall_64+0xfd/0x620 [ 2423.199131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.204348] RIP: 0033:0x459c67 23:03:24 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000280000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2423.207563] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2423.226491] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2423.234225] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2423.241514] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2423.248895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2423.256190] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2423.264255] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:24 executing program 4 (fault-call:3 fault-nth:31): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2423.489744] FAULT_INJECTION: forcing a failure. [ 2423.489744] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.518948] FAT-fs (loop1): bogus number of reserved sectors [ 2423.528054] CPU: 0 PID: 24708 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2423.535911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.545307] Call Trace: [ 2423.546629] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2423.547940] dump_stack+0x197/0x210 [ 2423.557505] should_fail.cold+0xa/0x1b [ 2423.561423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2423.566569] __should_failslab+0x121/0x190 [ 2423.570836] should_failslab+0x9/0x14 [ 2423.574656] __kmalloc+0x2e2/0x750 [ 2423.578224] ? ext4_find_extent+0x76e/0x9d0 [ 2423.582573] ext4_find_extent+0x76e/0x9d0 [ 2423.586753] ext4_ext_map_blocks+0x1c3/0x55c0 [ 2423.591290] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 2423.596339] ? __lock_is_held+0xb6/0x140 [ 2423.600482] ? lock_acquire+0x16f/0x3f0 [ 2423.604484] ? ext4_map_blocks+0x4cf/0x1b20 [ 2423.608935] ext4_map_blocks+0xf83/0x1b20 [ 2423.613115] ? ext4_issue_zeroout+0x170/0x170 [ 2423.617651] ? kasan_check_write+0x14/0x20 [ 2423.621918] ? __brelse+0x95/0xb0 [ 2423.625423] ext4_getblk+0xc4/0x510 [ 2423.629088] ? ext4_iomap_begin+0xfd0/0xfd0 [ 2423.633440] ? ext4_free_inode+0x1470/0x1470 [ 2423.637893] ext4_bread+0x8f/0x230 [ 2423.641461] ? ext4_getblk+0x510/0x510 [ 2423.645379] ext4_append+0x155/0x370 [ 2423.649121] ext4_mkdir+0x61b/0xdf0 [ 2423.652778] ? ext4_init_dot_dotdot+0x520/0x520 [ 2423.657476] ? selinux_inode_mkdir+0x23/0x30 [ 2423.661921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.667484] ? security_inode_mkdir+0xe4/0x120 [ 2423.672099] vfs_mkdir+0x42e/0x690 [ 2423.675671] do_mkdirat+0x234/0x2a0 [ 2423.679323] ? __ia32_sys_mknod+0xb0/0xb0 [ 2423.683498] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.688279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.693669] ? do_syscall_64+0x26/0x620 [ 2423.697681] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2423.702298] __x64_sys_mkdir+0x5c/0x80 [ 2423.706216] do_syscall_64+0xfd/0x620 [ 2423.710047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.715275] RIP: 0033:0x459c67 [ 2423.718488] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:03:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:24 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000380000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2423.737624] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2423.745355] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2423.752646] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2423.759939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2423.767232] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2423.774668] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:24 executing program 4 (fault-call:3 fault-nth:32): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2423.929260] FAT-fs (loop1): bogus number of reserved sectors [ 2423.955480] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:24 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000480000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2423.975476] FAULT_INJECTION: forcing a failure. [ 2423.975476] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.987362] CPU: 0 PID: 24928 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2423.995178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2424.004548] Call Trace: [ 2424.007158] dump_stack+0x197/0x210 [ 2424.010816] should_fail.cold+0xa/0x1b [ 2424.014739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2424.019874] ? mark_held_locks+0xb1/0x100 [ 2424.024047] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2424.029094] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2424.034058] __should_failslab+0x121/0x190 [ 2424.038365] should_failslab+0x9/0x14 [ 2424.042188] kmem_cache_alloc+0x47/0x700 [ 2424.046278] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2424.051322] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2424.056106] ? ext4_es_scan+0x730/0x730 [ 2424.060128] __es_insert_extent+0x2cc/0xf20 [ 2424.064479] ? do_raw_write_lock+0xbd/0x1e0 [ 2424.068839] ext4_es_insert_extent+0x27e/0x640 [ 2424.073550] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 2424.079393] ext4_map_blocks+0xc3f/0x1b20 [ 2424.083599] ? ext4_issue_zeroout+0x170/0x170 [ 2424.088127] ? kasan_check_write+0x14/0x20 [ 2424.092402] ? __brelse+0x95/0xb0 [ 2424.095886] ext4_getblk+0xc4/0x510 [ 2424.099552] ? ext4_iomap_begin+0xfd0/0xfd0 [ 2424.103905] ? ext4_free_inode+0x1470/0x1470 [ 2424.108342] ext4_bread+0x8f/0x230 [ 2424.111911] ? ext4_getblk+0x510/0x510 [ 2424.115831] ext4_append+0x155/0x370 [ 2424.119579] ext4_mkdir+0x61b/0xdf0 [ 2424.123244] ? ext4_init_dot_dotdot+0x520/0x520 [ 2424.127950] ? selinux_inode_mkdir+0x23/0x30 [ 2424.132403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2424.137971] ? security_inode_mkdir+0xe4/0x120 [ 2424.142592] vfs_mkdir+0x42e/0x690 [ 2424.146170] do_mkdirat+0x234/0x2a0 [ 2424.149833] ? __ia32_sys_mknod+0xb0/0xb0 [ 2424.154010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2424.158793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.164185] ? do_syscall_64+0x26/0x620 [ 2424.168204] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2424.172819] __x64_sys_mkdir+0x5c/0x80 [ 2424.176739] do_syscall_64+0xfd/0x620 [ 2424.180582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.185793] RIP: 0033:0x459c67 [ 2424.189002] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2424.207922] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2424.215650] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2424.222936] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2424.230225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2424.237513] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 [ 2424.244826] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:25 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000580000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:25 executing program 4 (fault-call:3 fault-nth:33): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2424.499269] FAULT_INJECTION: forcing a failure. [ 2424.499269] name failslab, interval 1, probability 0, space 0, times 0 [ 2424.567309] CPU: 1 PID: 25046 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2424.575293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2424.575302] Call Trace: [ 2424.575332] dump_stack+0x197/0x210 [ 2424.575350] should_fail.cold+0xa/0x1b [ 2424.575367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2424.575385] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 2424.575410] __should_failslab+0x121/0x190 [ 2424.575427] should_failslab+0x9/0x14 [ 2424.575441] __kmalloc+0x2e2/0x750 [ 2424.575459] ? ext4_find_extent+0x76e/0x9d0 [ 2424.575475] ext4_find_extent+0x76e/0x9d0 [ 2424.575495] ext4_ext_map_blocks+0x1c3/0x55c0 [ 2424.575518] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 2424.630763] ? __lock_is_held+0xb6/0x140 [ 2424.639857] ? lock_acquire+0x16f/0x3f0 [ 2424.643866] ? ext4_map_blocks+0x928/0x1b20 [ 2424.648213] ext4_map_blocks+0x990/0x1b20 [ 2424.652549] ? ext4_issue_zeroout+0x170/0x170 [ 2424.657090] ? kasan_check_write+0x14/0x20 [ 2424.661347] ? __brelse+0x95/0xb0 [ 2424.664820] ext4_getblk+0xc4/0x510 [ 2424.668468] ? ext4_iomap_begin+0xfd0/0xfd0 [ 2424.672819] ? ext4_free_inode+0x1470/0x1470 [ 2424.677370] ext4_bread+0x8f/0x230 [ 2424.680927] ? ext4_getblk+0x510/0x510 [ 2424.684845] ext4_append+0x155/0x370 [ 2424.688582] ext4_mkdir+0x61b/0xdf0 [ 2424.692249] ? ext4_init_dot_dotdot+0x520/0x520 [ 2424.696954] ? selinux_inode_mkdir+0x23/0x30 [ 2424.701399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2424.706978] ? security_inode_mkdir+0xe4/0x120 [ 2424.711671] vfs_mkdir+0x42e/0x690 [ 2424.715233] do_mkdirat+0x234/0x2a0 [ 2424.718889] ? __ia32_sys_mknod+0xb0/0xb0 [ 2424.723061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2424.727853] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.733245] ? do_syscall_64+0x26/0x620 [ 2424.737243] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2424.741840] __x64_sys_mkdir+0x5c/0x80 [ 2424.745751] do_syscall_64+0xfd/0x620 [ 2424.749584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.754818] RIP: 0033:0x459c67 [ 2424.758033] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2424.777054] RSP: 002b:00007f5aeddd1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2424.784792] RAX: ffffffffffffffda RBX: 00007f5aeddd1c90 RCX: 0000000000459c67 [ 2424.792075] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 2424.799362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2424.806652] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddd26d4 23:03:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:25 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000680000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2424.814027] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000005 23:03:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:25 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080004bf9021308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:25 executing program 4 (fault-call:3 fault-nth:34): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2425.024924] FAT-fs (loop1): bogus number of reserved sectors [ 2425.059361] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:26 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080020000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2425.229489] FAULT_INJECTION: forcing a failure. [ 2425.229489] name failslab, interval 1, probability 0, space 0, times 0 23:03:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2425.293946] CPU: 0 PID: 25259 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 2425.301815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2425.311192] Call Trace: [ 2425.313830] dump_stack+0x197/0x210 [ 2425.317512] should_fail.cold+0xa/0x1b [ 2425.321441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2425.326588] __should_failslab+0x121/0x190 [ 2425.330943] should_failslab+0x9/0x14 [ 2425.334774] kmem_cache_alloc+0x2ae/0x700 [ 2425.339165] ? __mark_inode_dirty+0x241/0x1280 [ 2425.343792] ext4_mb_new_blocks+0x5a0/0x3dd0 [ 2425.348235] ? ext4_find_extent+0x76e/0x9d0 [ 2425.352743] ext4_ext_map_blocks+0x2b26/0x55c0 [ 2425.357372] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 2425.362422] ? __lock_is_held+0xb6/0x140 [ 2425.366533] ext4_map_blocks+0x990/0x1b20 [ 2425.370735] ? ext4_issue_zeroout+0x170/0x170 [ 2425.375578] ? kasan_check_write+0x14/0x20 [ 2425.379844] ? __brelse+0x95/0xb0 [ 2425.383337] ext4_getblk+0xc4/0x510 [ 2425.387089] ? ext4_iomap_begin+0xfd0/0xfd0 [ 2425.391620] ? ext4_free_inode+0x1470/0x1470 [ 2425.396061] ext4_bread+0x8f/0x230 [ 2425.399639] ? ext4_getblk+0x510/0x510 [ 2425.403569] ext4_append+0x155/0x370 [ 2425.407324] ext4_mkdir+0x61b/0xdf0 [ 2425.410990] ? ext4_init_dot_dotdot+0x520/0x520 [ 2425.415801] ? selinux_inode_mkdir+0x23/0x30 [ 2425.420240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2425.425828] ? security_inode_mkdir+0xe4/0x120 [ 2425.430446] vfs_mkdir+0x42e/0x690 [ 2425.434024] do_mkdirat+0x234/0x2a0 [ 2425.437686] ? __ia32_sys_mknod+0xb0/0xb0 [ 2425.442009] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2425.446799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.452193] ? do_syscall_64+0x26/0x620 [ 2425.456200] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2425.460931] __x64_sys_mkdir+0x5c/0x80 [ 2425.464851] do_syscall_64+0xfd/0x620 [ 2425.468686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.474011] RIP: 0033:0x459c67 [ 2425.477227] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2425.496156] RSP: 002b:00007f5aeddb0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2425.503894] RAX: ffffffffffffffda RBX: 00007f5aeddb0c90 RCX: 0000000000459c67 [ 2425.511186] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 2425.518496] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 000000000000000a [ 2425.525784] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f5aeddb16d4 [ 2425.533075] R13: 00000000004cad12 R14: 00000000004e4238 R15: 0000000000000003 [ 2425.593209] FAT-fs (loop1): bogus number of reserved sectors [ 2425.599076] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:26 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080030000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:26 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080040000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:26 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080050000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:27 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080060000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2426.194219] FAT-fs (loop1): bogus number of reserved sectors [ 2426.213973] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x0, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x0, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000400000801c0100101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='j.