6f0d6ef0a3cd8e5916036dbd53a5e3d4347f7fe4dc0866841c803ad51bb03e08fb0dda6a10efb159db1c9d0e8a54656d0134ab3e7e41738e3b84411b6664dc2b4a35a76fc4", @typed={0x4, 0xd}, @typed={0x8, 0x20, @uid=r1}, @typed={0x4, 0x46}]}, @typed={0x4, 0x7f}, @nested={0xc, 0x0, [@typed={0x8, 0x1e, @pid=r2}]}, @generic="5ef2ed98e064f98560596d4d5ac1965fc62d01f65886e29743f154450cd643905b595083dd3f55ef9e9355e363", @generic="a0d2f5ae71993423733461115f6a34ddef45bdc18f4d89adb32e737d5af6a68da891df90f08023ef6fba19fc55e02220e1bdb6debb48e97bf6f49eece899e5adee5f1536dcfcae4ae152d90e4939bec97ba74370e738678263cf1d20bc2bb0c7f08ad73a55faef787ceb7c3949e8e72fe72db10b5ee1046567de7d050a", @nested={0x5c, 0x24, [@generic="95e9290546628971789821404a86bdf0eb853f7559105c585c0982735bcee77cab8d69132c149d1f956bc3d945ff5b24945340f827d8db7f7de77d817ce8d8357e10e756821f871f6028a353aa6b61aac9bccd6870bb55"]}]}, 0x12fc}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004000) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r3, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername(r1, &(0x7f0000000100)=@hci={0x1f, 0x0}, &(0x7f0000000180)=0x80) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002d40)={@rand_addr, @multicast1, 0x0}, &(0x7f0000002d80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000002ec0)=0xe8) getpeername$packet(r1, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002fc0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000003000)={@remote, @loopback, 0x0}, &(0x7f0000003040)=0x62f8a0e82ca36c01) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000003080)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003180)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003200)={@loopback, 0x0}, &(0x7f0000003240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@ipv4={[], [], @empty}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000003540)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000003580)={@initdev, @remote, 0x0}, &(0x7f00000035c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003600)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003b00)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003c40)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000003d40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003d80)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000003e80)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000003ec0)={@local, @multicast1, 0x0}, &(0x7f0000003f00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003f40)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004040)=0xe8) getpeername(r1, &(0x7f0000004080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004100)=0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000004240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000004280)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000004380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000043c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000044c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004500)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000004600)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @local}, &(0x7f0000004740)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004780)={{{@in6=@ipv4={[], [], @initdev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000004980)={@multicast1, @initdev, 0x0}, &(0x7f00000049c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004a00)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000004b00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004b80)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000004c80)=0xffffffffffffff51) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000004cc0)={@rand_addr, @local, 0x0}, &(0x7f0000004d00)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000005100)={'bond_slave_0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000005140)={0x0, @local, @dev}, &(0x7f0000005180)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000051c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000052c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005300)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000005400)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000005d80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40802000}, 0xc, &(0x7f0000005d40)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\t\x00\x00', @ANYRES16=r3, @ANYBLOB="00032bbd7000fbdbdf250000000008000100", @ANYRES32=r4, @ANYBLOB="4c02020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r5, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c000400c0040101000000000101fa00650f0000853601ff00000000060001f0da000000080080027f0000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ff0f000008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r9, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400faffffff08000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001040000080007000000000008000100", @ANYRES32=r12, @ANYBLOB="800002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400f000000008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="e001020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040020000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400af0000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000008000100", @ANYRES32=r20, @ANYBLOB="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", @ANYRES32=r21, @ANYBLOB="2002020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000101000008000600", @ANYRES32=r25, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400070000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r26, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="08000100", @ANYRES32=r28, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400a3fdffff08000100", @ANYRES32=r29, @ANYBLOB="70010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r30, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r31, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400080000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400cb06000008000600", @ANYRES32=r32, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000008000008000600", @ANYRES32=r33], 0x900}, 0x1, 0x0, 0x0, 0x800}, 0x8000) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:27 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000), 0xe) dup3(r0, r1, 0xfffffffffffffffd) 23:37:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x7fff, 0x4) r2 = socket(0xa, 0x3, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000580)={0x6, 0x0, 0x6, 0xfffffffffffff801}, 0x0) r3 = semget$private(0x0, 0x4, 0x10) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000007c0)=[0x0, 0x2, 0x4, 0x1]) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x00\x01k\x00'}) socket(0x4, 0x1, 0xffffffffffffff66) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x2fe7, 0x100000000000000) semctl$GETNCNT(r3, 0x0, 0xe, &(0x7f0000000f80)=""/4096) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) dup3(r2, r0, 0x0) 23:37:27 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x0e@\x00', 0x101}) 23:37:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x410000) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000080)) 23:37:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 23:37:27 executing program 3: r0 = creat(&(0x7f0000000540)='./file0\x00', 0x81) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000300)={{0x2, 0x0, 0xfffffffffffff800}, 0xffffffff, 0x9, 'id0\x00', 'timer1\x00', 0x0, 0x80000000, 0x9, 0x3, 0xffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x3, 0xffffffffffffffff}, 0xffffffffffffff37) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket(0x40000000001e, 0x20000000000003, 0x7) setsockopt(r2, 0x3ff, 0x8, &(0x7f0000000100)="9b3295320f189b3385ae9ada586ab876a451f9cf47bf8c3822fd6e0d8f15da8a6f1b30871427b84f3182e8f3f9bac800aca5e0cd09791a894afe13bda1fb3ee85dbd0b0bde16530d20644f44543c1d90733a7156664274e993e3e51099524538fd184057c70476ec3a78c6498a67c6b8595f042a509a90", 0x77) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000440)={0x43}, 0x10) bind$netrom(r0, &(0x7f0000000240)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getsockopt(r2, 0x800000010f, 0x87, &(0x7f00004ad000), &(0x7f0000a3c000)=0xffffffad) syz_mount_image$bfs(&(0x7f0000000400)='bfs\x00', &(0x7f0000000580)='./file0/file0\x00', 0xffffffff, 0x5, &(0x7f0000001800)=[{&(0x7f00000005c0)="c954f9f9348f9176a893f72220fc156c0df3facd8fb9f97b2a5f3aa419315c940f44e20a7876a318ef0ddbe6973d4760ff887cf5925f5b06f6e4e8bfebb7593f95bffb49e26d11b804e443a155b718c6eb9f1a423d90cbe36a9fb1cc29d84f9709f399e5249adbf27a2a8e2710183d900175664679", 0x75, 0x6}, {&(0x7f0000000640)="0dc6fd291d520863e6c331cf3411eb895d7ad8c8ff38e52f274bc6ff1d9978ccf2409ec92ca42fa9b43b449ade1c99acda74ba06c87a57cf82ecc5e7bdf52da7f55ef6223ae0", 0x46, 0x3}, {&(0x7f00000006c0)="aa30e1d6ed484bff4dfddd32bf30b6f3207c9df4a541b85c8999c08a6095434ad057351fbcddaa8d9fee4633eb678fe6b9d5e35fd3356e4efe9e7f2c405aebbeb2314c9250974724951a0171ecda3a8239788a7edab9b701c07b76a28342fbc0d9fd7a6f97476624eac7bb2dc815ae4f79990b69e58ebf6a216e70ca48d840d407fc58c8623c44a880440be48de222cf1ca4fe7331d30af110e6c156c88b08289c4db6be405646c2bfc866c2e7ab48bf095b5677e9be222bfa909b9f19e4534ff522649034bf899fb89a9b1c350f9f6d846ed35a63d93fc04407686cf5dbdb41ce92c907639141318fe0d68cecee6e7c5f4ce4e0f25ba62211df08148a16a86945f7e8c607283b0b3878d39afd09bf3b6f9654535c78979d4a8f390adf989132a7d26574ba5bf9ad8d778b7abe78f98397a6a1a08bf55cc092c331d72a3f0f1790c15863bc5a17aa60b01c08c97de82efac2995bcd6a67eb106caa39cad0fb36242030acf415fe7f32f86bb080bbd9acf1c49efc4e9b1ed29402975f7979186e45b955df035d75f515580dbee1128dec80eb5e74b9d70699a279799a75038bb6c73fc5fa899ee1fdebde767b4f43b667624066e81ad4668ba5ca40dd66ff9a569bf0f394be4abeaaa7f023fafa20da3738b50d1be97355499b017c092eee1384b125c48a7229c4dfdb8745f938d9457bf39bbca157fa9a35ca74057068de69980b865dfd1d825c1c89585978f98d7f75498c05aec330458d149b5f96cccd3ed126f9f3ce2c2577d08279b685d0deb62aab73c5a51284879edd372bc6bf5956151c4481155b91bdd61762451d9d11fc044437b6b659df95f8fe1d1b0f478d9f935fdb9987a41869b5e8ee9f6a6981c31cb2c115d5eead718718f283cb45c406a90327e35ad9f828bdc1da3583c6085fd2432819291571ab749494844e19ccd1401ecc7eae0c00fc9cb4a3eb6574b086c42e52bd9fb4409fa1786280fabd4a048f65dcb0fd3080f9515260f808f2144e13efa65ad8227eb4e01818ba6cd33bf4e233917e70582e1cd58da6e60aeb51bd2f28af99f55e7c1bd4c69cde0d844001e2c8a95afcf89dbd5afd3137ec1cb09e72f461fe46bc3fae57ad24f7735c4cdd7497ad1c396e4dd0fd28b0b894a66c3bc23ff95357a86ce6bcd8ebe5ac60ac2085bc747a283654b6177eb3c317b42dd6b6620124737102b4cfb62076cf34467a42fc2dfdbddf94eacd70d1b7191906c90e29b42ff6ff3cb5b44422f87e03fab36aee1835d030e85bfefea36d42433e479e50a4c86f5036b8bb80f2b25fc2d520ef939b8bd5842c1c0b24b09d4ecc02facb02b7284b1974ec0d085edcb6356fe6aae45efeb2b4b2c0d19ae41201b597f7f55403d9fe994e538d53eac071810b8294cd45865d359874ca3926d79b7f602774ce910637485ec7be4f06405b0d7607846feeaa22943f7a06b33d182d513aa864222e9275d05f2962243d0f9decb6073963e7f6bd907bea5648d01ff2933784152aa5c905adc3966bffa5b9e782b9f0ece70384c5816c4bc1441de41d85a62813217916d123d089818b84242bf61dc6e13cbffe42f6ce1f3d270f98705db3bbc3ce02dbc1ee2422fe69cf6883e657d8f0081d835c1b760d382efba7c95cb9245edeb4bd4754b88638362a6a2c9b9a5464e2d1ba24010e0dd01dc6104f71beda65274952e4b519241a2940c0e4dc6b955aa79c3fcc638329d4fba7c84637f98b996cfa33ec5f263ad8c41eb058c5bc41fa1d385eb2f6c20c1467896d8679e0dec6bde66e9ccee10c085ebd74f16850a145414c40133744fa7b623a6cb50c933a35d62c8d5e6333e1f3693337d57855ca0e41d22cc2f6cab07bc31d4501b23bcaf6e0bdc0183b455b026f023df22d871ab8a7a8152133c9982412e5afa5383fe8199b81f9e2429c41125e222b685e8788f0bd7b760f6fe02a86b3c27140dc9490bb433b06ba82a425cc621e82f5bd3a285371eb3c490fbe214baf21630ef0211917ea5b742bc80233e52313a708767d3fe1d358dcf49c0bcf05ecf9421f5a7250b76506452b26b5ddc4f093964596eb01d792240731799fe695ece059d9eaa57abf0ed7923e0919386ef7f425cb41ea647ab1a1ca64d5ba24397c3160f3960d5a919fe6a7aee9af7d8d0719e92f5c99d0716148bcf2c9eaed31b9fb0b40f3631ba4fd69985a87235203d93ff1a125f23e1f94d5de421123057cd77c35ed6d6f4b1e111ad0c51149570465848ec60d35d0983b671af5b1af0f9528469ebc5354fce84aaddf5e80fb88e82b5341bc1b40c4570746a48d22bda3f44f76507da306ebab1f4ff0476e98434fc3c2605ef6e4cef4a239f897356cfa6d9d8110162d414f53f93af0e90ca52a21f06808e5c7e00d011b6e21f69713c3770308312dae9e91605bea29ffc5258c5b891025383d20538d7663483bf945f304d48803f3f951aecfd96de6f6559c9e4f6454644030c29682dd9133aeb51651666a9ebd82856549422e6fe91f1c5bf35a63e75dfc8eeb713c63590aa8bcf67f9b5318695aee37fef7bbb42d710bee04167279e0e8ac89bdc3403c36fbdeb0f84eaba285289bb08caa1ac7c23e684bfcca9a87d4faaaae6a695770cdc7871d5ebe8ed20b08a7ebfb8d7eaa04e8d7beb86e529d38060df49a3e358bc017a27b76ea2397084d5056769b8495a407c104b00c28874cc8d36d142c7d4c12e6111f13076c08c41299c1dbafb2625233dd916f6a70da733e9e47faf7fb0e5c24b2a5ca3d069f0d4125b0f9a98215516392d92621992e7190b4378e4fdcd1f999e0f0ab3f1dfa5002cdcddc97c87c1ecadf1f125523577dc02d22a520ba15b7f5b577e74d71c763546149da80dd52bdfbb0e8fc757a12a63400c4471d9a0b63852aeb60df54a606b86edea2d743a884305d9aba6f2eea5dff46ef0f911cc3e5a711f283f1f7cb52cb8d2649cc9ad27a4015161fef42d16ec613ff2b3d4ce52b97f88d8479fbfb7b6b07043f094ffe1eb67705aa65d8770267a2775d5dd53b9ccdd3c5f0716a5ede2c6a289898a7cde5483bf57e502914392d408e760a7063d7b52bc78088885d75b9381e8c26464e1123306823798bfbcfd1476a591716cc5804e3ec2698b00e97c6939b2f44a4db6cdd1f3b8df590475c2981ea0800ef26a3732035ce7598e9ab1497a0e2ae9fcd186831243f6f027d5947e69bc27ed0c0145437da8dafd7346daa027d759e5aabffc39be098d8b679ad2b346f4af6effe48540f7360ff7eab3f54d29125a207c40b29abb746eaef79df43d9c26b193b8be47e76519e8ef832dd5650f5bee8fe02b93b44af41e7455b0b828e24a8265dce803056677c898d0054f42c5c4159ad350448f2ebe8e86059f70a567941a36359a7dbadf6a0fe7d41d2f09fa16f181103aca8bcd8db62ea4a468ab527ecd8d4dec9c3f933432af2af3cd4decc3891d132a1400128911b105d581f67a388e396141699408e26b14c970376bc42f7d8c11ab530c29b5b7935e915a4bb2dd965cf65f20f589525b18c9995ac80f7858d96942e6477d142f6fde4b27e82abcc60fab1b42987452cac77c690f208c14a74e123f4f1e6a644fd8a4b730bf2fd7470adb7d0b269651d9f78c4bad3db2e19cd0b4062db2e3595fa2def3cf48c61e10174015deb1956f764e53f7cac11b55934965956c39d89a7c2e576f30b78f61579feb5f86eb22bfdb3afa9b06dcc68a586791bca311952dcf69b343454b87479db6511bb2f3352ca3c8f661166e8f950844be88a05756766cfe8da4018e0ae328bdbf7abbd9a3fc9d32d3d15d4b0fff487ab4f1ededa182386fb61754fd30a0a8476fdc999cd86a18d168cc85f23a6acd8e2b5ca8d9eebf3fe294efea5ee199fcd135de889f5b20dc5d814157fcd53c58132b5ad2d05d7e64fc5c5c6d53bf702f5f06d495a2cf859cb54729deb9d0ed213af0cd4e492abbeb8a74797d75d62d861413a27d8de0c3ef50b221206a62241194c1994efedf65aade7d4ed3cbde42f09f4aeb38310fcab2de4d903d3946e0f80cf8c698e1058c6f9e23e866248d33429f5aaae8e9e2a397ef75321f689ee947024fe79934f4b04b32c5dd4e4dc175f9485c16fd9a479525aa2db8906e6de16819f703a66e77a3dbab66ea9ea2854128b103066015614f65f02c631910e9f97308d9532ef6ddc270f2e39bfa3f9592652552c7f754556a1b1865055a2ac1464b7ba7b45bc85b56e01e60e961ed9654a1031899177843fe97140fb3f9e465d32b1d1c006a461d114f7101f9ecba7b92c9a5ffb79a6614901d8fe0199a5a17488d42892ae4a82be136928ad92058e26f26927c5a51572b95c0a4faabd541a543a997cf76be974398673de21c6cd338087117f3e29ec8513a7e7467c816e344271c59d23132b5453f3a9129658867e61cf0a3183b6f1d33c053ebf72318f249348154de99b9434e228c4ca6a5e13f3fe5f4127f5b0e2f96cea7c78e731b013f6e46ad4e79c9e0f3a73804adecf1568c7e08b82fd5c53bddedf22f9331bba9f8188a8e567f4048bfdd7dcd5f6d2a987231896e68604e51b6a8fd7b8dea68c0c9edf9f6d1f5d98c8224d3de5bba40e1626efc9c876aa790f50f2fe68f7747e1729e995f8bc8e07dfeb0ed24c80141f4c79e80ea87c7da0e42aa4413425f34fca9b41d7e97ed953bf84cffd3974516dafabf9fed1f22c7bd1234b2af5f00cb6ac3bfed41ff253440066b785584e50ac6eba214df76580609b81ff5e88f3a09321f901b9c72d6b2fc46b636dad0d51bd6536386233e77d4023ad1e481cb082f59551747e170667499c91f5ac85564a8ef1fdf5895074c279a172d833e6dc7005353517ab5bbce49ed9541ad1516523ee9442ffd819886bad9abb6757594eb164847847af17ec8b6cac83d8c1608095648ed3ab7d5293f5922fc47cce2ff6ec5b981c943d94601953311f1ebc358dc383a36b326561dcf902121a7df0186fc28bec2da78f3902dd92f44c0aa96c12e29cd32ab5f9c65fbee51bd54b10997d1123bee4aa76a3db6beb7c0b3ad37af4c9eca8f1ed960469f31eaa6136564d8f17fe811362b37917aeb1313f2531398c0fe51bf64b305eb069d883ead7f78197ec9709a06bf20dfd09e232b0790f7d26bf474d4d9361b441d4cd78c544626f47b3f331ed0a60f4e132fffe371746f5aeb5101b87ba9b44bc1bd902f99c445743ab64e22b967181bb5e36b327e6b654acaaa485bd4797e985a86ab2813b614ed3d4573106079dfb2cb4bf018e657aeeb1d430c553827932cede5fa9b1c19834910fbaf8d6e9f867ee272975578846398d0ae059f75dbb32454213bf1b9b96a3663dd67987d6074cfe7b093c859ac7cee8842a52ccb8298c95559a71d36e03dc88cc821d5bd29b60ba6349e2f3b220076c279947d67a90fca8c186550ce3f2b22181d68a88915ab66102bb41f89e1c12f29d2d2471dd2b2a2490bd01243e8e29ae0a270f048c43ecedb749c492bd237896b73910f2ae146f8b9eee0cd7f1ae3571758ae28e257ddf8e94935247c37ed7c1b4639e2aecdb53215c032349620d370164614c195cda8e98011b40b97ff492a8ef191e04798ed6011cfab8b2866eaaf540cb9d87760ec455b46dd615eee86f9f90398e69693a85796cd76d1fd6812a70a769823ad29a7f99177af19e5e46ee7e1f00b7ed603a6d2a68c99c4d8b6f22aa93401571a2b87717e31b67daededfcc754d2197960ef90b7ab15c5a4ddf315804d08a29a7bd0161802011e4994ce8472ec5b56c9d925", 