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2426.530047] FAT-fs (loop1): bogus number of reserved sectors [ 2426.563864] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x0, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06766f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='j/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:27 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000300101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x0, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2426.902179] FAT-fs (loop1): bogus number of reserved sectors [ 2426.927987] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x0, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080800400101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6370000000000000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r5}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000080)={r6, 0x80000}) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r7, r1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x0, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000000c0)=0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat(r6, &(0x7f0000000080)='./file0\x00', 0x200000, 0x0) ioctl$TIOCSBRK(r7, 0x5427) r8 = getpid() tkill(r8, 0x9) capget(&(0x7f0000000000)={0x19980330, r8}, &(0x7f0000000040)={0x8, 0x0, 0x8, 0xffff93a6, 0x3, 0x7ff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TIOCMIWAIT(r11, 0x545c, 0x0) dup2(r2, r1) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:28 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000500101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2427.259938] FAT-fs (loop1): bogus number of reserved sectors [ 2427.298812] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x0, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000000)) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netlink\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$VHOST_GET_FEATURES(r6, 0x8008af00, &(0x7f0000000080)) 23:03:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000600101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x0, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x4280, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) r4 = fcntl$dupfd(r2, 0x605, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x100, 0x7fff) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r14, r1) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r16, 0x0) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2427.679578] FAT-fs (loop1): bogus number of reserved sectors 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/52, &(0x7f0000000080)=0x34) r2 = getpid() r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x14, 0x6fdf07eac22a7059, r3, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0xffffffffffffff00) tkill(r2, 0x9) r4 = syz_open_procfs(r2, &(0x7f0000000000)='net/ip_tables_targets\x00') r5 = syz_open_pts(r4, 0x100) ioctl$TIOCCONS(r5, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r6, r5) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000100)=0x80, &(0x7f0000000140)=0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) dup3(r5, r0, 0x0) [ 2427.733154] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x0, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080011c00101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) dup3(r1, r0, 0x0) 23:03:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x0, 0x0, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x20002, 0xfffffffc, 0x0, 0x4, 0x0, 0x4, 0x2, 0x0, 0x0, 0x5, 0x2}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x13) r6 = accept4(r4, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, &(0x7f0000000100)=0x80, 0xb183766ad5436dbe) dup(r6) r7 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/45, 0x29c000, 0x1000}, 0x18) ftruncate(r8, 0x400) dup3(r1, r0, 0x0) 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080048000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x0, 0xdd, {0x0, 0x0, 0x6}, 0x40000000, 0x800000, 0x0, 0x0, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) [ 2428.115717] FAT-fs (loop1): bogus number of reserved sectors [ 2428.126765] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r3, 0x80000) r5 = syz_open_pts(r4, 0x785e029f08ae9efe) ioctl$TIOCCONS(r5, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r6, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0xa, 0x1, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r13, 0x0) ioctl$sock_SIOCETHTOOL(r13, 0x8946, &(0x7f0000000180)={'ipddp0\x00', &(0x7f0000000040)=@ethtool_gstrings={0x1b, 0x6e3, 0xc6, "80dc2c6bcdaa535a0c8b227a0f0c7ee75b0e6681e6d755e29f8b0008c3b482a44e17d0ff8469bb7dda9b7fd41b46aca014fe6506451e311ce1a9dd354cff27c1fec77ca63ec23c982bd70f6522c688063c316655348306ce49258ba199ba8919c2c8f2eeb4e9905c0d1786d6a122b89808805dc969c3ffc26413623a2c06b757ce5d2c327a4d155d21da14e9e57f76cac070ca5a24eb00919dfc7c232fc7c8512ff13ddd4eb3cce6c3db27fd584e9ed2056537bd8b4adcb6fbb4245cdeeb03c0467fd1c20657"}}) close(r12) r14 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000140)={r15}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f0000000000)={r15, 0xd3}, 0x8) dup3(r5, r0, 0x0) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:29 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080fdef00101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000080)={{0x2, 0x0, @identifier="0f5f91b0ad89dcc9b484a1f1f953e50b"}, 0x7, [], '\x00\x00\x00\x00\x00\x00\x00'}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x30a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTAT(r0, &(0x7f0000000600)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x1, 