0x1000, 0x80}, {&(0x7f00000016c0)="f3c7bfb5db140ff116fbf2a574c8188076a42442bdedf2", 0x17, 0x8}, {&(0x7f0000001700)="b78bd47d8a5bcb00162d07b684090cceaba00c4ade51c5fe52a3aad2d31f0fa256a08ab9751dba6852efda771bf947ab6ca3fe5e1e7bcf2529e6d3ad3ff4889e100deebf357701de65f301d28e43487b9b9946e77f57974aba8af771840518b1008c7f3ff9b98af7878ce0e34faa31c204956a3c8e1831e92b4f98222c321a775d302293c12798ca5e1cb7786b0e8466cb2fdf81c2f13dd617579a7319748de3b58a9ae2022c4e5fe1f5cb611bf18204df1ccc4e19fd5c088b3d2081959da23b3bc0d01f86d920165c1c4477aca32a1ecba5e9b1135c2513ae9ff477acb3dfe1c960932de53140c1", 0xe8, 0x10001}], 0x12420, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x8001, 0x5, 0x24, 0xeb7, 0x2}, 0x14) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0x3ff, 0x5, 0x4, 0x40000000, {}, {0x6, 0xc, 0x0, 0x9, 0x3, 0x7, "39a60434"}, 0x9, 0x7, @fd=r0, 0x4}) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000480)=""/163) write$input_event(r0, &(0x7f0000000000)={{0x0, 0x7530}, 0x12, 0x8, 0x6}, 0x18) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000200)=0x9cb4, 0x4) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) 23:37:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000240)={0x0, @aes256, 0x3, "b9b1036ee92826da"}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0xffffffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"3cf2f1bc69fd8d5bfff1434a4d61b815"}, 0x101, 0x0, 0x9}, @in={0x2, 0x4e22, @multicast1}}}, 0x118) fremovexattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00') 23:37:27 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x16@\x00', 0x101}) 23:37:27 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0xff1b) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x7f}, 0x0}, 0xa) 23:37:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080), 0x10) 23:37:27 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x35, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000500)='./bus\x00', 0x0) 23:37:27 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x17@\x00', 0x101}) 23:37:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x86, 0x0, &(0x7f0000000000)) 23:37:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x1, 0x2000}, 0x0}, 0x35c) 23:37:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x3f, 0x0, &(0x7f0000000080)=0x139) 23:37:27 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000800)=ANY=[], 0xfffffd5b) 23:37:28 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8080, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) prctl$PR_GET_THP_DISABLE(0x2a) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) tee(r0, r0, 0x3, 0x4) [ 834.012730][ C0] net_ratelimit: 18 callbacks suppressed [ 834.012738][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 834.024223][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 834.086655][ T2821] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 23:37:28 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x18@\x00', 0x101}) [ 834.179170][ T2821] CPU: 0 PID: 2821 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 834.188218][ T2821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.198266][ T2821] Call Trace: [ 834.201557][ T2821] dump_stack+0x172/0x1f0 [ 834.205891][ T2821] dump_header+0x10f/0xba6 [ 834.210310][ T2821] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 834.216125][ T2821] ? ___ratelimit+0x60/0x595 [ 834.220715][ T2821] ? do_raw_spin_unlock+0x57/0x270 [ 834.225824][ T2821] oom_kill_process.cold+0x10/0x15 [ 834.225841][ T2821] out_of_memory+0x79a/0x1280 [ 834.225859][ T2821] ? lock_downgrade+0x880/0x880 [ 834.225875][ T2821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.225893][ T2821] ? oom_killer_disable+0x280/0x280 [ 834.240468][ T2821] ? find_held_lock+0x35/0x130 [ 834.240494][ T2821] mem_cgroup_out_of_memory+0x1ca/0x230 [ 834.240511][ T2821] ? memcg_event_wake+0x230/0x230 [ 834.267193][ T2821] ? do_raw_spin_unlock+0x57/0x270 [ 834.272310][ T2821] ? _raw_spin_unlock+0x2d/0x50 [ 834.277172][ T2821] try_charge+0x118d/0x1790 [ 834.281683][ T2821] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 834.287229][ T2821] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 834.292768][ T2821] ? find_held_lock+0x35/0x130 [ 834.292784][ T2821] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 834.292812][ T2821] __memcg_kmem_charge_memcg+0x7c/0x130 [ 834.292827][ T2821] ? memcg_kmem_put_cache+0xb0/0xb0 [ 834.292846][ T2821] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 834.292864][ T2821] __memcg_kmem_charge+0x136/0x300 [ 834.292884][ T2821] __alloc_pages_nodemask+0x437/0x7e0 [ 834.292896][ T2821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.292915][ T2821] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 834.313888][ T2821] ? copy_process.part.0+0x1d35/0x79e0 [ 834.313907][ T2821] ? lockdep_hardirqs_on+0x418/0x5d0 [ 834.313923][ T2821] ? trace_hardirqs_on+0x67/0x230 [ 834.313938][ T2821] ? kasan_check_read+0x11/0x20 [ 834.313959][ T2821] copy_process.part.0+0x3e0/0x79e0 [ 834.313978][ T2821] ? psi_memstall_leave+0x11c/0x180 [ 834.373203][ T2821] ? kvm_sched_clock_read+0x9/0x20 [ 834.378325][ T2821] ? psi_memstall_leave+0x12e/0x180 [ 834.383524][ T2821] ? find_held_lock+0x35/0x130 [ 834.388298][ T2821] ? __lock_acquire+0x55d/0x4710 [ 834.393255][ T2821] ? __cleanup_sighand+0x60/0x60 [ 834.398198][ T2821] ? mark_held_locks+0xf0/0xf0 [ 834.402963][ T2821] ? debug_smp_processor_id+0x3c/0x280 [ 834.408421][ T2821] ? perf_trace_lock_acquire+0xf5/0x580 [ 834.413963][ T2821] ? rcu_read_lock_sched_held+0x110/0x130 [ 834.419678][ T2821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 834.425932][ T2821] _do_fork+0x257/0xfd0 [ 834.430106][ T2821] ? fork_idle+0x1d0/0x1d0 [ 834.434529][ T2821] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 834.440596][ T2821] ? lock_downgrade+0x880/0x880 [ 834.445453][ T2821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.451698][ T2821] ? blkcg_exit_queue+0x30/0x30 [ 834.456552][ T2821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.462013][ T2821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.467488][ T2821] ? do_syscall_64+0x26/0x610 [ 834.472168][ T2821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.478235][ T2821] ? do_syscall_64+0x26/0x610 [ 834.482918][ T2821] __x64_sys_clone+0xbf/0x150 [ 834.487601][ T2821] do_syscall_64+0x103/0x610 [ 834.492199][ T2821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.498098][ T2821] RIP: 0033:0x45a7f9 [ 834.501994][ T2821] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 834.521595][ T2821] RSP: 002b:00007ffd44e54c98 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 834.530003][ T2821] RAX: ffffffffffffffda RBX: 00007f661b966700 RCX: 000000000045a7f9 [ 834.537981][ T2821] RDX: 00007f661b9669d0 RSI: 00007f661b965db0 RDI: 00000000003d0f00 [ 834.545956][ T2821] RBP: 00007ffd44e54ea0 R08: 00007f661b966700 R09: 00007f661b966700 [ 834.553926][ T2821] R10: 00007f661b9669d0 R11: 0000000000000202 R12: 0000000000000000 [ 834.561893][ T2821] R13: 00007ffd44e54d4f R14: 00007f661b9669c0 R15: 000000000073c04c [ 834.583479][ T2821] memory: usage 307156kB, limit 307200kB, failcnt 1734 [ 834.590701][ T2821] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 834.616962][ T2821] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 834.629874][ T2821] Memory cgroup stats for /syz2: cache:1336KB rss:236108KB rss_huge:204800KB shmem:1232KB mapped_file:1320KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1196KB active_anon:236100KB inactive_file:0KB active_file:0KB unevictable:0KB [ 834.690790][ T2821] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12255,uid=0 [ 834.738848][ T2821] Memory cgroup out of memory: Killed process 12255 (syz-executor.2) total-vm:72580kB, anon-rss:2200kB, file-rss:35804kB, shmem-rss:0kB 23:37:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:28 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x90, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x83, @mcast1, 0x10000}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x40, @remote, 0x4}, @in6={0xa, 0x4e20, 0x2, @local, 0x2}, @in6={0xa, 0x4e21, 0x8102, @empty, 0x64f4000000000000}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r2, 0x1}, 0x8) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000001c0)={0x20}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000200)=0xd) r3 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f0000000040)=""/87, &(0x7f00000000c0)=0x57) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r2 = dup2(r1, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote, 0x4e24, 0x7, 0x4e21, 0x9, 0xa, 0x0, 0x80, 0xff, r3, r4}, {0x8e, 0x1ff, 0x9, 0x3, 0x9, 0x7, 0x1, 0x400}, {0x2, 0x7, 0x6, 0x7}, 0xb6f5, 0x0, 0x2, 0x0, 0x2, 0x3}, {{@in6=@mcast2, 0x4d4, 0xff}, 0xa, @in6=@mcast1, 0x3507, 0x0, 0x1, 0x7, 0xc0, 0x5, 0x1f}}, 0xe8) 23:37:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x6, 0x40000000000001e, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 23:37:28 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'loH@\x00', 0x101}) 23:37:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfmno', @ANYRESHEX, @ANYRESHEX]) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80, 0x0, 0x200000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 834.892768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 834.898593][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 834.904453][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 834.910218][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:29 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x10000011, r0, 0x0) 23:37:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000080)={0x8001, 0x2, 'client0\x00', 0xffffffff80000000, "ddb2f0530658b326", "f6e235763fa873faf0876fb16a5fe159de89348ff4439c3c391eb616dcdc1ba0", 0x0, 0x423fee73}) 23:37:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000100), 0x20) sendmmsg$unix(r1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@cred={0x18}], 0x18}], 0x1, 0x0) 23:37:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000400)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000009000)=r1, 0x4) dup3(r0, r2, 0x0) 23:37:29 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'loL@\x00', 0x101}) [ 835.212754][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.218562][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 835.218662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.230102][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:37:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@rand_addr="94287c0c7a48c0f27adf9b9ac3bcf9eb", @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0xdb4, 0x4e23, 0x6, 0x2, 0xa0, 0x20, 0xbf, 0x0, r2}, {0x81, 0x1, 0x4, 0x5, 0x1, 0x80000001, 0x1000, 0xfffffffffffffff8}, {0x5, 0x8, 0x3ff, 0x10001}, 0x3, 0x6e6bb8, 0x3, 0x0, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x3b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x1, 0x6000000000000, 0x80000000000, 0x8, 0x7}}, 0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000002c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6e, r1}) r3 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x4, 0x1) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x2de) 23:37:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000000)=ANY=[], 0x0) 23:37:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}]}) 23:37:29 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0x800, {{0xa, 0x4e23, 0x7, @mcast1}}, 0x1, 0x4, [{{0xa, 0x4e20, 0xbc, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xbd00}}, {{0xa, 0x4e22, 0x20, @remote, 0xf083}}, {{0xa, 0x4e24, 0xd99, @ipv4={[], [], @local}, 0x2}}, {{0xa, 0x4e22, 0x3f, @loopback, 0x1000}}]}, 0x290) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000007c0)={'sit0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000012000)={&(0x7f0000000200)=ANY=[@ANYBLOB="a443cfd83ba67b2b3f42"], 0x1}}, 0x0) 23:37:29 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo`@\x00', 0x101}) 23:37:29 executing program 5: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 23:37:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) sendmmsg(r0, &(0x7f0000001400)=[{{&(0x7f0000000080)=@isdn={0x22, 0x0, 0x20, 0x671, 0x8}, 0x80, &(0x7f0000001380)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000100)="766fd8aecfd4a00cc2d03628d8af404a2c2d96418f51ec0315e46ce827def3ca90fe0325b0b1d66311ae6dc09acd91274b59c27a434f5b3b793ad8d5e1d2f9d225a32b69253b9f7e0ecfab386224eb927d5e6e7b140dbd", 0x57}, {&(0x7f00000011c0)="1982d9f1ede870f26e44d2224aa41489af036b2f53da6a1720cc9af390dbb0c57cf56251668719f37f82859f11ffbeabfa5b8922a5dd78b01054b7323b993a446afe7025bc796a99314bdc6e12024dcecaf548bb261c4e2f914d8559e4816beb", 0x60}, {&(0x7f0000001240)="066f8f71ab71c41458440643553e41efefa643712f32e6ff82620b964fd1a645fa9964e6c911bbf4beb1d2a28478ce84e71fe5f2dc7da40b96488c75c961090cdba00c4c8282c354406a6e3fd0deb5f8fbd547c862f27f96972626a426bc949ffd1cff1725c3380897a9bb98a2a5b1caf67036a1f5713a", 0x77}, {&(0x7f00000012c0)="e86c5536ddb57b1deade6ebf085401f728ce46179f6f57ce0142d7de0932624b874578162eaf9d58fd37b2b1f516a6c36992721af85fe0d92d899f9f971f73239c10c2015004a114117784b388ecd9b9b8e53db28b297cc026e0c96e65138289965f839fb85146ff2748c426764db570a692d1f1fded0a9f80a3ab7e066f4b5c7694bcc15057", 0x86}], 0x5}, 0x8974}], 0x1, 0x20000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001440)='/dev/snapshot\x00', 0x48200, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000001480)=ANY=[@ANYBLOB="090000000012000001000080000000000800000000000000ff0f000000000000060000000000000006000000000000000400000000000000020000000000000000388303000000000300000000000000"]) r2 = semget(0x0, 0x4, 0x40) semop(r2, &(0x7f0000001500)=[{0x3, 0x9}], 0x1) 23:37:30 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'loh@\x00', 0x101}) 23:37:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = geteuid() ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000000)={0x3, @null, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000080)={0x6, 0x55, [{0x100000000, 0x0, 0x1}, {0x866}, {0x3}, {0x0, 0x0, 0x7}, {0x0, 0x0, 0x7}, {0xfffffffffffff78e, 0x0, 0x2}]}) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 23:37:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0xfffffffffffffebc) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xfffffffffffff12a}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1}, 0x8) 23:37:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c344ee9dc01497f542f542b0796e0266420fe2e33edb11aa6114f241d1e7d3196f") r2 = gettid() ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x8001004000000016) 23:37:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x100000001, 0x0, 0x10003, 0x10001}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000080)={r3, 0x8000}) 23:37:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x40) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:30 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lol@\x00', 0x101}) [ 836.734955][ T3003] EXT4-fs (sda1): Cannot specify journal on remount 23:37:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/97, 0x61) r2 = fcntl$dupfd(r1, 0x4, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xfff, 0x7, 0x9, 0x8000, 0x19f8, 0x7fff}, 0x5}, 0xa) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x6, 0x9, 0x1, 0x0, [0x0]}}, 0x29) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000001c0)={0x4, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000200)={r3, 0x7fffffff}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x4001) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000001c0)={{0x4, 0x2, 0x40cbb30e, 0x2, 'syz0\x00', 0x1}, 0x0, 0x2, 0x6, r2, 0x1, 0xffff, 'syz1\x00', &(0x7f00000000c0)=['\x00'], 0x1, [], [0x5, 0x6, 0x1]}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000100)=0x4, 0x4) ioctl(r1, 0x4, &(0x7f0000000300)="247a55f85af28d3d9981ce3249888bc0d58dd7bb20ea675c909abf54ede633d22d6ac28a00bf28a6337b4e2e71cce03cfa78ab1c9e66b4847513ac1e7218f2cbb863f40f469c2bb4ec62af47830afa06961d101cae683dc523c4e24693b97f130c776fb822bafb0c7b361b0c6d524d82c040f977a7639a1c4505f81333141040ebfaeffeaaee05fbd8f0be427af3b0253846884d5f9ec7b7fecede438a825b37183b80a7ce2a4253f8d070e3780b5d83eb2d2591bea91665f6ec3a46117c396b9e35390f3037ac56e1") getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 836.834772][ T3025] EXT4-fs (sda1): Cannot specify journal on remount [ 836.903490][ T7496] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 836.932357][ T7496] CPU: 0 PID: 7496 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 836.941398][ T7496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.951458][ T7496] Call Trace: [ 836.954759][ T7496] dump_stack+0x172/0x1f0 [ 836.959083][ T7496] dump_header+0x10f/0xba6 [ 836.963506][ T7496] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 836.969306][ T7496] ? ___ratelimit+0x60/0x595 [ 