0xdd, {0x59, 0x4, 0x6}, 0x40000000, 0x800000, 0x30ca, 0xf1e, 0x2, '/\x00', 0x1d, '+\x92:posix_acl_access/vboxnet0\x00', 0x1, ':', 0xa, 'syzkaller\x00'}}, 0x64) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:29 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "f3443acf9d9fc434", "7b4bc91a887f91a564cbfc597fde27bc", "935f86be", "6998dda70c0fc794"}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x200002, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x2e]}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) shmget(0x1, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/201) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e21, 0x4, @rand_addr="e518d31ea4ac4d8d9fd53cd49bc31964", 0x2}, 0x1c) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) socket$unix(0x1, 0x10004000000002, 0x0) 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000080)={0x0, 0x4, 0x2, 0x4, 0x7, 0xffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:29 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080effd00101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2428.561660] FAT-fs (loop1): bogus number of reserved sectors [ 2428.598231] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0xfffffffd, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:29 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000201308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') 23:03:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c9, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000540)=""/20, 0x14}, {0x0}], 0x2}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)=""/104, 0x68}, {0x0}], 0x2}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r7, &(0x7f0000000580)=[{&(0x7f0000000280)=""/93, 0x5d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 23:03:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:29 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000401308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2429.083461] FAT-fs (loop1): bogus number of reserved sectors [ 2429.089522] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400280, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06767f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:30 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000fa1308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000180)=""/34, 0x22}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e0054d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x0, &(0x7f0000000080), 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:03:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x2, {{0x2, 0x4e20, @local}}}, 0x88) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) r5 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0xa0400, 0x48) ioctl$EVIOCSKEYCODE(r5, 0x40084504, &(0x7f0000000100)=[0x9, 0x101]) 23:03:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2429.374832] FAT-fs (loop1): bogus number of reserved sectors [ 2429.410365] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200400, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000080)={0x7ff, 0x2, 0x6, 0x3ff}) dup3(r1, r0, 0x0) r7 = socket(0xa, 0x1, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000140)={r9}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x3, 0xdcd9, 0x60a, 0x1000, 0x7, 0x40, 0xfffffffd, 0xffff7fff, r9}, 0xffffff4b) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:30 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000200101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000680)={0xc, 0x8, 0xfa00, {&(0x7f0000000500)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) socket$inet(0x2, 0xa, 0xc0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/55, 0x37}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffde1, 0x0, 0x0, 0x800e00558) shutdown(r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000013c0)=[{0x0}], 0x1) shutdown(0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:30 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000300101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2429.759792] FAT-fs (loop1): bogus number of reserved sectors [ 2429.786168] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800005}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x500, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) dup3(r1, r0, 0x0) 23:03:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:30 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000400101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2430.085627] Unknown ioctl 19585 23:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/248, 0xf8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e0054d) shutdown(r0, 0x0) shutdown(r1, 0x0) [ 2430.118609] Unknown ioctl 19585 23:03:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000000)=0x8) dup3(r1, r0, 0x0) [ 2430.195409] FAT-fs (loop1): invalid media value (0x00) [ 2430.216982] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000500101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/248, 0xf8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e0054d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x0, &(0x7f0000000080)={{}, {0x4}}, 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:03:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r2, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @remote, @netrom, @rose, @default, @bcast, @null, @default]}, &(0x7f0000000080)=0x48) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:31 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, 0xffffffffffffffff, 0x0) 23:03:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000600101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2430.563850] FAT-fs (loop1): invalid media value (0x00) [ 2430.603359] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r7}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r7}}, 0xc) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r12, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r13}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r12, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r13}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r13}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r11, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xf1e, @loopback, 0x3}, r13}}, 0x38) r14 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c9, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000540)=""/20, 0x14}, {0x0}], 0x2}, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)=""/104, 0x68}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r7, &(0x7f0000000580)=[{&(0x7f0000000280)=""/93, 0x5d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 23:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080001c01101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x1, 0x5b5fa3) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2430.930051] FAT-fs (loop1): invalid media value (0x00) [ 2430.963118] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:31 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, 0x101, 0x7, 0x0, 0x0, 0xa6}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video0\x00', 0x2, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80, 0x840000) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000000)={0x3cb}, 0xa) lsetxattr$security_selinux(0x0, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) setpriority(0x0, 0x0, 0x100) read(0xffffffffffffffff, 0x0, 0x0) gettid() gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='/dev/video0\x00', &(0x7f0000000100)='GPL%GPL\x00'], &(0x7f0000000780)) 23:03:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000003101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x200680) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000100)={0x8, @multicast2, 0x4e22, 0x2, 'wrr\x00', 0x2, 0x1, 0x2d}, 0x2c) dup3(r1, r0, 0x0) 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080008004101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r0 = open(&(0x7f0000000300)='.\x00', 0x101000, 0x140) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000640)='./file0/file0\x00', 0x0) 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2431.375925] IPVS: set_ctl: invalid protocol: 8 224.0.0.2:20002 [ 2431.405224] FAT-fs (loop1): invalid media value (0x00) [ 2431.410673] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000005101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$VT_ACTIVATE(r2, 0x5606, 0x180000000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000006101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x80000001}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2431.745724] FAT-fs (loop1): invalid media value (0x00) [ 2431.755958] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:32 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x220081, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x300) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) r2 = dup2(r0, r1) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4}, 0xc) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x100, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) [ 2431.804648] audit: type=1800 audit(1576105412.556:739): pid=28119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16560 res=0 23:03:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100000000400000004000008000011c101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2431.950672] FAT-fs (loop1): invalid media value (0x00) 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06768f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) r5 = socket$inet(0x2, 0x20000000000003, 0xff) r6 = socket$inet(0x2, 0x20000000000003, 0xff) r7 = dup3(r5, r6, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000200)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$NBD_SET_TIMEOUT(r10, 0xab09, 0x8) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0xfffffff8, 0x3, 0x1, 0x0, 0x1}, 0x8) [ 2431.973065] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000480101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/72, 0x48}, {0x0}, {0x0}], 0x3) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r5, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) 23:03:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 2432.283137] FAT-fs (loop1): invalid media value (0x00) 23:03:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2432.305853] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:33 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100000000400000004000008000fdef101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='\xff\x00\x04\xa4\xbc\xc9\x05\x00\x00\x80', 0x40, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x80000000, 0x4) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:33 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000010000000100000000400000004000008000effd101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000540)=""/232, 0xe8}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/28, 0x1c}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000027c0)=[{&(0x7f0000001640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) shutdown(r4, 0x0) shutdown(r1, 0x0) 23:03:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0xffffffff8b8f05b8, 0x80302) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TIOCSTI(r11, 0x5412, 0xd5) ioctl$FS_IOC_GETFLAGS(r8, 0x80086601, &(0x7f00000004c0)) fcntl$dupfd(r6, 0x0, r7) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000006c0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f00000007c0)=0x10155) r13 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r13, 0x0) statfs(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)=""/96) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000340)=0xc) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1000000, &(0x7f0000000380)={'trans=virtio,', {[{@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0xbd68}}, {@cache_none='cache=none'}, {@access_client='access=client'}], [{@euid_gt={'euid>', r5}}, {@obj_user={'obj_user', 0x3d, '@lo@-em0selinuxuser%lo-eth1wlan1system'}}, {@uid_eq={'uid', 0x3d, r12}}, {@uid_eq={'uid', 0x3d, r14}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/ptmx\x00'}}]}}) 23:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2432.724163] FAT-fs (loop1): invalid media value (0x00) [ 2432.729709] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:33 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000002101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x1ff, 0x3, 0xfffffffc}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000000)={0x7fffffff, 0x1, 0x7, 0x5, 0x3, 0x7fffffff}) dup3(r1, r0, 0x0) 23:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e0054d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x0, &(0x7f0000000080), 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:03:33 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000003101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\"', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2433.068242] FAT-fs (loop1): invalid media value (0x00) 23:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0xbbf) [ 2433.131527] FAT-fs (loop1): Can't find a valid FAT filesystem 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x55db871bed5c4ae5}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) keyctl$read(0xb, 0x0, &(0x7f0000019600)=""/102388, 0x18ff4) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 23:03:34 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000004101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs#', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_dccp_int(r7, 0x21, 0x11, &(0x7f0000000000)=0x2, 0x4) dup3(r1, r0, 0x0) 23:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769715ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000005101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs,', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769815ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="88000000", @ANYRES16=r6, @ANYBLOB="000326bd00060001000000000000000800019883e571fd01196160a281dd643508ebf5222aae206d147aa68c37d53c5e34bc3429de0e635200f32cef9b470abb0e2daee708921ba585f50e1db6482788f1ee9b1d0ca867b2be64422ee9ee58801b794b2795f14d75e7cee6a5a7f4636e03e1bb58c4f4cb55e320b463afe87391c9bb8fe03a97b2c96d2ccb1006ef2f238a2f3ac3cac01781eed3aa219e0c3ce43c49e931e2457d46324932ceafdfeb6c033202b2b0c765cb2225fb6929dd3692597840f2996821d6", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100000000000c000200d5000000000000000c00040001000000000000000c0002000100000001000000"], 0x88}, 0x1, 0x0, 0x0, 0x30000804}, 0xcc42d124946fe3c9) r16 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000100)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fstat(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r5) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000640)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780)=0x0, &(0x7f0000000800), &(0x7f0000000840)) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x2028000, &(0x7f0000000880)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}, {@nodevmap='nodevmap'}, {@fscache='fscache'}, {@fscache='fscache'}, {@dfltuid={'dfltuid'}}], [{@uid_gt={'uid>', r6}}, {@obj_user={'obj_user', 0x3d, 'self&#+:vmnet0*\xe1{posix_acl_access'}}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r7}}, {@permit_directio='permit_directio'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x55db871bed5c4ae5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r3, 0xae9a) keyctl$read(0xb, 0x0, &(0x7f0000019600)=""/102388, 0x18ff4) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(r8, 0xffffffffffffffff, 0x0, 0x320c) 23:03:34 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000006101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) sendto$ax25(0xffffffffffffffff, &(0x7f0000000180)="508105f5e68e54497f16c720c97c2aae64f3a8b87ddf4b7c8f9de5c030c28827", 0x3e4, 0x800, 0x0, 0xffffff60) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) clock_nanosleep(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r5, 0x401070c9, &(0x7f0000000000)={0x200, 0x1}) r6 = dup2(r2, r1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = ioctl$TIOCGPTPEER(r9, 0x5441, 0x0) ioctl$TCGETS(r10, 0x5401, &(0x7f00000004c0)) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/enforce\x00', 0x40, 0x0) ioctl$VIDIOC_ENUM_FMT(r12, 0xc0405602, &(0x7f0000000540)={0x6, 0xb, 0x2, "f21a87aefe3523c46e2c9b1ca7cc1b3a0c8bba9bd5dbea4e814cd262ba98adc5", 0xce4f1f27}) r13 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r13, 0x8982, &(0x7f0000000200)={0x6, 'bridge_slave_1\x00', {0x7}, 0x5b}) r14 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0xc9000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x49, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2b34b7cfce589c7a, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r14, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x9, 0x9, "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", 0xe0, 0x8, 0x7, 0xf0, 0x39, 0x6, 0x5}, r15}}, 0x120) dup3(r1, r0, 0x0) accept4(r6, &(0x7f00000000c0)=@hci, &(0x7f0000000140)=0x80, 0x41000) 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769915ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769a15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$kcm(0x29, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:34 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000201308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x1c}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000000c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cc], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:03:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769b15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/\x81tmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:34 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000401308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2434.156059] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0x187 data 0x4d00000000f 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769c15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2434.224083] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f [ 2434.251745] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f [ 2434.265050] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f 23:03:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) readahead(r4, 0xf46, 0x9) [ 2434.316959] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f 23:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:35 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000fa1308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2434.365889] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769d15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2434.408597] kvm [29361]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f 23:03:35 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@empty, @link_local, [{}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @loopback, @local, @multicast2}}}}, &(0x7f0000000100)={0x0, 0x2, [0x5, 0x687]}) 23:03:35 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000fa1308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x430200, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r2, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r2) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200, 0x0) setsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000200), 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x1, 0x5, 0x6, 0x5}, {0xcf8d, 0x7f, 0x7, 0x4f}]}, 0x10) r6 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0xffff, 