836.973897][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 836.979005][ T7496] oom_kill_process.cold+0x10/0x15 [ 836.984115][ T7496] out_of_memory+0x79a/0x1280 [ 836.988787][ T7496] ? lock_downgrade+0x880/0x880 [ 836.993631][ T7496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.999873][ T7496] ? oom_killer_disable+0x280/0x280 [ 837.005086][ T7496] ? find_held_lock+0x35/0x130 [ 837.009865][ T7496] mem_cgroup_out_of_memory+0x1ca/0x230 [ 837.015615][ T7496] ? memcg_event_wake+0x230/0x230 [ 837.020649][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 837.025772][ T7496] ? _raw_spin_unlock+0x2d/0x50 [ 837.030621][ T7496] try_charge+0x118d/0x1790 [ 837.035130][ T7496] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 837.040666][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 837.046203][ T7496] ? find_held_lock+0x35/0x130 [ 837.050973][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 837.056519][ T7496] __memcg_kmem_charge_memcg+0x7c/0x130 [ 837.062054][ T7496] ? memcg_kmem_put_cache+0xb0/0xb0 [ 837.067248][ T7496] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 837.073493][ T7496] __memcg_kmem_charge+0x136/0x300 [ 837.078613][ T7496] __alloc_pages_nodemask+0x437/0x7e0 [ 837.083985][ T7496] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 837.089707][ T7496] ? copy_page_range+0x125a/0x1f90 [ 837.094808][ T7496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 837.101048][ T7496] alloc_pages_current+0x107/0x210 [ 837.106152][ T7496] pte_alloc_one+0x1b/0x1a0 [ 837.110645][ T7496] __pte_alloc+0x20/0x310 [ 837.114974][ T7496] copy_page_range+0x1529/0x1f90 [ 837.120015][ T7496] ? mark_held_locks+0xf0/0xf0 [ 837.124787][ T7496] ? pmd_alloc+0x180/0x180 [ 837.129198][ T7496] ? __rb_insert_augmented+0x231/0xdf0 [ 837.134648][ T7496] ? validate_mm_rb+0xa3/0xc0 [ 837.139339][ T7496] ? __vma_link_rb+0x279/0x370 [ 837.144102][ T7496] copy_process.part.0+0x5acb/0x79e0 [ 837.149402][ T7496] ? __cleanup_sighand+0x60/0x60 [ 837.154354][ T7496] _do_fork+0x257/0xfd0 [ 837.158517][ T7496] ? fork_idle+0x1d0/0x1d0 [ 837.162943][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 837.168406][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 837.173860][ T7496] ? do_syscall_64+0x26/0x610 [ 837.178532][ T7496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.184590][ T7496] ? do_syscall_64+0x26/0x610 [ 837.189263][ T7496] __x64_sys_clone+0xbf/0x150 [ 837.193935][ T7496] do_syscall_64+0x103/0x610 [ 837.198524][ T7496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.204410][ T7496] RIP: 0033:0x4563fa [ 837.208301][ T7496] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 837.227893][ T7496] RSP: 002b:00007ffd44e54f20 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 837.236294][ T7496] RAX: ffffffffffffffda RBX: 00007ffd44e54f20 RCX: 00000000004563fa [ 837.244259][ T7496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 23:37:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:31 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lot@\x00', 0x101}) 23:37:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x800000000406, r1) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x8) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@broadcast, @in=@initdev}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) [ 837.252224][ T7496] RBP: 00007ffd44e54f60 R08: 0000000000000001 R09: 0000000001ce2940 [ 837.260187][ T7496] R10: 0000000001ce2c10 R11: 0000000000000246 R12: 0000000000000001 [ 837.268149][ T7496] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 23:37:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20200, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 837.390140][ T3045] EXT4-fs (sda1): Cannot specify journal on remount [ 837.422868][ T7496] memory: usage 307136kB, limit 307200kB, failcnt 1787 [ 837.429784][ T7496] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 837.464472][ T7496] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 837.485633][ T7496] Memory cgroup stats for /syz2: cache:1336KB rss:236012KB rss_huge:204800KB shmem:1228KB mapped_file:1320KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1196KB active_anon:236112KB inactive_file:0KB active_file:0KB unevictable:0KB [ 837.515411][ T7496] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=2862,uid=0 [ 837.549251][ T7496] Memory cgroup out of memory: Killed process 2862 (syz-executor.2) total-vm:72712kB, anon-rss:2216kB, file-rss:35792kB, shmem-rss:0kB 23:37:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:32 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0xd2) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x1c, 0x10, 0x17, 0x9, 0x0, 0x0, 0x1, 0x14d, 0xffffffffffffffff}) r2 = dup(r0) r3 = fcntl$dupfd(r2, 0x0, r0) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:32 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'loz@\x00', 0x101}) 23:37:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) memfd_create(&(0x7f0000000000)='trustedbdevppp0locpuset\x00', 0x6) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 838.997141][ T3085] EXT4-fs (sda1): Cannot specify journal on remount 23:37:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000000000000, 0x40) recvfrom$ax25(r1, &(0x7f0000000080)=""/28, 0x1c, 0x21, &(0x7f00000000c0)={{0x3, @null, 0x4}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) getsockopt$inet6_buf(r0, 0x29, 0x80000000000032, 0x0, &(0x7f0000000040)=0xa02d0445ae9a689b) 23:37:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x4) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001680)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000017c0)={@rand_addr="923a8a8f761882923e90ec024caa511d", 0x35, r2}) r3 = dup(r1) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101000, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) 23:37:33 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\xfc@\x00', 0x101}) 23:37:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) r2 = dup(r0) r3 = fcntl$dupfd(r2, 0x0, r0) prctl$PR_SET_UNALIGN(0x6, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 839.292771][ C0] net_ratelimit: 12 callbacks suppressed [ 839.292778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 839.304271][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 839.310079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 839.315857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 839.328598][ T3140] EXT4-fs (sda1): Cannot specify journal on remount 23:37:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3e, &(0x7f00000000c0)=@routing={0x0, 0x8, 0x0, 0x2, 0x0, [@dev={0xfe, 0x80, [], 0x2a}, @rand_addr="84ad3cecfe6c7804abad257210118856", @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x48) r1 = fcntl$dupfd(r0, 0x406, r0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{0x4, 0x0, 0x7, 0x3, 'syz1\x00', 0x81}, 0x6, 0x200, 0x4, r2, 0x1, 0x2, 'syz1\x00', &(0x7f0000000080)=['selinux$.!\\trusted\x00'], 0x13, [], [0x43, 0x0, 0xafe, 0xaedf]}) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 839.372839][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 839.378726][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 839.384606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 839.390353][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:37:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:33 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x10001, 0x8, 0x40, {0x0, 0x1c9c380}, 0x7, 0x9}) sync_file_range(r0, 0xffffffff80000001, 0x0, 0x5) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) getsockopt$inet6_buf(r0, 0x29, 0xfb, 0x0, &(0x7f00000001c0)=0xfd7d) 23:37:33 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\xfd@\x00', 0x101}) 23:37:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0xb, @sdr={0x32314d4e, 0x4}}) 23:37:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) 23:37:33 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x4, 0x5, 0x2b0e, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e24, @remote}}}, 0x84) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:34 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:34 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00\xc0\x00', 0x101}) 23:37:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) 23:37:34 executing program 3: mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x7, 0x4) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x400000, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000200), 0x4) vmsplice(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="c2b067fe2d7be2913fc6cdd1df86e25aa23679d7d275a8d2d2ca80ce23023af744c54c6693d345df5f23e12546b36a24978024f90b76e3952040489d02fb1e46d31cccf329d59f7d0ca99b2adce880f43aa9f85805815772f9e5e7bb5f0926b2d439e8a5d607405546e1b9162b6c1f5e6d8f0ca3f9f0a07e1303f1c139d52867d59b67db19073f767fcbe0602f2ebe86c135a6d8214c7dec0dad29d8c1f9d929166950aafed8095511f51d7b84296b0a07ee9fc65429c40b2517b24cb3cab2ba0e3659e9ced0f74d701908f9474154df54369cc44cd9cee24aa5156c374ac255ca0a8792e2a91227b085739ed9edde612ba076e1fcafc0fd94", 0xf9}, {&(0x7f0000000180)="b642f96b27932149867d31", 0xb}], 0x2, 0x1) [ 840.174398][ T3254] device lo entered promiscuous mode 23:37:34 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = getpgrp(0x0) ptrace$setregset(0x4205, r1, 0x7, &(0x7f0000000100)={&(0x7f0000000040)="8e2a08cee3e0126f729cc369fe26f4e159a1dc6e5514b4f431ce4baad9cb29f5c5ca02055d18a9c50312ad221df05ff7e0ab47adb9d3ced40e5de22da2408f4bf033097a28bd77f3666e032bcf62797666dc35a0dcf7f4a36e7fcac43adbcbb64c7b16e05bcf621c1bd1b1eae575c758b1070fe54796c47d9495e971faba5c56475091206a2170d9e679acc26b89c4f3d07099f8cfd2683b9857f828fe", 0x9d}) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) [ 840.228352][ T3272] device lo left promiscuous mode [ 840.262762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 840.268653][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:34 executing program 3: mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:34 executing program 3: mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:34 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x4be, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000000)) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:34 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x462600, 0x0) io_setup(0x100, &(0x7f0000000280)=0x0) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x6, r0, &(0x7f00000002c0)="0c20552eaca4a2bc83bd56dcdf96f39642459d0cd0be87dc5a3a088aee82088208f050fa1def8b56bcc72c6a03e9868f48da8eef7ab37f9545c3a49b90c4897da0ddac8a4d1d2745860dd04096b49377c705fbd9984e67a0520a246ea37684914807142e3409c76e2c7af5e62578cc9ec3eb522ecc5a957b5d41f8a463f98df343c01b214563916cfbd1d03f52e0abdba3c02a90750f24687eb136c2850861040fbd8f29ccff1a4546b96e4df4a5956a09828f8cf324275dbd88eab0b8d02b725316af1c75339f6157089b1a6f151f14796a5e2ff4ee271adafbf3c76ba9ac0cfc36aa5156bca1b591b967e713e50b70515710131c208e30", 0xf8, 0x2, 0x0, 0x0, r1}, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0x3b, @multicast1, 0x4e24, 0x2, 'sed\x00', 0xa, 0x81, 0x45}, 0x2c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/130, &(0x7f0000000000)=0x82) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14, 0x67, 0x1, {0x20, 0x0, 0x4}}, 0x14) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x101000) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000140)=0x66fc712a3914d468) 23:37:34 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 840.760512][ T3273] device lo entered promiscuous mode 23:37:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x37, @dev={0xfe, 0x80, [], 0x1d}, 0x8}}, [0xe9fa, 0xfffffffffffffffa, 0x0, 0x3, 0x8f, 0x3f84, 0x27f3, 0xfff, 0x1000, 0x3, 0x3, 0x4, 0xffffffff, 0xa69, 0x3]}, &(0x7f0000000000)=0x100) io_setup(0xffff, &(0x7f0000002300)) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000022c0)=[0x1, 0x4], 0x2) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x5, 0x354b4fa3, 0x9, 0x3}, {0x3ff, 0x2, 0x6, 0x7a}, {0x1000, 0x40, 0x200, 0x80}, {0x0, 0x3, 0xff, 0x1}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000002380)={r3, 0x2}, 0xc) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000002340)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002880)={'gre0\x00', 0x0}) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000028c0)={r4, 0x80, 0x6, 0x3, 0x4, 0x5, 0x5c}) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000240)={0x3, 0x0, 0x2080, {0xd000, 0x10004, 0x1}, [], "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", "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"}) 23:37:34 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x02\xc0\x00', 0x101}) 23:37:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) [ 840.862835][ T3318] device lo left promiscuous mode 23:37:34 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = dup2(r0, r0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x1) 23:37:35 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x38ed, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x7fe00000000000}, 0x2) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:35 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x0e\xc0\x00', 0x101}) 23:37:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:35 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@security={'security\x00', 0xe, 0x4, 0x5a0, 0x0, 0x0, 0x3c8, 0x140, 0x0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4, &(0x7f0000000080), {[{{@ipv6={@remote, @ipv4={[], [], @rand_addr=0x2}, [0xff0000ff, 0xffffffff, 0x0, 0xff], [0xffffffff, 0xff000000, 0xff000000, 0xffffffff], 'veth0\x00', 'yam0\x00', {}, {0xff}, 0x88, 0x80000000, 0x2, 0x2f}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x3, 0xb1, 0x5, 0x22, 0x1}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x7, 0x5}}}, {{@uncond, 0x0, 0x228, 0x288, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7}}, @common=@rt={0x138, 'rt\x00', 0x0, {0xc9, 0xfffffffffffffff8, 0x40, 0x7, 0x1, 0x3, [@remote, @remote, @empty, @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @local, @remote, @ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, @dev={0xfe, 0x80, [], 0x10}, @remote, @local, @dev={0xfe, 0x80, [], 0x10}, @dev={0xfe, 0x80, [], 0x26}, @rand_addr="b9f8db46ea409c2401331dd2fe881bbe"], 0xa}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@multicast1, [0xffffffff, 0xffffffff, 0xffffffff, 0xff000000], 0x4e21, 0x4e20, 0x4e20, 0x4e23, 0x3, 0x1396, 0x1, 0xffffffffffff0001, 0x3ff}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffff00, 0xffffffff, 0xff0000ff], 'syzkaller0\x00', 'netdevsim0\x00', {0xff}, {}, 0x3e, 0x2, 0x0, 0x51}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x9, 0xffffffffffff0000, 0x4, 0x200, 0x2, 0x100000000, 0x5, 0x7]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x600) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x82001, 0x0) 23:37:35 executing program 0: r0 = socket$inet6(0xa, 0xfffffffffffffff7, 0x1800000000000000) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5e7e) 23:37:35 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) [ 841.703596][ T3379] QAT: Invalid ioctl [ 841.729122][ T3389] QAT: Invalid ioctl 23:37:35 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000000c0)={0x2, 0x5}) r2 = dup(r0) openat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x389000) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) geteuid() 23:37:35 executing program 0: r0 = socket$inet6(0xa, 0x80e, 0x5e) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:35 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:36 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00\x02\x00', 0x101}) [ 842.071853][ T3422] device lo entered promiscuous mode [ 842.093395][ T3422] device lo left promiscuous mode [ 842.285363][ T3425] device lo entered promiscuous mode 23:37:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) r3 = openat$cgroup_ro(r1, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000140)) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_opts(r3, 0x0, 0x0, &(0x7f0000000080)="e0e4f8cc1ee2875cac4a690ea5669a3eaed5285e7eadcf54cf91f40631b9bfa12e39943e6af1aef63bd0220516cb052c980d4777dbcdf2cd4a276ee56d31e513658b6667ec2c76d0dc66781af1399f49e7df339f6faa4020b5b78065970c140e9d91679c8a6c", 0x66) fcntl$dupfd(r2, 0x0, r2) 23:37:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x48100, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0, 0x6}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:36 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:36 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00\xc0\x00', 0x101}) [ 842.561769][ T3436] device lo left promiscuous mode 23:37:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x7b, 0xe, 0x1, "c15b9029b656df736c29790d4d80bb43bad6d83f905b047244f5c5108345e5d9", 0x4f565559}) getsockopt$inet6_buf(r0, 0x29, 0xff, 0x0, &(0x7f0000000040)=0x17) 23:37:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2, 0x9}, 0x0}, 0xa) 23:37:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180), 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') bind$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x9, 0x8001, 0x8, 0xffffffffffffffff, 0x28, 0x8000}, 0x3}, 0xa) 23:37:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0x5f9fe431, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) 23:37:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x800000000000000c}, 0x4) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000080)={0xfffffffffffffffe}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 843.301529][ T3445] device lo entered promiscuous mode [ 843.310779][ T3445] device lo left promiscuous mode 23:37:37 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00\xc0\x02\x00', 0x101}) 23:37:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x10000, 0x0, 0x8000, 0xe4b0, 0x3}, 0xc) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'veth0\x00', 0x9}) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/9) [ 843.488885][ T3503] device lo entered promiscuous mode [ 843.563196][ T3506] device lo left promiscuous mode 23:37:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x0, [], [{0xfb4, 0x10cd45ae, 0x7fff, 0x9, 0x8001, 0x100}, {0x9c43, 0x3, 0x40, 0x0, 0x3, 0x7d}], [[]]}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000000)={0x1}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) getdents64(r2, &(0x7f0000000100)=""/15, 0x29) 23:37:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) getpeername(r2, &(0x7f0000000080)=@in={0x2, 0x0, @empty}, &(0x7f0000000000)=0x80) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x55, 0x40, 0x52, 0x1, 0x3, 0x3f, 0x278, 0xd4, 0x38, 0x206, 0x4, 0x0, 0x20, 0x1, 0x10001, 0x71e0, 0xfffffffffffff62d}, [{0x6, 0x5, 0x9, 0x100000001, 0x91, 0x9, 0x6, 0x6}, {0x70000006, 0x6, 0x902, 0x1fffffffc000, 0xf026, 0x3, 0x2, 0x8}], "cc7d7221e92d6c416dbcdc70d5d0b8303f8506d8042e2bac6eac430cf4f07ba40306e184595ac54ddc3a792a76951e972ab2f33cbc632d7911ba24aab7e1446615dc1e9d4eef1c6207c9394966c12369e771bc770ce8fcb99a986d7d18eb3135781625c0103a1a72e5a29c020cf153802076396a93caf980ac887f2ba167122347e59bef54cc82e10edee9535b1379aee3a98c03d99780f89e15c184dbd3d9f106157a", [[], [], []]}, 0x41b) 23:37:37 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x101400, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @multicast1}, 0x9, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)='veth0_to_team\x00', 0x8, 0x4, 0x9}) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x20000) fsetxattr$security_evm(r1, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "29ebc16a874156b1f1fbb2fa612401d6"}, 0x11, 0x2) socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000080)=0x5, 0x48678d0a789c357b) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x408040) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x2, 0xfffffffffffeffff, 0x200, 0x8000, 0x2, 0x23, 0x11, "8217d5e386c6a22d91fa80a96c0b8655257f8327", "b101a234e9413819d51b140d30250a124fbc9e4b"}) getsockopt$inet6_buf(r2, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 844.114930][ T3518] device lo entered promiscuous mode [ 844.125450][ T3518] device lo left promiscuous mode 23:37:38 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00\xc0\x0e\x00', 0x101}) 23:37:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:38 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x20000000002}, 0x0}, 0xa) 23:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x3b, 0x0, &(0x7f0000000000)) [ 844.307117][ T3557] device lo entered promiscuous mode 23:37:38 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x400000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xd3, "384186699c54389c7e3dd2a4a9ffd286381296171e892d3b09214e8292274dac74caff3faed6873bdc010ecec15d613601bf0b417b0ee3ec9627d9f58bc884694bf5832d1cca9dc0b86427b65b7d68c31efef01db78b3ad3abe7a49c6aa94651129d37fec20706530347ff25c35cd256b506179c82f8c08bb2e0d73054aa18653ca998b8ae7b733310a89d75b97331924ebcd09fed6982807cc9d8794c04a06893e41312926eb5e695b19724691b52d73d574cd71c17b74249990166115ec4f394d01c65248893bb43f27a0431012761fab8aa"}, &(0x7f0000000000)=0xdb) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0xc1, "fc8d135e914e919b5ba393c351c35b756bd9d0c68fe47a932186f47bea6e390fcb9c84ef2cf9ab0af6492926b89f04389d75dc38028aac1accca335874341409d2a541f545ab1eb79a8ce995aeed010ff3dd36b249023b945933c9ef7fc3d5f4c3ec8e03b002aa9e9a50d7db1f4eab33eefee6e378405ad310d37896128bdfdf99dd039e0769b8cd85ec9f34dffc85450eaea494c5a332dff0073df6cd9fecf3c8be8b8855d7b5578451172b18736348ccac0faa1d78757873db25c09755a4b1a0"}, &(0x7f00000002c0)=0xc9) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) [ 844.384680][ T3571] device lo left promiscuous mode 23:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:38 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'nr0\x00', 0x80000001}) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="f2fefe570e14f138ed4544e4e36245809828043084ba60707cf13cb49040dafa772db31064b19244a5082b36cbd6064d34b44116d8afee25f68e96059922ec6f3e7e8466c1b844c3447cf8c0d1f2965ce0e3febcab16ba7d9bcaac6fcf1817af1128fe5c0d267d14c42118357512d33bf409af8675da834b7bbd87c78ddecd0618d581eb989e3336743e8450373d4f3b94cd354f521812697d830f9e68e82ad8244daa353619472aaae402ea5055d8e43ed51615dab5635ca0c6fb99ce71bb6029c2", 0xc2}], 0x1, &(0x7f00000001c0)="1d0e89b8da5131ad1dbbcd3589d19e91de44434acb3d2411508ffdfb5dd30dee79eea7232085eff409493c6561c7f1c51d6e3f5fbc2e06280aba10c4422dc243a1ab4be0aeacc443385bc6d4f207921779276b0ffc49e4cac8b105f327a55de2cfce2bef1f989cb0618bb2d86b7f19832faee51eea23d3a3bb555126b12c50aa6b6db10848c5ab2c5973f78f8eed56eb592797e7487633f3dcc4c92150ba991ceb8b35cb093176a81d46dbbd97aba0191a6e8f6924", 0xb5, 0x20000000}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 844.412740][ C0] net_ratelimit: 18 callbacks suppressed [ 844.412745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 844.424337][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:38 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000000)=0x2) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) fcntl$dupfd(r2, 0x0, r2) 23:37:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0x1, 0x4) 23:37:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 844.964499][ T3574] device lo entered promiscuous mode [ 844.977762][ T3574] device lo left promiscuous mode 23:37:39 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x02\x00', 0x101}) 23:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:39 executing program 0: syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x400) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x47e, 0x4000) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 23:37:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 845.157369][ T3610] device lo entered promiscuous mode 23:37:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x8, 0x9, 0x1f}, &(0x7f0000000100)=0x10) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 845.243826][ T3629] device lo left promiscuous mode 23:37:39 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400, 0x200) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @empty}, {0x2, 0x4e22, @multicast2}, 0x32a, 0x0, 0x0, 0x0, 0x100000001, &(0x7f0000000080)='bond_slave_1\x00', 0x2, 0x100, 0x3ff}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000001c0)={0x3, 0x7, 0x0, [{0x7f, 0x81, 0x1f, 0x10000, 0x2efd, 0x1}, {0xffffffff, 0x2, 0x39ac, 0x8001, 0x6, 0x6, 0x3}, {0x40, 0x2, 0x6, 0xffffffffffffffe1, 0xa82, 0x800000000000000, 0x6}, {0x21, 0x3, 0x3f, 0xcf, 0xe6, 0xc3, 0x3}, {0x7, 0x1d22, 0x7, 0x1000, 0x5, 0x6, 0x81}, {0x1f, 0x40, 0xf2de, 0x5, 0x3e9, 0x3c4, 0x7}, {0x80000001, 0x85e9, 0xfff, 0x7, 0x6, 0x2, 0x8}]}) getpeername$tipc(r2, &(0x7f0000000140), &(0x7f0000000180)=0x10) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x9, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x587000000000, 0x1, 0x2, 0x1ff, 0x3}, &(0x7f0000000100)=0x14) 23:37:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:39 executing program 0: r0 = socket$inet6(0xa, 0x80005, 0x800000000000005) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{0x4, 0x2, 0x2, 0x4, 'syz0\x00', 0x4}, 0x6, 0x20000004, 0x3329000000, r2, 0x2, 0x8, 'syz1\x00', &(0x7f0000000140)=['-[*\x00', 'nodev\x00'], 0xa, [], [0x9, 0xffff, 0x80000000, 0x4]}) [ 845.532746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 845.538597][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 845.544440][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 845.550226][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 845.612787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 845.618663][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 845.624508][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 845.630266][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:37:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 845.834389][ T3633] device lo entered promiscuous mode [ 845.846489][ T3633] device lo left promiscuous mode 23:37:40 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x03\x00', 0x101}) 23:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:40 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) connect$rose(r1, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x0, 0x0, 0xfffffffffffffffd}, 0x0}, 0x396) 23:37:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 846.021198][ T3668] device lo entered promiscuous mode 23:37:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x60000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000100)=0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x800, 0x9}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) r4 = fcntl$dupfd(r3, 0x800000000000406, r2) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2, 0x0, 0x0, 0x8}, 0x0}, 0xa) 23:37:40 executing program 0: socket$inet6(0xa, 0x3, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 846.135533][ T3695] device lo left promiscuous mode 23:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 23:37:40 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) 23:37:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)=0xfffffe3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x5, @local, 0xffffffffffffffe6}, 0x1c) [ 846.408435][ T3718] EXT4-fs (sda1): re-mounted. Opts: [ 846.686418][ T3697] device lo entered promiscuous mode [ 846.696359][ T3695] device lo left promiscuous mode 23:37:40 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x04\x00', 0x101}) 23:37:40 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x30001, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000001c0)=&(0x7f0000000180)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3f, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0x82, 0x4, 0x8, 0x8, 0x7d, 0x8}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = dup(r1) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000000), 0x4) r4 = fcntl$dupfd(r3, 0xfffffffffffffffe, r3) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x3, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x880, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x82000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000100)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x20, &(0x7f0000000140)='!)lo#eth1posix_acl_accessbdev^\x8f\x00'}, 0x30) r4 = socket$inet6(0xa, 0x1, 0x1000) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000180)=0xc, 0x4) epoll_create(0x7fffffff) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 23:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 846.899707][ T3697] device lo entered promiscuous mode 23:37:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 846.965386][ T3740] device lo left promiscuous mode 23:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:41 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x8000000000, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 847.024319][ T3741] EXT4-fs (sda1): re-mounted. Opts: 23:37:41 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'team0\x00', 0x8}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x600000, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) r3 = dup(r0) r4 = fcntl$dupfd(r3, 0x0, r0) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0xad41) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000100)=',\\\\user+mime_typeem0$wlan1\x00', 0xffffffffffffffff}, 0x30) setpriority(0x0, r1, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x8, 0x0, 0xff, 0xa, 0x5, 0xff}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000200)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x1fffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000180)="32999b5b5f860f998bd4e0c56a584758", 0x10) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}]}) 23:37:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 23:37:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4040, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8c000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xb0, r2, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x67}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffff7363}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x42e2f80704484de0) getsockopt$inet6_buf(r0, 0x29, 0x4, 0x0, &(0x7f0000000000)) [ 847.405555][ T3772] EXT4-fs (sda1): re-mounted. Opts: [ 847.641983][ T3746] device lo entered promiscuous mode [ 847.652855][ T3746] device lo left promiscuous mode 23:37:41 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x05\x00', 0x101}) 23:37:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:41 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)) 23:37:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(r0) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, 0x0, &(0x7f0000000380)) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(pcrypt(aegis128l))\x00'}, 0x58) 23:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 847.852492][ T3785] device lo entered promiscuous mode 23:37:41 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = getegid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[r3, r4]) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) [ 847.939527][ T3796] EXT4-fs (sda1): re-mounted. Opts: 23:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 847.966160][ T3801] device lo left promiscuous mode 23:37:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)) 23:37:42 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000000c0)=0x4, 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/59, 0x3b, 0x10022, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x3b2) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/13) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:42 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0xb4d, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 848.192538][ T3825] EXT4-fs (sda1): re-mounted. Opts: [ 848.491519][ T3807] device lo entered promiscuous mode [ 848.500565][ T3807] device lo left promiscuous mode 23:37:42 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x06\x00', 0x101}) 23:37:42 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)) 23:37:42 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101080, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mq_timedreceive(r0, &(0x7f0000000080)=""/132, 0x84, 0x0, &(0x7f0000000140)={0x77359400}) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 848.706919][ T3838] device lo entered promiscuous mode [ 848.765373][ T3847] EXT4-fs (sda1): re-mounted. Opts: 23:37:42 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0xfffffffffffffffc, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 848.809757][ T3854] device lo left promiscuous mode 23:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:42 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) readv(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/241, 0xf1}, {&(0x7f00000002c0)=""/102, 0x66}, {&(0x7f0000000140)=""/40, 0x28}], 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000380)={r0}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @remote}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000004c0)={r2, 0xe771}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x100000001, 0x0, 0x38a, 0x3}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x7fffffff, 0x0, 0x7, 0xfffffffffffffffa, r3}, &(0x7f0000000100)=0x10) 23:37:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x200000000011) ioctl$TCFLSH(r0, 0x5437, 0x0) 23:37:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:43 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x20, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, [0xfffffffe]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2, 0x44}, 0x4}, 0xa) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000080)) 23:37:43 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x100000000000000) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)=0xfffffffffffffe91) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) accept4$unix(r1, 