0x0) ioctl$SG_SET_RESERVED_SIZE(r6, 0x2275, &(0x7f0000000180)=0xbb1a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x4) dup3(r3, r0, 0x80000) 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769e15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a06769f15ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:35 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) getpid() mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:35 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101307006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r2, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000040)=0x1005140, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r5, 0xc02c5341, &(0x7f0000000100)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup3(0xffffffffffffffff, r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x68, r12, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x60, @media='ib\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf26ad51d9c399f72}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r12, 0x100, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x212000, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000000)=0x2) 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a015ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) dup2(r2, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a115ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2435.093693] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! 23:03:35 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308046d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a215ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) [ 2435.149662] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 23:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) [ 2435.190333] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2435.253415] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2435.279400] EXT4-fs (loop2): mounting with "discard" option, but the device does not support discard [ 2435.300230] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 23:03:36 executing program 2: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)) sendmsg$kcm(r5, &(0x7f0000000200)={&(0x7f0000000000)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e23, 0x1}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)}, {0x0}, {&(0x7f0000000380)="c08f53b9a752cc57a0f874d2f630feb2baf54013a5b48a19f43c98d829556d9d672704422e102b9d4225dffbbfa39fa4f0fb9f9569f4291fa99bc57310da138f15b4348de71a1ad4aafec3bba3859a54a73343d6f0e8aa422ecd85f8b15485d4749b527a70cebb80d0e465b1919577f1e0a1ce25fd908b941491fe9a9cf6f62fd9ebf7884b1ffb0c4ea74d68f224dda5e9604cc1abac2645da620ce41e0f8acd1cd1a8cc7f3a0e376c6db9caff4e0520a505e11454243ff60f5b7ab2c3f51620c3342b54", 0xc4}], 0x3, &(0x7f0000004780)=ANY=[@ANYBLOB="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"], 0x4206}, 0x800) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) 23:03:36 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000100)={0x3f, 0x9, 0x2b, "19ea5e6708537244feb4238af660df62ed1dbb9b6104e40912129c859d846b63332f090be167554bcd6e688ab305a64852a997e5dd482a27804e8813", 0x1a, "6203102caf5535992fbc86d59ab4eb953c51920163be38b2092738ae0cd4ed7dd8c3c492a666f2e4164c87b5a88fca5e3068bf9d9f0ca377f78fba33", 0x40}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0xffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCCONS(r2, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20882, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') inotify_init() dup2(r6, 0xffffffffffffffff) dup3(r2, r1, 0x0) 23:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a315ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:36 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000400000800000001013e80f6d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a415ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x71c, 0x0, 0x6, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x8000000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000b009b5d526599b34bca92ebee"], 0x13) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)={0x6, 0x5, 0x7d, 0x5}, 0x6) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r0, 0x0) 23:03:36 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308026d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a515ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) 23:03:36 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b(B\b\x06C\x9brY\x1d\x9b9;D\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd\r0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 23:03:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe9fb}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCCONS(r4, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa8a00, 0x0) write$P9_RSTATFS(r7, &(0x7f0000000040)={0x43, 0x9, 0x1, {0x6, 0x6, 0x200, 0x7, 0x7, 0x7f, 0x4995bad3, 0x0, 0x80000000}}, 0x43) r8 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r4, r0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="008ad4f900"/21], &(0x7f0000000240)=0x12) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0xa, 0x1, 0x0) close(r12) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000140)={r14}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r11, 0x84, 0x71, &(0x7f00000000c0)={r14, 0x8}, &(0x7f0000000100)=0x8) 23:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676a615ff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) 23:03:36 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957937fc18e6f8d641603268bacd35d53506e9950d15c7ac636157820e1d5857ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadb746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c81500000000000000000000934fbf41c153033f54a75244e0f4a69926893546ca552901b85d4814eb20b3c35b7d290f319a932016ea093fac852563b5ddb8142b3ac41ec241a897", 0xe0, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308036d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:03:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@gid={'gid'}}]}) [ 2436.022175] ================================================================== [ 2436.022263] BUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 [ 2436.022275] Read of size 2 at addr ffff88808af3fdc0 by task syz-executor.2/29808 [ 2436.022279] [ 2436.022294] CPU: 1 PID: 29808 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 2436.022304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.022309] Call Trace: [ 2436.022329] dump_stack+0x197/0x210 [ 2436.022346] ? vcs_scr_readw+0xc2/0xd0 [ 2436.022365] print_address_description.cold+0x7c/0x20d [ 2436.022382] ? vcs_scr_readw+0xc2/0xd0 [ 2436.022398] kasan_report.cold+0x8c/0x2ba [ 2436.022418] __asan_report_load2_noabort+0x14/0x20 [ 2436.022430] vcs_scr_readw+0xc2/0xd0 [ 2436.022495] vcs_write+0x646/0xcf0 [ 2436.022522] ? vcs_size+0x240/0x240 [ 2436.022549] __vfs_write+0x114/0x810 [ 2436.022563] ? vcs_size+0x240/0x240 [ 2436.022577] ? kernel_read+0x120/0x120 [ 2436.022593] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2436.022607] ? __inode_security_revalidate+0xda/0x120 [ 2436.022626] ? avc_policy_seqno+0xd/0x70 [ 2436.022640] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2436.022655] ? selinux_file_permission+0x92/0x550 [ 2436.022677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.022690] ? security_file_permission+0x89/0x230 [ 2436.022708] ? rw_verify_area+0x118/0x360 [ 2436.022727] vfs_write+0x20c/0x560 [ 2436.022745] ksys_write+0x14f/0x2d0 [ 2436.022761] ? __ia32_sys_read+0xb0/0xb0 [ 2436.022777] ? do_syscall_64+0x26/0x620 [ 2436.022790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.022803] ? do_syscall_64+0x26/0x620 [ 2436.022820] __x64_sys_write+0x73/0xb0 [ 2436.022836] do_syscall_64+0xfd/0x620 [ 2436.022852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.022863] RIP: 0033:0x45a849 [ 2436.022877] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2436.022885] RSP: 002b:00007fcfe37bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2436.022900] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a849 [ 2436.022909] RDX: 000000000000050f RSI: 0000000020000600 RDI: 0000000000000007 [ 2436.022918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2436.022926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfe37bc6d4 [ 2436.022934] R13: 00000000004cbcd6 R14: 00000000004e5990 R15: 00000000ffffffff [ 2436.022952] [ 2436.022959] Allocated by task 17677: [ 2436.022970] save_stack+0x45/0xd0 [ 2436.022983] kasan_kmalloc+0xce/0xf0 [ 2436.022994] __kmalloc+0x15d/0x750 [ 2436.023008] vc_do_resize+0x262/0x14a0 [ 2436.023019] vc_resize+0x4d/0x60 [ 2436.023030] vt_ioctl+0x1fe0/0x2530 [ 2436.023078] tty_ioctl+0x7f3/0x1510 [ 2436.023097] do_vfs_ioctl+0xd5f/0x1380 [ 2436.023108] ksys_ioctl+0xab/0xd0 [ 2436.023119] __x64_sys_ioctl+0x73/0xb0 [ 2436.023131] do_syscall_64+0xfd/0x620 [ 2436.023142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.023145] [ 2436.023149] Freed by task 0: [ 2436.023160] save_stack+0x45/0xd0 [ 2436.023170] __kasan_slab_free+0x102/0x150 [ 2436.023180] kasan_slab_free+0xe/0x10 [ 2436.023189] kfree+0xcf/0x220 [ 2436.023198] free_ctx+0x42/0x50 [ 2436.023211] rcu_process_callbacks+0xba0/0x1a30 [ 2436.023223] __do_softirq+0x25c/0x921 [ 2436.023226] [ 2436.023237] The buggy address belongs to the object at ffff88808af3fc80 [ 2436.023237] which belongs to the cache kmalloc-512 of size 512 [ 2436.023250] The buggy address is located 320 bytes inside of [ 2436.023250] 512-byte region [ffff88808af3fc80, ffff88808af3fe80) [ 2436.023254] The buggy address belongs to the page: [ 2436.023266] page:ffffea00022bcfc0 count:1 mapcount:0 mapping:ffff88812c31c940 index:0xffff88808af3f500 [ 2436.023276] flags: 0xfffe0000000100(slab) [ 2436.023296] raw: 00fffe0000000100 ffffea00022377c8 ffffea000263aa88 ffff88812c31c940 [ 2436.023314] raw: ffff88808af3f500 ffff88808af3f000 0000000100000003 0000000000000000 [ 2436.023321] page dumped because: kasan: bad access detected [ 2436.023324] [ 2436.023329] Memory state around the buggy address: [ 2436.023341] ffff88808af3fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2436.023350] ffff88808af3fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2436.023360] >ffff88808af3fd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2436.023366] ^ [ 2436.023377] ffff88808af3fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2436.023387] ffff88808af3fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2436.023393] ================================================================== [ 2436.023398] Disabling lock debugging due to kernel taint [ 2436.023579] Kernel panic - not syncing: panic_on_warn set ... [ 2436.023579] [ 2436.023598] CPU: 1 PID: 29808 Comm: syz-executor.2 Tainted: G B 4.19.88-syzkaller #0 [ 2436.023608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.023616] Call Trace: [ 2436.023632] dump_stack+0x197/0x210 [ 2436.023647] ? vcs_scr_readw+0xc2/0xd0 [ 2436.023660] panic+0x26a/0x50e [ 2436.023673] ? __warn_printk+0xf3/0xf3 [ 2436.023688] ? vcs_scr_readw+0xc2/0xd0 [ 2436.023705] ? preempt_schedule+0x4b/0x60 [ 2436.023719] ? ___preempt_schedule+0x16/0x18 [ 2436.023733] ? trace_hardirqs_on+0x5e/0x220 [ 2436.023746] ? vcs_scr_readw+0xc2/0xd0 [ 2436.023760] kasan_end_report+0x47/0x4f [ 2436.023774] kasan_report.cold+0xa9/0x2ba [ 2436.023789] __asan_report_load2_noabort+0x14/0x20 [ 2436.023802] vcs_scr_readw+0xc2/0xd0 [ 2436.023815] vcs_write+0x646/0xcf0 [ 2436.023835] ? vcs_size+0x240/0x240 [ 2436.023855] __vfs_write+0x114/0x810 [ 2436.023868] ? vcs_size+0x240/0x240 [ 2436.023881] ? kernel_read+0x120/0x120 [ 2436.023895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2436.023909] ? __inode_security_revalidate+0xda/0x120 [ 2436.023924] ? avc_policy_seqno+0xd/0x70 [ 2436.023936] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2436.023949] ? selinux_file_permission+0x92/0x550 [ 2436.023963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.023977] ? security_file_permission+0x89/0x230 [ 2436.023991] ? rw_verify_area+0x118/0x360 [ 2436.024004] vfs_write+0x20c/0x560 [ 2436.024018] ksys_write+0x14f/0x2d0 [ 2436.024032] ? __ia32_sys_read+0xb0/0xb0 [ 2436.024045] ? do_syscall_64+0x26/0x620 [ 2436.024059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.024072] ? do_syscall_64+0x26/0x620 [ 2436.024086] __x64_sys_write+0x73/0xb0 [ 2436.024104] do_syscall_64+0xfd/0x620 [ 2436.024118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.024129] RIP: 0033:0x45a849 [ 2436.024144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2436.024154] RSP: 002b:00007fcfe37bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2436.024173] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a849 [ 2436.024183] RDX: 000000000000050f RSI: 0000000020000600 RDI: 0000000000000007 [ 2436.024194] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2436.024205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfe37bc6d4 [ 2436.024216] R13: 00000000004cbcd6 R14: 00000000004e5990 R15: 00000000ffffffff [ 2436.025798] Kernel Offset: disabled [ 2436.714482] Rebooting in 86400 seconds..