0x0, &(0x7f0000000140), 0x80000) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000200)=0x4a7af21185c296d6) [ 849.364705][ T3861] device lo entered promiscuous mode [ 849.394447][ T3861] device lo left promiscuous mode [ 849.692750][ C0] net_ratelimit: 12 callbacks suppressed [ 849.692759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 849.704317][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 849.710139][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 849.715919][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 849.772774][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 849.778586][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 849.784448][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 849.790211][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 849.886424][ T3895] device lo entered promiscuous mode 23:37:44 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\a\x00', 0x101}) 23:37:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)=0xffffffffffffff28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x105400, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0xdd) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x11}, 0xffffffffffffff01}, 0x1c) 23:37:44 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) write$P9_RSTAT(r1, &(0x7f00000000c0)={0x41, 0x7d, 0x1, {0x0, 0x3a, 0x80, 0x1f, {0x20, 0x4, 0x4}, 0x2200000, 0x9, 0x1, 0xff, 0x0, '', 0x0, '', 0x1, '(', 0x6, 'cpuset'}}, 0x41) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) recvmsg(r2, &(0x7f0000000080), 0x10000) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x0) 23:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 850.138953][ T3925] device lo left promiscuous mode 23:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x3, 0x0, 0x9, 0x3, 0x0, 0x800, 0x88, 0xd, 0x400, 0x4, 0x164, 0xe6, 0x0, 0x0, 0x200, 0x1f, 0x6, 0x100, 0x4ad, 0x0, 0xd1, 0x180, 0x0, 0xffffffffffff036f, 0x2, 0x2, 0x5, 0x4ae, 0x0, 0x5, 0x8, 0xf4d, 0x9, 0x4, 0x4c, 0x5, 0x0, 0x120000000000000, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x20100, 0xd6, 0xff, 0x2, 0x1, 0x100, 0x4}) signalfd(r0, &(0x7f0000000040)={0x1ff}, 0x8) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f00000001c0)=""/209) signalfd(r0, &(0x7f0000000080)={0x800}, 0x8) 23:37:44 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) clone(0x0, &(0x7f0000000000)="26d76fb14329bd0799bd9848a689", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5a679bc0f99fdb801fb8580d9bbe94e149acc6ba3950d8949fd72d1f7f741e8b63e7ea6b669571ffa25145b562607e5d48c9e4c681f0cc7f997a8a39f05f6a2ab56057e330ef0465589fd7d4efe45869266e9282e7456aaee6090e8d3084b6114ba9df46e07eb8dbcc7fbc3d202cdfc7625ab237d3a9eba0a3e05c589fd5c5273e861eec3e02a185e3f3b553") r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b703000000001f006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 23:37:44 executing program 0: r0 = socket$inet6(0xa, 0x8000080006, 0x7) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0xaab, {{0xa, 0x4e21, 0x6, @mcast1, 0xffffffffffff6fd3}}}, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) setns(r1, 0x20000) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000140)={0x4, 0x7, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000001c0)={{0xa, 0x0, 0x0, 0x0, '\x00', 0x7}, 0x1, [0x6, 0x10001, 0x3, 0x10000, 0x8, 0x2, 0x81, 0x1, 0x714, 0x4d40, 0x4, 0x6, 0x10000, 0x6, 0x8, 0x9, 0x100000000, 0x401, 0x40, 0x4, 0x4, 0x2, 0x2, 0x3, 0x800, 0xffffffffffffffcf, 0x0, 0x3, 0x4, 0x1, 0x9d, 0x1, 0x8, 0x1, 0x5, 0xff, 0x58172a52, 0x0, 0xffffffffffffff01, 0x686, 0x3ff, 0x96bc, 0x3, 0xac, 0x1000, 0x81, 0xffffffff, 0x6, 0x9, 0x9bc, 0x8000, 0x0, 0x401, 0xfffffffffffffff8, 0x80, 0x0, 0xffffffffffffffff, 0x4, 0x7, 0x2653, 0x6, 0x3, 0xfffffffffffffffb, 0x7, 0x200, 0x1, 0x7, 0x100, 0x6, 0x3ff, 0x6, 0x7, 0x0, 0x7fffffff, 0x5, 0x5, 0x1, 0x9, 0x5, 0x7fff, 0x2, 0x1, 0x5fe, 0x3, 0xfac, 0x5, 0x9, 0x6, 0x5, 0x80, 0xd2, 0x40, 0x5, 0x1, 0x3c3b2a53, 0x3, 0xffffffff, 0x9, 0x4, 0x5, 0x7fff, 0x1, 0x80000001, 0x4, 0x1, 0x0, 0x1, 0x6, 0x7fff, 0x3, 0x3, 0x9, 0x20, 0x4, 0x2, 0x8, 0x7, 0xd3c4, 0x9, 0x4, 0x6, 0x9, 0xfff, 0x3, 0x9, 0x5, 0x5e, 0x40], {0x0, 0x989680}}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102000ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 850.652753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 850.658653][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 851.278326][ T3934] device lo entered promiscuous mode [ 851.348876][ T3974] device lo left promiscuous mode 23:37:46 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\b\x00', 0x101}) 23:37:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x20000, 0x0) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @default}, [@null, @default, @null, @null, @default, @bcast, @null, @netrom]}, &(0x7f0000000100)=0x48, 0x80000) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:46 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000080)=""/14) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x4000000000000406, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000001c0)=0x8, 0x2cc) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r0, &(0x7f0000000180), 0x1) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x80800) getsockopt$inet6_buf(r0, 0x29, 0xd, 0x0, &(0x7f0000000000)=0xfffffffffffffd7d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}}, 0x6, 0x1}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r3, 0x1800000000}, 0xc) 23:37:46 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8a00, 0x0) setsockopt(r0, 0x2, 0x6, &(0x7f0000000080)="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", 0xfb) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 852.335088][ T3991] device lo entered promiscuous mode [ 852.416451][ T3991] device lo left promiscuous mode 23:37:46 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x406, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KDSETMODE(r1, 0x4b3a, 0x2) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x0) 23:37:46 executing program 0: r0 = socket$inet6(0xa, 0x4, 0xc2) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x1f, r0, 0x200000000000000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x9, 0x10001, 0x8000, 0x2, 0x8001, 0x10001}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) shutdown(r0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) 23:37:46 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) fcntl$dupfd(r1, 0x0, r0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) [ 853.306951][ T3998] device lo entered promiscuous mode 23:37:47 executing program 3: pipe2(0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) getsockopt(r0, 0x1, 0x8, &(0x7f00000000c0)=""/189, &(0x7f0000000000)=0xbd) 23:37:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x61, r1}) 23:37:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:47 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="32136780d04906e19a71b4342cd84437", 0x10) prlimit64(r3, 0x1, &(0x7f0000000080)={0x4b, 0xfffffffffffffffd}, &(0x7f00000000c0)) 23:37:47 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\n\x00', 0x101}) 23:37:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 853.749522][ T4041] device lo left promiscuous mode 23:37:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) 23:37:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfmno', @ANYRESHEX, @ANYRESHEX]) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80, 0x0, 0x200000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:47 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 23:37:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfmno', @ANYRESHEX, @ANYRESHEX]) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80, 0x0, 0x200000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:48 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}, 0x14) r2 = socket$inet6(0xa, 0xffffffffffffffff, 0x6) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="d70b7f6cbc4b8a584a4dd5f55814dc0c3dec64133582f9f6bef8e4ba80523741d23ec10cae9618455f53fe2765e7346ce4bdfb1990f12539dd86873e5024a54d691c97061c917ac03b98a3c97fac727b201c114c7c3e2976345e7a069fcf72d670ce44616f8e94751e4af2da2d32555bae115d91bc21c06cfee89acb29d5aedf06e4bfcdec87576180036d1ec5c6d21819ff6634ad706aa06fa9cf14dec7c8271c99", 0xa2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = getegid() setgid(r1) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 854.410360][ T4049] device lo entered promiscuous mode [ 854.419917][ T4041] device lo left promiscuous mode 23:37:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe2, 0x4000) accept4$ax25(r1, &(0x7f0000000080)={{0x3, @bcast}, [@remote, @netrom, @bcast, @netrom, @null, @bcast, @rose, @netrom]}, &(0x7f0000000100)=0x48, 0x80000) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) write$P9_RWRITE(r1, &(0x7f0000000140)={0xb, 0x77, 0x1, 0xfff}, 0xb) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:48 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\f\x00', 0x101}) 23:37:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfmno', @ANYRESHEX, @ANYRESHEX]) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80, 0x0, 0x200000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000080)={{0x7}, 'port1\x00', 0x82, 0x180a, 0x3, 0x2, 0x3, 0x8, 0x9cd, 0x0, 0x1, 0x3}) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 854.688461][ T4049] device lo entered promiscuous mode 23:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x10001, 0x101040) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) [ 854.812744][ C0] net_ratelimit: 18 callbacks suppressed [ 854.812752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 854.824245][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000000)) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfmno', @ANYRESHEX, @ANYRESHEX]) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80, 0x0, 0x200000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 854.881902][ T4114] device lo left promiscuous mode [ 855.272527][ T4121] device lo entered promiscuous mode [ 855.284182][ T4121] device lo left promiscuous mode 23:37:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) 23:37:49 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x0e\x00', 0x101}) 23:37:49 executing program 3 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x940, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) r2 = dup(r0) r3 = fcntl$dupfd(r2, 0x0, r0) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) [ 855.533831][ T4133] device lo entered promiscuous mode 23:37:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f00000000c0)=0x8, 0xfffffffffffffdfe) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x6, 0x3ff, 0x1}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={r2, 0x7}, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) select(0x40, &(0x7f0000000300)={0x37e39395, 0x74, 0x6, 0x9, 0x6, 0x3ff, 0x9, 0xbf}, &(0x7f0000000340)={0x9, 0x0, 0x8, 0xeb, 0x6, 0x8, 0xffffffff}, &(0x7f0000000380)={0x0, 0x5bd, 0x3ff, 0x2, 0xfffffffffffffe01, 0x4, 0xffffffffffffffc0, 0x5}, &(0x7f0000000400)={r3, r4/1000+10000}) dup3(r1, r1, 0x80000) r5 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x80000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) ioctl$VIDIOC_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x7ff, 0x2, 0x1, 0x3, 0xfff, 0x5, 0x80000001, 0xfffffffffffffff8, 0x3dd4, 0x8, 0xffffffffffffa397, 0x1, 0x9, 0xcb1, 0x7, 0x8}}) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x20, 0x10000, 0x4, 0xfdb0}) [ 855.624612][ T4147] FAULT_INJECTION: forcing a failure. [ 855.624612][ T4147] name failslab, interval 1, probability 0, space 0, times 0 [ 855.640433][ T4150] device lo left promiscuous mode [ 855.662310][ T4147] CPU: 0 PID: 4147 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 23:37:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 855.671350][ T4147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.681401][ T4147] Call Trace: [ 855.684693][ T4147] dump_stack+0x172/0x1f0 [ 855.689026][ T4147] should_fail.cold+0xa/0x15 [ 855.693623][ T4147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 855.699436][ T4147] ? ___might_sleep+0x163/0x280 [ 855.704290][ T4147] __should_failslab+0x121/0x190 [ 855.709234][ T4147] should_failslab+0x9/0x14 [ 855.713735][ T4147] __kmalloc+0x2dc/0x740 [ 855.717979][ T4147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 855.724217][ T4147] ? fput_many+0x12c/0x1a0 [ 855.728629][ T4147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 855.734874][ T4147] ? strnlen_user+0x1f0/0x280 [ 855.739575][ T4147] ? __x64_sys_memfd_create+0x13c/0x470 [ 855.745129][ T4147] __x64_sys_memfd_create+0x13c/0x470 [ 855.750499][ T4147] ? memfd_fcntl+0x1550/0x1550 [ 855.755258][ T4147] ? do_syscall_64+0x26/0x610 [ 855.759936][ T4147] ? lockdep_hardirqs_on+0x418/0x5d0 [ 855.765224][ T4147] ? trace_hardirqs_on+0x67/0x230 [ 855.770251][ T4147] do_syscall_64+0x103/0x610 [ 855.774841][ T4147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.780724][ T4147] RIP: 0033:0x457e29 [ 855.784610][ T4147] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 855.804211][ T4147] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 855.812613][ T4147] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 23:37:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000000)={0x1000000000000202, 0x100000000}) [ 855.820580][ T4147] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 855.828553][ T4147] RBP: 000000000073bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 855.836525][ T4147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f697238b6d4 [ 855.844713][ T4147] R13: 00000000004c666a R14: 00000000004dbb60 R15: 0000000000000003 23:37:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 855.932797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 855.938775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 855.944643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 855.950403][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/9) 23:37:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x18, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 856.012744][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.018588][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 856.024516][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.030277][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:37:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f00000000c0)={r3, 0x2}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000100)={0x5, 0x2, 0x3, 0x4, '\x00', 0xff}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:50 executing program 3 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 856.182880][ T4155] device lo entered promiscuous mode [ 856.197324][ T4150] device lo left promiscuous mode [ 856.228923][ T4188] FAULT_INJECTION: forcing a failure. [ 856.228923][ T4188] name failslab, interval 1, probability 0, space 0, times 0 [ 856.264525][ T4188] CPU: 1 PID: 4188 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 856.273587][ T4188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.283639][ T4188] Call Trace: [ 856.286953][ T4188] dump_stack+0x172/0x1f0 [ 856.291312][ T4188] should_fail.cold+0xa/0x15 [ 856.295904][ T4188] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 856.301724][ T4188] ? ___might_sleep+0x163/0x280 [ 856.306575][ T4188] __should_failslab+0x121/0x190 [ 856.311509][ T4188] should_failslab+0x9/0x14 [ 856.316012][ T4188] kmem_cache_alloc+0x2be/0x710 [ 856.320864][ T4188] ? __alloc_fd+0x430/0x530 [ 856.325374][ T4188] ? shmem_destroy_callback+0xc0/0xc0 [ 856.330748][ T4188] shmem_alloc_inode+0x1c/0x50 [ 856.335516][ T4188] alloc_inode+0x66/0x190 [ 856.339841][ T4188] new_inode_pseudo+0x19/0xf0 [ 856.344514][ T4188] new_inode+0x1f/0x40 [ 856.348575][ T4188] shmem_get_inode+0x84/0x780 [ 856.353265][ T4188] __shmem_file_setup.part.0+0x7e/0x2b0 [ 856.358814][ T4188] shmem_file_setup+0x66/0x90 [ 856.363493][ T4188] __x64_sys_memfd_create+0x2a2/0x470 [ 856.368863][ T4188] ? memfd_fcntl+0x1550/0x1550 [ 856.373620][ T4188] ? do_syscall_64+0x26/0x610 [ 856.378301][ T4188] ? lockdep_hardirqs_on+0x418/0x5d0 [ 856.383581][ T4188] ? trace_hardirqs_on+0x67/0x230 [ 856.388638][ T4188] do_syscall_64+0x103/0x610 [ 856.393237][ T4188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.399160][ T4188] RIP: 0033:0x457e29 [ 856.403078][ T4188] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.422877][ T4188] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 856.431391][ T4188] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 856.439357][ T4188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 856.447321][ T4188] RBP: 000000000073bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 856.455285][ T4188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f697238b6d4 [ 856.463258][ T4188] R13: 00000000004c666a R14: 00000000004dbb60 R15: 0000000000000003 23:37:50 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x16\x00', 0x101}) 23:37:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/137) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)=0xfea2) socket$inet6(0xa, 0x800, 0x7fff) 23:37:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, 0x0) 23:37:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:50 executing program 3 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 856.642135][ T4198] FAULT_INJECTION: forcing a failure. [ 856.642135][ T4198] name failslab, interval 1, probability 0, space 0, times 0 [ 856.685139][ T4207] device lo entered promiscuous mode [ 856.696219][ T4198] CPU: 1 PID: 4198 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 856.705262][ T4198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.715314][ T4198] Call Trace: [ 856.718617][ T4198] dump_stack+0x172/0x1f0 [ 856.722953][ T4198] should_fail.cold+0xa/0x15 [ 856.727559][ T4198] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:37:50 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r1}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast2, @rand_addr="dcecca7cf03679a19212ed67893b50f8", @ipv4={[], [], @multicast2}, 0x1, 0x3, 0x7, 0x100, 0x9c, 0x80, r2}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x341, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x2, 0x10, 0x8, 0x3}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e23, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xfd0c, 0x22, 0x100000001, 0x2, 0x40}, &(0x7f0000000240)=0x98) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000280), &(0x7f0000000400)=0xc) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) 23:37:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = fcntl$dupfd(r1, 0x0, r0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') bind$rose(r1, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@default, @default, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 856.733371][ T4198] ? ___might_sleep+0x163/0x280 [ 856.738252][ T4198] __should_failslab+0x121/0x190 [ 856.743189][ T4198] should_failslab+0x9/0x14 [ 856.747697][ T4198] kmem_cache_alloc+0x2be/0x710 [ 856.752545][ T4198] ? current_time+0x6b/0x140 [ 856.757136][ T4198] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 856.762947][ T4198] ? lockdep_hardirqs_on+0x418/0x5d0 [ 856.768247][ T4198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.774486][ T4198] ? timespec64_trunc+0xf0/0x180 [ 856.779428][ T4198] __d_alloc+0x2e/0x8c0 [ 856.783590][ T4198] d_alloc_pseudo+0x1e/0x30 [ 856.788101][ T4198] alloc_file_pseudo+0xe2/0x280 [ 856.792953][ T4198] ? alloc_file+0x4d0/0x4d0 [ 856.797465][ T4198] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 856.803717][ T4198] __shmem_file_setup.part.0+0x108/0x2b0 [ 856.809359][ T4198] shmem_file_setup+0x66/0x90 [ 856.814042][ T4198] __x64_sys_memfd_create+0x2a2/0x470 [ 856.819414][ T4198] ? memfd_fcntl+0x1550/0x1550 [ 856.824182][ T4198] ? do_syscall_64+0x26/0x610 [ 856.828869][ T4198] ? lockdep_hardirqs_on+0x418/0x5d0 [ 856.834164][ T4198] ? trace_hardirqs_on+0x67/0x230 [ 856.839199][ T4198] do_syscall_64+0x103/0x610 [ 856.843796][ T4198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.849705][ T4198] RIP: 0033:0x457e29 [ 856.849719][ T4198] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.849727][ T4198] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 23:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, 0x0) 23:37:50 executing program 3 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 856.849739][ T4198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 856.849750][ T4198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 856.873201][ T4198] RBP: 000000000073bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 856.873210][ T4198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f697238b6d4 [ 856.873224][ T4198] R13: 00000000004c666a R14: 00000000004dbb60 R15: 0000000000000003 [ 856.924275][ T4207] device lo left promiscuous mode 23:37:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000001c0)={0x6, 0x5, 0x2}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) r3 = dup(r2) r4 = fcntl$dupfd(r3, 0x0, r0) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000080)={0xf, @capture={0x1000, 0x1, {0x6, 0x7d6}, 0x9, 0x8}}) [ 856.982554][ T4228] FAULT_INJECTION: forcing a failure. [ 856.982554][ T4228] name failslab, interval 1, probability 0, space 0, times 0 [ 857.031495][ T4228] CPU: 1 PID: 4228 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 857.040560][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.050609][ T4228] Call Trace: [ 857.053981][ T4228] dump_stack+0x172/0x1f0 [ 857.058331][ T4228] should_fail.cold+0xa/0x15 [ 857.062933][ T4228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 857.068767][ T4228] ? ___might_sleep+0x163/0x280 [ 857.073615][ T4228] __should_failslab+0x121/0x190 [ 857.078548][ T4228] should_failslab+0x9/0x14 [ 857.083049][ T4228] kmem_cache_alloc+0x2be/0x710 [ 857.087998][ T4228] __alloc_file+0x27/0x300 [ 857.092410][ T4228] alloc_empty_file+0x72/0x170 [ 857.097169][ T4228] alloc_file+0x5e/0x4d0 [ 857.101432][ T4228] alloc_file_pseudo+0x189/0x280 [ 857.106488][ T4228] ? alloc_file+0x4d0/0x4d0 [ 857.110995][ T4228] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 857.117246][ T4228] __shmem_file_setup.part.0+0x108/0x2b0 [ 857.122877][ T4228] shmem_file_setup+0x66/0x90 [ 857.127558][ T4228] __x64_sys_memfd_create+0x2a2/0x470 [ 857.132933][ T4228] ? memfd_fcntl+0x1550/0x1550 [ 857.137700][ T4228] ? do_syscall_64+0x26/0x610 [ 857.142373][ T4228] ? lockdep_hardirqs_on+0x418/0x5d0 [ 857.147667][ T4228] ? trace_hardirqs_on+0x67/0x230 [ 857.152705][ T4228] do_syscall_64+0x103/0x610 [ 857.157310][ T4228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.163221][ T4228] RIP: 0033:0x457e29 [ 857.167119][ T4228] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.186721][ T4228] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 857.195134][ T4228] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 857.203106][ T4228] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 857.211079][ T4228] RBP: 000000000073bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 857.219052][ T4228] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f697238b6d4 [ 857.227025][ T4228] R13: 00000000004c666a R14: 00000000004dbb60 R15: 0000000000000003 [ 857.334136][ T4220] device lo entered promiscuous mode 23:37:51 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x17\x00', 0x101}) 23:37:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) prctl$PR_MCE_KILL_GET(0x22) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x1, 0x10003, 0x6, 0x80000000000000, 0x1f, 0x4, 0x9}, 0xda) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0xa8, 0x34, {"c3fc915f52dec9f24ec4936a16459f2be42a962b9a9dc327a7043b0b28464efc2808afc28a03e57a48861613fd380fd47b20feaf85d97f72a6e70cfc2a2ffea00239ebeeb3923f42daae26ca71f56904936be50821d108b3d0234cc0b2904ea56808ac20be6bc858164c665a08faa0d8c95af04d83790bf71fe2491101f0d4fa5af0aef23ff2ebed4856667ff698"}}, {0x0, "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"}}, &(0x7f0000001200)=""/9, 0x10aa, 0x9}, 0x20) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x84f, @local, 0x10000}}, 0x24) 23:37:51 executing program 3 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000180)=0x8, 0xfffffffffffffd9d) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 857.419811][ T4246] device lo left promiscuous mode [ 857.425694][ T4247] FAULT_INJECTION: forcing a failure. [ 857.425694][ T4247] name failslab, interval 1, probability 0, space 0, times 0 [ 857.492748][ T4247] CPU: 1 PID: 4247 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 857.501794][ T4247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.501807][ T4247] Call Trace: [ 857.515134][ T4247] dump_stack+0x172/0x1f0 [ 857.519467][ T4247] should_fail.cold+0xa/0x15 [ 857.524055][ T4247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 857.529878][ T4247] ? ___might_sleep+0x163/0x280 [ 857.534747][ T4247] __should_failslab+0x121/0x190 [ 857.539675][ T4247] should_failslab+0x9/0x14 [ 857.544175][ T4247] kmem_cache_alloc+0x2be/0x710 [ 857.549022][ T4247] ? rcu_read_lock_sched_held+0x110/0x130 [ 857.554737][ T4247] ? kmem_cache_alloc+0x341/0x710 [ 857.559763][ T4247] security_file_alloc+0x39/0x170 [ 857.564783][ T4247] __alloc_file+0xac/0x300 [ 857.569196][ T4247] alloc_empty_file+0x72/0x170 [ 857.574839][ T4247] alloc_file+0x5e/0x4d0 [ 857.579094][ T4247] alloc_file_pseudo+0x189/0x280 [ 857.584050][ T4247] ? alloc_file+0x4d0/0x4d0 [ 857.588548][ T4247] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 857.594798][ T4247] __shmem_file_setup.part.0+0x108/0x2b0 [ 857.600432][ T4247] shmem_file_setup+0x66/0x90 [ 857.605136][ T4247] __x64_sys_memfd_create+0x2a2/0x470 [ 857.605152][ T4247] ? memfd_fcntl+0x1550/0x1550 [ 857.605175][ T4247] ? do_syscall_64+0x26/0x610 [ 857.605190][ T4247] ? lockdep_hardirqs_on+0x418/0x5d0 [ 857.605205][ T4247] ? trace_hardirqs_on+0x67/0x230 [ 857.605223][ T4247] do_syscall_64+0x103/0x610 [ 857.605245][ T4247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.640738][ T4247] RIP: 0033:0x457e29 [ 857.644622][ T4247] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.664216][ T4247] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 857.672619][ T4247] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 857.680582][ T4247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 23:37:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, 0x0) 23:37:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x7}, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:51 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x81110, r0, 0x80000000) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) r4 = fcntl$dupfd(r3, 0x0, r2) bind$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 857.688547][ T4247] RBP: 000000000073bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 857.696513][ T4247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f697238b6d4 [ 857.704495][ T4247] R13: 00000000004c666a R14: 00000000004dbb60 R15: 0000000000000003 23:37:51 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:51 executing program 3 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x1) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 857.975512][ T4278] FAULT_INJECTION: forcing a failure. [ 857.975512][ T4278] name failslab, interval 1, probability 0, space 0, times 0 [ 858.009927][ T4278] CPU: 1 PID: 4278 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 858.019480][ T4278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.019486][ T4278] Call Trace: [ 858.019505][ T4278] dump_stack+0x172/0x1f0 [ 858.019526][ T4278] should_fail.cold+0xa/0x15 [ 858.041742][ T4278] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 858.047555][ T4278] ? ___might_sleep+0x163/0x280 [ 858.052414][ T4278] __should_failslab+0x121/0x190 [ 858.057356][ T4278] should_failslab+0x9/0x14 [ 858.061856][ T4278] kmem_cache_alloc+0x2be/0x710 [ 858.066714][ T4278] ? notify_change+0x6d5/0xfb0 [ 858.071495][ T4278] ? do_sys_ftruncate+0x41e/0x550 [ 858.076527][ T4278] getname_flags+0xd6/0x5b0 [ 858.081036][ T4278] getname+0x1a/0x20 [ 858.084930][ T4278] do_sys_open+0x2c9/0x5d0 [ 858.089346][ T4278] ? filp_open+0x80/0x80 [ 858.093586][ T4278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 858.099823][ T4278] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 858.105277][ T4278] ? do_syscall_64+0x26/0x610 [ 858.109948][ T4278] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.116013][ T4278] ? do_syscall_64+0x26/0x610 [ 858.120691][ T4278] __x64_sys_open+0x7e/0xc0 [ 858.125193][ T4278] do_syscall_64+0x103/0x610 [ 858.126135][ T4251] device lo entered promiscuous mode [ 858.129790][ T4278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.129802][ T4278] RIP: 0033:0x411f11 [ 858.129816][ T4278] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 858.129823][ T4278] RSP: 002b:00007f697238aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 858.172851][ T4278] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 858.172861][ T4278] RDX: 00007f697238aafa RSI: 0000000000000002 RDI: 00007f697238aaf0 [ 858.172874][ T4278] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 858.172881][ T4278] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 858.172890][ T4278] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 858.213604][ T4246] device lo left promiscuous mode 23:37:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xa1, 0x1ff, 0x2, 0x2}, 0x0}, 0xa) 23:37:52 executing program 3 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:52 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x18\x00', 0x101}) 23:37:52 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) prctl$PR_MCE_KILL_GET(0x22) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x1, 0x10003, 0x6, 0x80000000000000, 0x1f, 0x4, 0x9}, 0xda) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0xa8, 0x34, {"c3fc915f52dec9f24ec4936a16459f2be42a962b9a9dc327a7043b0b28464efc2808afc28a03e57a48861613fd380fd47b20feaf85d97f72a6e70cfc2a2ffea00239ebeeb3923f42daae26ca71f56904936be50821d108b3d0234cc0b2904ea56808ac20be6bc858164c665a08faa0d8c95af04d83790bf71fe2491101f0d4fa5af0aef23ff2ebed4856667ff698"}}, {0x0, "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"}}, &(0x7f0000001200)=""/9, 0x10aa, 0x9}, 0x20) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x84f, @local, 0x10000}}, 0x24) [ 858.483960][ T4251] device lo entered promiscuous mode [ 858.537674][ T4295] FAULT_INJECTION: forcing a failure. [ 858.537674][ T4295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 858.550997][ T4295] CPU: 0 PID: 4295 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 858.560013][ T4295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.570067][ T4295] Call Trace: [ 858.573360][ T4295] dump_stack+0x172/0x1f0 [ 858.573383][ T4295] should_fail.cold+0xa/0x15 [ 858.573401][ T4295] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 858.573421][ T4295] ? mark_held_locks+0xf0/0xf0 [ 858.573440][ T4295] should_fail_alloc_page+0x50/0x60 [ 858.582351][ T4295] __alloc_pages_nodemask+0x1a1/0x7e0 [ 858.582376][ T4295] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 858.609118][ T4295] ? find_held_lock+0x35/0x130 [ 858.613888][ T4295] ? do_truncate+0x187/0x220 [ 858.618492][ T4295] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 858.624303][ T4295] cache_grow_begin+0x9c/0x850 [ 858.629066][ T4295] ? getname_flags+0xd6/0x5b0 23:37:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0xc2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x80000001}, 0x8) recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0xfffffffffffffd3d, &(0x7f0000005040)=[{&(0x7f0000004d80)=""/140, 0x69}, {&(0x7f0000004fc0)=""/109, 0x6d}], 0x2, 0x0, 0xc5}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000002, &(0x7f00000001c0)=0x2dee, 0x65f0e3f4e167ebfb) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0xfffffffffffffffb, @ipv4={[], [], @multicast2}, 0x100000000}, {0xa, 0x4e22, 0x8, @ipv4={[], [], @local}, 0x200}, 0x8802, [0x3, 0x9, 0x2, 0x0, 0x7f, 0x2, 0x1, 0x8]}, 0x5c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:37:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x20000000000002) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x210000) ioctl$NBD_DO_IT(r1, 0xab03) 23:37:52 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 858.633749][ T4295] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 858.639987][ T4295] kmem_cache_alloc+0x645/0x710 [ 858.644837][ T4295] ? notify_change+0x6d5/0xfb0 [ 858.649596][ T4295] ? do_sys_ftruncate+0x41e/0x550 [ 858.654621][ T4295] getname_flags+0xd6/0x5b0 [ 858.659126][ T4295] getname+0x1a/0x20 [ 858.663019][ T4295] do_sys_open+0x2c9/0x5d0 [ 858.667457][ T4295] ? filp_open+0x80/0x80 [ 858.671703][ T4295] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 858.677950][ T4295] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 858.683405][ T4295] ? do_syscall_64+0x26/0x610 [ 858.683421][ T4295] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.683434][ T4295] ? do_syscall_64+0x26/0x610 [ 858.683452][ T4295] __x64_sys_open+0x7e/0xc0 [ 858.683467][ T4295] do_syscall_64+0x103/0x610 [ 858.683484][ T4295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.694175][ T4295] RIP: 0033:0x411f11 [ 858.694191][ T4295] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:37:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x600) 23:37:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 858.694200][ T4295] RSP: 002b:00007f697238aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 858.694214][ T4295] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 858.694223][ T4295] RDX: 00007f697238aafa RSI: 0000000000000002 RDI: 00007f697238aaf0 [ 858.694232][ T4295] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 858.694240][ T4295] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 858.694248][ T4295] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 858.787532][ T4299] device lo left promiscuous mode [ 858.804940][ T4295] EXT4-fs (sda1): Cannot specify journal on remount 23:37:52 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000100)=0x5) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r2, 0x0, r1) accept4$llc(r2, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x800) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) [ 858.860868][ T4323] FAULT_INJECTION: forcing a failure. [ 858.860868][ T4323] name failslab, interval 1, probability 0, space 0, times 0 [ 858.890157][ T4323] CPU: 1 PID: 4323 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190215 #36 [ 858.899282][ T4323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.909335][ T4323] Call Trace: [ 858.912650][ T4323] dump_stack+0x172/0x1f0 [ 858.916991][ T4323] should_fail.cold+0xa/0x15 [ 858.921592][ T4323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 858.927407][ T4323] ? ___might_sleep+0x163/0x280 [ 858.932264][ T4323] __should_failslab+0x121/0x190 [ 858.937212][ T4323] should_failslab+0x9/0x14 [ 858.941709][ T4323] __kmalloc+0x2dc/0x740 [ 858.945965][ T4323] ? __lock_acquire+0x55d/0x4710 [ 858.950971][ T4323] ? bitmap_alloc+0x27/0x30 [ 858.955475][ T4323] bitmap_alloc+0x27/0x30 [ 858.959891][ T4323] evdev_handle_get_val+0x3a/0x5b0 [ 858.965010][ T4323] evdev_ioctl_handler+0xf30/0x1b90 [ 858.970212][ T4323] ? perf_trace_lock_acquire+0xf5/0x580 [ 858.975755][ T4323] ? str_to_user+0x90/0x90 [ 858.975770][ T4323] ? debug_smp_processor_id+0x3c/0x280 [ 858.975787][ T4323] ? perf_trace_lock_acquire+0xf5/0x580 [ 858.975806][ T4323] ? __f_unlock_pos+0x19/0x20 [ 858.975822][ T4323] ? __fget+0x35a/0x550 [ 858.985655][ T4323] ? find_held_lock+0x35/0x130 [ 858.985672][ T4323] ? __fget+0x35a/0x550 [ 858.985691][ T4323] ? evdev_ioctl_compat+0x30/0x30 [ 858.985708][ T4323] evdev_ioctl+0x28/0x30 [ 858.995900][ T4323] do_vfs_ioctl+0xd6e/0x1390 [ 858.995917][ T4323] ? kasan_check_read+0x11/0x20 [ 858.995934][ T4323] ? ioctl_preallocate+0x210/0x210 [ 858.995947][ T4323] ? __fget+0x381/0x550 [ 858.995972][ T4323] ? ksys_dup3+0x3e0/0x3e0 [ 859.041727][ T4323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 859.047965][ T4323] ? fput_many+0x12c/0x1a0 [ 859.052375][ T4323] ? fput+0x1b/0x20 [ 859.056188][ T4323] ? security_file_ioctl+0x93/0xc0 [ 859.061297][ T4323] ksys_ioctl+0xab/0xd0 [ 859.065455][ T4323] __x64_sys_ioctl+0x73/0xb0 [ 859.070054][ T4323] do_syscall_64+0x103/0x610 [ 859.074655][ T4323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.080545][ T4323] RIP: 0033:0x457e29 [ 859.084437][ T4323] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 859.104048][ T4323] RSP: 002b:00007fe78a476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:37:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x600) 23:37:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 859.112472][ T4323] RAX: ffffffffffffffda RBX: 00007fe78a476c90 RCX: 0000000000457e29 [ 859.120567][ T4323] RDX: 0000000020000040 RSI: 0000000080404519 RDI: 0000000000000004 [ 859.128530][ T4323] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 859.136492][ T4323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe78a4776d4 [ 859.144457][ T4323] R13: 00000000004bfdd5 R14: 00000000004d1870 R15: 0000000000000005 23:37:53 executing program 3 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:53 executing program 1: r0 = dup(0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000000)=0x2) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) r2 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0xbce, 0x100000000}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'sha256-avx\x00'}}, &(0x7f0000000200)="98ee81e860f1d889ba0cf49b24f4e56cb485d6f0a68c4f3bd7de86d459928b625648345948277cd0a43a93c1a13fc35dfb7a854d1e218d7bf42fe7001410543b705b4cee75b0c4d98ed0d2ab5474af6f3ec6c99546a64390607e8585a55e24b9d22fcc7173c4e8811fc2c44c9f2716a8808f52d09c72feba28a68025e2609861e7576d2a06d778727cf5cda4e3be22a72502092ce44df685cd96f0f20b2cceb8bdb086d039db84d95f387a830a5c55024f19f638304fd051fcbd4959", &(0x7f00000002c0)=""/236) [ 859.343433][ T4301] device lo entered promiscuous mode [ 859.383145][ T4299] device lo left promiscuous mode [ 859.407830][ T4350] FAULT_INJECTION: forcing a failure. [ 859.407830][ T4350] name failslab, interval 1, probability 0, space 0, times 0 [ 859.459826][ T4350] CPU: 0 PID: 4350 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 859.465251][ T4340] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 859.468957][ T4350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.468965][ T4350] Call Trace: [ 859.468994][ T4350] dump_stack+0x172/0x1f0 [ 859.469021][ T4350] should_fail.cold+0xa/0x15 [ 859.502481][ T4350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 859.508288][ T4350] ? ___might_sleep+0x163/0x280 [ 859.513137][ T4350] __should_failslab+0x121/0x190 [ 859.518067][ T4350] should_failslab+0x9/0x14 [ 859.522664][ T4350] kmem_cache_alloc+0x2be/0x710 [ 859.527565][ T4350] ? __save_stack_trace+0x8a/0xf0 [ 859.532596][ T4350] __alloc_file+0x27/0x300 [ 859.537019][ T4350] alloc_empty_file+0x72/0x170 [ 859.541776][ T4350] path_openat+0xef/0x46e0 [ 859.546192][ T4350] ? __lock_acquire+0x55d/0x4710 [ 859.551120][ T4350] ? getname+0x1a/0x20 [ 859.555177][ T4350] ? do_sys_open+0x2c9/0x5d0 [ 859.555194][ T4350] ? __x64_sys_open+0x7e/0xc0 [ 859.564437][ T4350] ? do_syscall_64+0x103/0x610 [ 859.564452][ T4350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.564468][ T4350] ? debug_smp_processor_id+0x3c/0x280 [ 859.564489][ T4350] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 859.564509][ T4350] ? cache_grow_end+0xa4/0x190 [ 859.564525][ T4350] ? __alloc_fd+0x430/0x530 [ 859.564541][ T4350] do_filp_open+0x1a1/0x280 [ 859.599802][ T4350] ? may_open_dev+0x100/0x100 [ 859.604479][ T4350] ? lock_downgrade+0x880/0x880 [ 859.609331][ T4350] ? kasan_check_read+0x11/0x20 [ 859.614188][ T4350] ? do_raw_spin_unlock+0x57/0x270 [ 859.619314][ T4350] ? _raw_spin_unlock+0x2d/0x50 [ 859.624183][ T4350] ? __alloc_fd+0x430/0x530 [ 859.628700][ T4350] do_sys_open+0x3fe/0x5d0 [ 859.633118][ T4350] ? filp_open+0x80/0x80 [ 859.637357][ T4350] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 859.643599][ T4350] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 859.649170][ T4350] ? do_syscall_64+0x26/0x610 [ 859.653854][ T4350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.659916][ T4350] ? do_syscall_64+0x26/0x610 [ 859.664594][ T4350] __x64_sys_open+0x7e/0xc0 [ 859.669096][ T4350] do_syscall_64+0x103/0x610 [ 859.673685][ T4350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.679566][ T4350] RIP: 0033:0x411f11 [ 859.683460][ T4350] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 859.703079][ T4350] RSP: 002b:00007f697238aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 859.711490][ T4350] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 859.719454][ T4350] RDX: 00007f697238aafa RSI: 0000000000000002 RDI: 00007f697238aaf0 [ 859.727420][ T4350] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 859.735382][ T4350] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 859.743346][ T4350] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 859.752329][ T4340] CPU: 0 PID: 4340 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 859.761355][ T4340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.771403][ T4340] Call Trace: [ 859.774691][ T4340] dump_stack+0x172/0x1f0 [ 859.779037][ T4340] dump_header+0x10f/0xba6 [ 859.783458][ T4340] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 859.789264][ T4340] ? ___ratelimit+0x60/0x595 [ 859.793853][ T4340] ? do_raw_spin_unlock+0x57/0x270 [ 859.798967][ T4340] oom_kill_process.cold+0x10/0x15 [ 859.804087][ T4340] out_of_memory+0x79a/0x1280 [ 859.808766][ T4340] ? lock_downgrade+0x880/0x880 [ 859.813614][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.819852][ T4340] ? oom_killer_disable+0x280/0x280 [ 859.825046][ T4340] ? find_held_lock+0x35/0x130 [ 859.829818][ T4340] mem_cgroup_out_of_memory+0x1ca/0x230 [ 859.835359][ T4340] ? memcg_event_wake+0x230/0x230 [ 859.840387][ T4340] ? do_raw_spin_unlock+0x57/0x270 [ 859.845699][ T4340] ? _raw_spin_unlock+0x2d/0x50 [ 859.850548][ T4340] try_charge+0x118d/0x1790 [ 859.855067][ T4340] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 859.860624][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.866865][ T4340] ? kasan_check_read+0x11/0x20 [ 859.871718][ T4340] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 859.877268][ T4340] mem_cgroup_try_charge+0x24d/0x5e0 [ 859.882563][ T4340] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 859.888200][ T4340] shmem_getpage_gfp+0x69e/0x2500 [ 859.893252][ T4340] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 859.899406][ T4340] ? lock_downgrade+0x880/0x880 [ 859.904273][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.910520][ T4340] shmem_fault+0x22d/0x760 [ 859.914936][ T4340] ? __handle_mm_fault+0x344a/0x3ec0 [ 859.920242][ T4340] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 859.926231][ T4340] ? lock_downgrade+0x880/0x880 [ 859.931089][ T4340] __do_fault+0x116/0x4e0 [ 859.935420][ T4340] __handle_mm_fault+0x2c6c/0x3ec0 [ 859.940537][ T4340] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 859.946097][ T4340] ? find_held_lock+0x35/0x130 [ 859.950859][ T4340] ? handle_mm_fault+0x322/0xb30 [ 859.955804][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.962042][ T4340] ? kasan_check_read+0x11/0x20 [ 859.966886][ T4340] handle_mm_fault+0x43f/0xb30 [ 859.971650][ T4340] __do_page_fault+0x5ef/0xda0 [ 859.976413][ T4340] do_page_fault+0x71/0x581 [ 859.980926][ T4340] page_fault+0x1e/0x30 [ 859.985074][ T4340] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 859.991652][ T4340] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 859.999950][ T4301] device lo entered promiscuous mode [ 860.011241][ T4340] RSP: 0018:ffff888073aa78a0 EFLAGS: 00010206 [ 860.011270][ T4340] RAX: 0000000000000000 RBX: 0000000000008000 RCX: 0000000000005f80 [ 860.011278][ T4340] RDX: 0000000000008000 RSI: 0000000020003000 RDI: ffff888054742080 [ 860.011286][ T4340] RBP: ffff888073aa78d8 R08: ffffed100a8e9000 R09: 0000000000000000 [ 860.011294][ T4340] R10: ffffed100a8e8fff R11: ffff888054747fff R12: 0000000020000f80 [ 860.011302][ T4340] R13: ffff888054740000 R14: 0000000020008f80 R15: 00007ffffffff000 [ 860.011331][ T4340] ? copyin+0xe2/0x100 [ 860.011349][ T4340] copy_page_from_iter+0x324/0x750 [ 860.011375][ T4340] skb_copy_datagram_from_iter+0x3ce/0x660 [ 860.011402][ T4340] unix_stream_sendmsg+0x3db/0x990 [ 860.082451][ T4340] ? unix_bind+0xac0/0xac0 [ 860.086863][ T4340] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 860.092402][ T4340] ? apparmor_socket_sendmsg+0x2a/0x30 [ 860.097840][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 860.104069][ T4340] ? security_socket_sendmsg+0x93/0xc0 [ 860.109515][ T4340] ? unix_bind+0xac0/0xac0 [ 860.113919][ T4340] sock_sendmsg+0xdd/0x130 [ 860.118330][ T4340] sock_write_iter+0x27c/0x3e0 [ 860.123094][ T4340] ? sock_sendmsg+0x130/0x130 [ 860.127867][ T4340] ? aa_path_link+0x460/0x460 [ 860.132541][ T4340] ? find_held_lock+0x35/0x130 [ 860.137285][ T4340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 860.143508][ T4340] ? iov_iter_init+0xea/0x220 [ 860.148182][ T4340] new_sync_write+0x4c7/0x760 [ 860.152879][ T4340] ? default_llseek+0x2e0/0x2e0 [ 860.157736][ T4340] ? common_file_perm+0x238/0x720 [ 860.162748][ T4340] ? __fget+0x381/0x550 [ 860.166899][ T4340] ? apparmor_file_permission+0x25/0x30 [ 860.172422][ T4340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 860.178642][ T4340] ? security_file_permission+0x94/0x380 [ 860.184267][ T4340] __vfs_write+0xe4/0x110 [ 860.188609][ T4340] vfs_write+0x20c/0x580 [ 860.192849][ T4340] ksys_write+0xea/0x1f0 [ 860.197082][ T4340] ? __ia32_sys_read+0xb0/0xb0 [ 860.201836][ T4340] ? do_syscall_64+0x26/0x610 [ 860.206495][ T4340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.212539][ T4340] ? do_syscall_64+0x26/0x610 [ 860.217206][ T4340] __x64_sys_write+0x73/0xb0 [ 860.221776][ T4340] do_syscall_64+0x103/0x610 [ 860.226348][ T4340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.232248][ T4340] RIP: 0033:0x457e29 [ 860.236131][ T4340] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 860.252754][ C1] net_ratelimit: 12 callbacks suppressed [ 860.252761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 860.255728][ T4340] RSP: 002b:00007f661b986c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 860.261378][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 860.267029][ T4340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 860.267037][ T4340] RDX: 000000007fffffff RSI: 00000000200000c0 RDI: 0000000000000007 [ 860.267045][ T4340] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 860.267054][ T4340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f661b9876d4 23:37:54 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@H\x00', 0x101}) 23:37:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:54 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:37:54 executing program 3 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 860.267062][ T4340] R13: 00000000004c71f6 R14: 00000000004dccd0 R15: 00000000ffffffff [ 860.267346][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 860.275559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 860.281219][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 860.289170][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 860.297238][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 860.349742][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 860.372106][ T4340] memory: usage 307140kB, limit 307200kB, failcnt 1856 [ 860.393731][ T4340] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 860.401208][ T4340] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 860.408123][ T4340] Memory cgroup stats for /syz2: cache:1460KB rss:236348KB rss_huge:204800KB shmem:1456KB mapped_file:1452KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1428KB active_anon:236520KB inactive_file:0KB active_file:0KB unevictable:0KB [ 860.431552][ T4362] device lo left promiscuous mode [ 860.435230][ T4340] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12315,uid=0 23:37:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000010c0)=ANY=[@ANYBLOB="07030600000000071000ae555019c2b406b37ba34c22d05af0e5e83afeb0b9f048128c472cb3e7b5d489701ea354e4b724f9002aa2071aa9dbc100bd14b4e7f883c1c86f19b2042513d2af9a3ca428fa2e9d3258ac59506bff3155befde9304fe42a782255ef1ba0869a0b9a38788063ccccc96d1bbbde3349da468a12d1c56a5402d5aa9a1a926bcf726800f3fe3031043cb52d7dacf9e099378188d78c6fc51c2dd601c45c8a8be02508b2d3631f7e5b44c90821d0b288aa12589cdf0d4afceeddd44c220c18ed584cbb5d0cdec6b7c906b35683d292e08599977d1c6d492e175611b9ae10fb21888ac013dadebf2ccc5245e7da31378aca959c2a78e759c451d52afe45e726961900decb2c3970ab20a40e27d4a0dd161c4cb2f7136df7b374ab3399db2ee98c67f4e8b45e5f09b876f78d43d0e6c0079a67f67da58eda74622c074e4b695950a1588e9f69b8cf59c2287f2e7d7c180b9688e1991101d9aa2d5958f47dd428ed709f3a6535f28ed9a4b31e90ead456a7244333f91c20d8713b5687d661b6e0d318b58fcb61027851ba90dab3316f7325f732c9b0354c4658aed4e1f0c13e4d39a3f633fb0e25aa9153972105e9c4709adf1b9564ffc2d8cf4234d29adacd24263819511e657454f1407e3e53d1a7b27712111fea297d528a9f4a25761bd071b9f62e1a26d0ec09bc2cd17fb839d4f35bb9e971178105e596a53fce3bb57f15f5ad72ba9f34a4cca6bad7a3c1ee37f25264d1be8e51fd724b2ffa0347a257ab3a6c1e9ccbed4c9d4684c5a7f1e334effa78438c6d1b6192ee3c9e58ad45743e984d973dbe5bf25b7df57ae096295accbfc0e6fca66ee2c937267b1d99c6716b983245dd32b3d4b6df5da8fda4164e2e18d258da3916eee2d7eb31fb4b43d28a2a319462d74e01d7fd6a3c8129dd7c60bb951972a38048fbfb1283fff365369487f8a6cc06555e4774f5e02d8e4911a94d6af9b431e53e748fbccbb976f40465f635ebb6cedc7f25a59c0ca2ed55b9006d017fa463f02adfa8f31529d86d631281e97a1212e85aae57c75577a22214b00bf178b7f2b33fb226e903d34314c360d380c29c457ba08340da6f48f00b6708bf07050e9aac7fa1ba848f23c5ce06244b9e202eca6d18b43c51e3508719343731d4039cb839377ab59d957e5601de5677853857674cdb8e5e40828633de7dff082eeac1b6a6b4b7ac532078257d4ff0e5c09eb128dfdf8eeadb35a3f139a48888e5e43cf1a0aa882a8a9142d8d2ffda960cba0d39981fa659cf7974cb3103d924922711076628763a29718bcc9337cc021324b9dc5c50a1be2491b17c6f7e412b10d940dd072e0874ce4dd5ab6272fe19eca45eea2373171943db5ba44b4bac893a69e5d2eeb5f061fc24e203a4368d1923904b0566687b9938cec85b47e08909b4b32b485e2fb25c2ba84538e16f4d54012573c6175dd105bd0b08bc08845e3fee16269c075470c675ad0923bd308e40d95923730f0070e139c2e2f56c807d375cbd0a5847c0a3548677596c588aee2d60ee2a6ca543f3a7871c4eb82af43a1061f650d86c3172349e0ebd3bb2f472ad7ae989f55a725b7284f6e1665d70a155b77e2d0326522abde4df7c4648e5def4a781af2a3d3ef10cf03282250dc2fa53d99928289a2b0de3f72726ba40709c27bcd0e66cfac1a56bb40907b42760f68de80fca28be2587c83a412b78eedb167471ed0cf3b1bd0e661ccbf2ebf9918bd172c7de74d8064b034b3e269f76d576dd1d9c4033d4c6b25b9e7d4dc07f05f122339633cb4e61648e1c38c12d91dc6881b080b981a6a5a4a73d59378f4a8abdb84eb65658058ced8dd17782fdc16d7b942ba4e4031b2dfa0dd3179b5fdcbd9e8fc07dbc149eeea964f6639a4f597f0267b16fcff3b3f6176aa9fe1a7b800996e0a517e0ddac5869ddaa5a60627c8ac8bad2fd3bcb79f0714da3e6fec8a2bab37ab289833674fc2cdf01a8bbaf6d82bb4075e6489b1cda8e7ca03567967a8016b2f84439e861b7f38ea26f89840464397f8b3101740429894e667d5a05374078cb117d868c21b16ef88c2d2f85031745b72b9a38a9074c1063fede33651c7763fb58aedeac9d3ae899f85fa4c4ebd327988b7f0077947f5f1a7cbf0a57a250fa08042fa4a65c4a00dccc2949e1f84c070546ec728f1bf020881fceb431abd307785bf05ec1b0ae1a72f51204990149a4a95daca079cc1da530682d1bcd486df6b5fd1177d3b80c8ff631b61a3f9569d7c11f0b83237d1a87e232bebee130e288b61bddb72e2266524313ef36fbebce5e970519def83b7e5e27e9b21769e7dacab7d1f9994320eab7e7faad09bbf931fb8dd3d6fd9236e5dd65a1e49d2830ebb918fd803e905bbf2f14f3faa1bf2169ae76a122b0de2c555e7aabf028b3793e749a76dc096da5765d285d23b80df9aaedf3b49a73e1fe7c24f2ef6d948cf5a56dfd35599e5efb310af4427b247c4afb6b0a7c07d81cea8e46d9cc7b85b286e6270131b4a89ba2a2625642a37a4bc83e77b6d9ea9c9e6702b6b5e5d4dd7141efd9ef14101431b5a3b85ac94a47a20cc247796567e30f7fbe14373ee7fefe2a8d1a17703b2178801820f06e8ecc92a3bf4a14523e454b996b672d737f779a44878c0a5752d6d284e1a8a41af3eb50be98643936d45f5dd3c70e909c4a7e8186a886ac4d5c72e484280b2f9e6bafd8d6626ff65cb6fcb5711af88bfe950de67997c0bb0b90ea9c80e049d3c83b33f6a732536b87cd73f1867329d8130d7622c9b749538e82ff5d37953208d50c53a43e42f94798b1a8835e17c3010f5bec5bc7ad259f7d37d0e8dd2b5b259baa1d020eb1e5e3e37ef4ba3989adab2aaa119ffc60ae634eb6f03ad3dd1de84955ff8916c066b2323328acc42cf0c8d49da8b28b400a88335f77bd50d6fb42e21559e18887a6058a4dba1b7ec506b738fcb0641a70bda0274413804a67580c96e3acead25225a69671b3b5f8df339db079e66ee39dc74f44f6e4a1969a473357bd606fe64b8cd3f6c9e2f2c2a569c773ce259724c610bf2994950f0ced3903a2a1e480ca2b52e458eed63f012a58745dba39f845cd186c07d489b5c100102a4119d5a3505158e0c68fb368b608c27c92871d64d930e86e483ffb9658d9b63dc8490961f1274e4f6d6d7a3adb95bd1bbbec753a7f09f9cb4132f5c86e16febeaf1917e58cc23af9767aca07ceba91fc0938d24dedc7c9e363210f5079689ea1a6cb6a3208aad74f86ff951c903258c9d9710978c88b5bdc8f3ca0ce2221544dec8daaa25d7934be23a741753974c9eab077a14f86f684dc5e28abb54d89ba49325d79fa5f857b3aa70061fe0f904124881b9533d0f953575a3e0c56575b3676402bc4aead5a53a03ae0944ca44c4f2c08352ea25fbf3ba1e40bfb97957bff3312ba7131596b3f76270ca414ce212478eba19f0f0de442c31f7a675657221ac702294ddcb790e26aab4c1f2220282e84aab9b3192add5baf329d6138495eaddc6f7ed7dbfc3d691f43a89dcf5d6669538747cb900a78d49cacdf51ff62e7c55b876bc54c9deeff55813ee766e366a1fc53bcff917c4d7e458960164be7178e5a383d2f7a80403251b0d71396c3a341b1ae1cee33e952fe66d2855dccb2c33a2dd52c1548bac1d2f38e37c0ffe5e62263a9d9e972508219b1f6f4901ea0949a6495cd79b0006cda675a53e2e43ffa34e4f343fc755b0ee9c9f1983b34db2d798a7987a5acf336ac858a82ebd08248230a13e9dd50efb8e38700b19de4229f8e32426116b72906c5c6ee9e26795d9b323830c31e8ba2170c67bb3b8dee7c262ebb5b978b7161338ad934d32f5f358bbfcb40e99830797fe026608feeb5bc675c86410a299a65b7b05279158f24ddb32620aa9515fca20dfd92b4d8b7a9bd97690cf46cc795bb5d5c2c8b821f5229bb5b2216c0640b1ab55b07290af3a967f390e216286050e2d52d44d53dc9cc54a99421e156a208723dc8b3fed51e1ff01e1fe577ab68af7b90ac6e6b6f7ae009fbb87edf5b38a26cd34dc039616fdef61a4b669551b48d132683ff2e15e4a4d17cc1be76348a7b8f2cc1fc5ed93191a39c681b6678c94f3d8969a45c4dde9cdab05d760420335e6fc986b5cb6634f652fc83006d374e133bc22b510df1d7961098be8b3ac92376072e4127d759eb8a3fa9e3b09daeade224ee9a54730317e46496a9bd7e111d52b3671c399d7fbe4bb6d6f1ca5c6ab48ae418402987ba6b0100f60497468bcd201b06f5dc92020c9464bb70ad885aa158955d75ac259fdde639db1cc66e68e183249f59ed86cae10f55ae947bd579fe207ca6f2d9777444825e4c649d1b9bfc200653492d14d296773a9bca428b2d3e8460e23676122b0185049fb9329e451488f2232d7bccd2d9cd6850c64888572fd54e4c244c232027cb6661df970383510a0e510eeae294b6e1f78e7c523bc3b3d005f0430ce476688cc9e1cbe29ba7aa1a00159dff68ff8e8f4bf79e9060571e9930f52753688fa161cb7f12cbbb2f0942a172822a37f3143b3fe98130dbbde3d56dfbbe60c86bf34f1f0c2393b00a88143d77d17f946e38fbd7a8921e198cfae7434ca35015caf849c53d7c9dbe92163a14670310accfde7615e9d35487fe6f5420cda4daff32903ed6c6d227d68e1f67473384ef09c1d21617fcfaa7698674483e602d476aadf89c6bec3906dc0804d7544fd6510f02340fc247e595179a7c23819642ffe97b2f1cb945c464a742de91fe75725a53c651223099b4b5d4ab43a73ccbdbd638633ce6c2d4185b04e5b35c60d16b7676de7c49e227c5eab2b9df58331945b752d62599f720eecc3510f0f8a543b910608d0a896d1f83d48d045726abac83096fe2df988a03757dec99f98a6c7db560b4d76d987c16e5a71d6fbd1d682572b0401b98e6b801a8f765663872022ef81c39fafd97ec8728890b7a5ac69ea71c2dcc720a13ab351f963f4ceb6ab1c9026fb749c14b45483eead40ca552fd3fb811028365ee0ed4740e1eaa75768262f47c33eabdcfe8ba7770d583714356e188f8f220a637acc0ba78b886d828b05a99cac728f8ae735cb795719192e9ef95795d0c7b043405c7de2b21e4bb972a7672d401f61094d829f24dbe489b73ef732297fa31ac8bfe4c60231db52f684795b962a11a739194574feed503062f0353aae2ebba60da9647c4e186afd9e6ac7d465989e84e5f35c16279fa749551dadcb9cc3b62130e2827512219a28c494ad82850db49b047e9514cfed41b6f47d690c9d881dba3d4fa5caee92b6e79cb6e76105545f7fc8f743554e3bb18373e62453adc92a286c678b86ac431b6955adb3ba7842d5b01560a4ac67fee5de51b5fd81c6afe59ab8cca5713f91ade4f47c47f69ef0417bfa5d8900450cc0180e27241c2bde8263adddc0b4e287a5d98aebb27601c672a1c7edf3edfd305b36e1b7453abae95c071bdecf0fa752887cba751f2a6252ceaf11a1dd91c662a9039dc65cf5071079235e75aaa50c8dcddb0e2a773632b58cc47c487f8f4c9aa91fe6ec874dd230f99b7df7dce5d2bf6dada5a7fd9a5b9e51fca23217bdcdc7c03d25a7cee7c30d5b90407a5fa2609bcd80594c64c370d928d8544a7dddc25ce5d49c91525af61b31730731c01ad51e48878cf18420740b6fd2586fbc04761a30bc6ade5b32e622b6a90f4b0630289f4ac10dd811c559b6a9d2bf4e6fc8cf7c888dd40075f4416670cf38c597fc7b218e7e851981538d1426cf127a3b0ff3069d7fbb76c3630aa0b9dfd77a6808869b6057482106a5e"], 0x100a, 0x3) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 860.464855][ T4340] Memory cgroup out of memory: Killed process 12315 (syz-executor.2) total-vm:72580kB, anon-rss:2200kB, file-rss:35804kB, shmem-rss:0kB [ 860.479576][ T4366] FAULT_INJECTION: forcing a failure. [ 860.479576][ T4366] name failslab, interval 1, probability 0, space 0, times 0 [ 860.493777][ T1044] oom_reaper: reaped process 12315 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 23:37:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 860.562784][ T4366] CPU: 0 PID: 4366 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 860.571830][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.571838][ T4366] Call Trace: [ 860.571858][ T4366] dump_stack+0x172/0x1f0 [ 860.571880][ T4366] should_fail.cold+0xa/0x15 [ 860.594128][ T4366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 860.599973][ T4366] ? ___might_sleep+0x163/0x280 [ 860.604844][ T4366] __should_failslab+0x121/0x190 [ 860.609798][ T4366] should_failslab+0x9/0x14 [ 860.614306][ T4366] kmem_cache_alloc+0x2be/0x710 [ 860.619165][ T4366] ? rcu_read_lock_sched_held+0x110/0x130 [ 860.624895][ T4366] ? kmem_cache_alloc+0x341/0x710 [ 860.629945][ T4366] security_file_alloc+0x39/0x170 [ 860.634996][ T4366] __alloc_file+0xac/0x300 [ 860.635014][ T4366] alloc_empty_file+0x72/0x170 [ 860.635033][ T4366] path_openat+0xef/0x46e0 [ 860.648590][ T4366] ? __lock_acquire+0x55d/0x4710 [ 860.653528][ T4366] ? getname+0x1a/0x20 [ 860.657600][ T4366] ? do_sys_open+0x2c9/0x5d0 [ 860.662198][ T4366] ? __x64_sys_open+0x7e/0xc0 [ 860.666881][ T4366] ? do_syscall_64+0x103/0x610 [ 860.671659][ T4366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.677729][ T4366] ? debug_smp_processor_id+0x3c/0x280 [ 860.683191][ T4366] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 860.688551][ T4366] ? cache_grow_end+0xa4/0x190 [ 860.693302][ T4366] ? __alloc_fd+0x430/0x530 [ 860.697789][ T4366] do_filp_open+0x1a1/0x280 [ 860.702272][ T4366] ? may_open_dev+0x100/0x100 [ 860.706935][ T4366] ? lock_downgrade+0x880/0x880 [ 860.711770][ T4366] ? kasan_check_read+0x11/0x20 [ 860.716603][ T4366] ? do_raw_spin_unlock+0x57/0x270 [ 860.721695][ T4366] ? _raw_spin_unlock+0x2d/0x50 [ 860.726540][ T4366] ? __alloc_fd+0x430/0x530 [ 860.731039][ T4366] do_sys_open+0x3fe/0x5d0 [ 860.735441][ T4366] ? filp_open+0x80/0x80 [ 860.739667][ T4366] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 860.745894][ T4366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 860.751340][ T4366] ? do_syscall_64+0x26/0x610 [ 860.756001][ T4366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.762064][ T4366] ? do_syscall_64+0x26/0x610 [ 860.766728][ T4366] __x64_sys_open+0x7e/0xc0 [ 860.771215][ T4366] do_syscall_64+0x103/0x610 [ 860.775792][ T4366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.781665][ T4366] RIP: 0033:0x411f11 [ 860.785542][ T4366] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 860.805125][ T4366] RSP: 002b:00007f697238aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 860.813521][ T4366] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 860.821474][ T4366] RDX: 00007f697238aafa RSI: 0000000000000002 RDI: 00007f697238aaf0 [ 860.829427][ T4366] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 860.837379][ T4366] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 860.845339][ T4366] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:37:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:55 executing program 3 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 861.143551][ T4375] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 861.182899][ T4375] CPU: 0 PID: 4375 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 861.191963][ T4375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.202015][ T4375] Call Trace: [ 861.205305][ T4375] dump_stack+0x172/0x1f0 [ 861.209646][ T4375] dump_header+0x10f/0xba6 [ 861.214065][ T4375] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 861.219880][ T4375] ? ___ratelimit+0x60/0x595 [ 861.224470][ T4375] ? do_raw_spin_unlock+0x57/0x270 [ 861.229586][ T4375] oom_kill_process.cold+0x10/0x15 [ 861.234695][ T4375] out_of_memory+0x79a/0x1280 [ 861.239368][ T4375] ? lock_downgrade+0x880/0x880 [ 861.244217][ T4375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.250458][ T4375] ? oom_killer_disable+0x280/0x280 [ 861.255656][ T4375] ? find_held_lock+0x35/0x130 [ 861.260432][ T4375] mem_cgroup_out_of_memory+0x1ca/0x230 [ 861.265980][ T4375] ? memcg_event_wake+0x230/0x230 [ 861.271011][ T4375] ? do_raw_spin_unlock+0x57/0x270 [ 861.276128][ T4375] ? _raw_spin_unlock+0x2d/0x50 [ 861.280985][ T4375] try_charge+0x118d/0x1790 [ 861.285496][ T4375] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 861.291043][ T4375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.297287][ T4375] ? kasan_check_read+0x11/0x20 [ 861.302147][ T4375] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 861.307694][ T4375] mem_cgroup_try_charge+0x24d/0x5e0 [ 861.312992][ T4375] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 861.318629][ T4375] wp_page_copy+0x408/0x1740 [ 861.323220][ T4375] ? find_held_lock+0x35/0x130 [ 861.327990][ T4375] ? pmd_pfn+0x1d0/0x1d0 [ 861.332234][ T4375] ? lock_downgrade+0x880/0x880 [ 861.337086][ T4375] ? swp_swapcount+0x540/0x540 [ 861.341865][ T4375] ? kasan_check_read+0x11/0x20 [ 861.346715][ T4375] ? do_raw_spin_unlock+0x57/0x270 [ 861.351829][ T4375] do_wp_page+0x5d8/0x16c0 [ 861.356258][ T4375] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 861.359478][ T4368] device lo entered promiscuous mode [ 861.361635][ T4375] __handle_mm_fault+0x22e8/0x3ec0 [ 861.361657][ T4375] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 861.361676][ T4375] ? find_held_lock+0x35/0x130 [ 861.382318][ T4375] ? handle_mm_fault+0x322/0xb30 [ 861.387254][ T4375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.393502][ T4375] ? kasan_check_read+0x11/0x20 [ 861.398348][ T4375] handle_mm_fault+0x43f/0xb30 [ 861.403113][ T4375] __do_page_fault+0x5ef/0xda0 [ 861.407879][ T4375] do_page_fault+0x71/0x581 [ 861.412364][ T4375] ? page_fault+0x8/0x30 [ 861.416598][ T4375] page_fault+0x1e/0x30 [ 861.420743][ T4375] RIP: 0033:0x40f9ba [ 861.424625][ T4375] Code: 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 c7 45 18 01 00 00 00 49 89 85 10 05 00 00 48 8b 05 ae 68 64 00 00 01 00 00 00 c7 05 ba 68 64 00 01 00 00 00 41 c7 85 1c 06 00 [ 861.444226][ T4375] RSP: 002b:00007ffd44e54ce0 EFLAGS: 00010206 [ 861.450283][ T4375] RAX: 0000000000a56748 RBX: 0000000000020000 RCX: 0000000000457e7a [ 861.458238][ T4375] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 861.466211][ T4375] RBP: 00007ffd44e54dc0 R08: ffffffffffffffff R09: 0000000000000000 [ 861.474172][ T4375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd44e54ea0 [ 861.482137][ T4375] R13: 00007f661b966700 R14: 0000000000000003 R15: 000000000073c04c 23:37:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SIOCNRDECOBS(r2, 0x89e2) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1fd, 0x2, 0x0, 0x8}, 0x0}, 0xa) [ 861.490323][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 861.496133][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 861.513483][ T4389] device lo left promiscuous mode [ 861.563091][ T4375] memory: usage 307200kB, limit 307200kB, failcnt 1882 [ 861.581519][ T4375] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 861.618355][ T4404] FAULT_INJECTION: forcing a failure. [ 861.618355][ T4404] name failslab, interval 1, probability 0, space 0, times 0 [ 861.632875][ T4404] CPU: 1 PID: 4404 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 861.641908][ T4404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.651959][ T4404] Call Trace: [ 861.655253][ T4404] dump_stack+0x172/0x1f0 [ 861.659611][ T4404] should_fail.cold+0xa/0x15 [ 861.664212][ T4404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 861.670023][ T4404] ? ___might_sleep+0x163/0x280 [ 861.674880][ T4404] __should_failslab+0x121/0x190 [ 861.679904][ T4404] ? loop_info64_to_compat+0x6d0/0x6d0 [ 861.685365][ T4404] should_failslab+0x9/0x14 [ 861.689867][ T4404] kmem_cache_alloc_trace+0x2d1/0x760 [ 861.695241][ T4404] ? lockdep_init_map+0x10c/0x5b0 [ 861.700267][ T4404] ? loop_info64_to_compat+0x6d0/0x6d0 [ 861.705727][ T4404] __kthread_create_on_node+0xf2/0x460 [ 861.711184][ T4404] ? lock_acquire+0x16f/0x3f0 [ 861.715867][ T4404] ? kthread_parkme+0xb0/0xb0 [ 861.720558][ T4404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.726807][ T4404] ? kasan_check_read+0x11/0x20 [ 861.731667][ T4404] ? mutex_trylock+0x1e0/0x1e0 [ 861.736431][ T4404] ? loop_info64_to_compat+0x6d0/0x6d0 [ 861.741888][ T4404] kthread_create_on_node+0xbb/0xf0 [ 861.747083][ T4404] ? __kthread_create_on_node+0x460/0x460 [ 861.752808][ T4404] ? lockdep_init_map+0x10c/0x5b0 [ 861.757847][ T4404] ? lockdep_init_map+0x10c/0x5b0 [ 861.762876][ T4404] lo_ioctl+0xafb/0x20d0 [ 861.767122][ T4404] ? lo_rw_aio+0x1530/0x1530 [ 861.771767][ T4404] blkdev_ioctl+0xee8/0x1c40 [ 861.776360][ T4404] ? blkpg_ioctl+0xa90/0xa90 [ 861.778616][ T4375] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 861.780949][ T4404] ? perf_trace_lock_acquire+0xf5/0x580 [ 861.780971][ T4404] ? __fget+0x35a/0x550 [ 861.780984][ T4404] ? find_held_lock+0x35/0x130 [ 861.781001][ T4404] ? __fget+0x35a/0x550 [ 861.803671][ T4375] Memory cgroup stats for /syz2: cache:1460KB rss:236540KB rss_huge:204800KB shmem:1456KB mapped_file:1452KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1420KB active_anon:236528KB inactive_file:0KB active_file:0KB unevictable:0KB [ 861.806433][ T4404] block_ioctl+0xee/0x130 [ 861.806451][ T4404] ? blkdev_fallocate+0x410/0x410 [ 861.838304][ T4404] do_vfs_ioctl+0xd6e/0x1390 [ 861.842893][ T4404] ? kasan_check_read+0x11/0x20 [ 861.847939][ T4404] ? ioctl_preallocate+0x210/0x210 [ 861.853045][ T4404] ? __fget+0x381/0x550 [ 861.857203][ T4404] ? ksys_dup3+0x3e0/0x3e0 [ 861.861616][ T4404] ? do_sys_open+0x31d/0x5d0 [ 861.866211][ T4404] ? security_file_ioctl+0x93/0xc0 [ 861.867183][ T4375] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12342,uid=0 [ 861.871321][ T4404] ksys_ioctl+0xab/0xd0 [ 861.871342][ T4404] __x64_sys_ioctl+0x73/0xb0 [ 861.871359][ T4404] do_syscall_64+0x103/0x610 [ 861.871380][ T4404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 861.898085][ T4375] Memory cgroup out of memory: Killed process 12342 (syz-executor.2) total-vm:72580kB, anon-rss:2200kB, file-rss:35804kB, shmem-rss:0kB [ 861.899893][ T4404] RIP: 0033:0x457c97 [ 861.899908][ T4404] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 861.899929][ T4404] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 861.899943][ T4404] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 861.899955][ T4404] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:37:56 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@L\x00', 0x101}) 23:37:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000100)={0x2, 0x2540, 0x0, 0x4, 0x1, 0xee}) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x1, 0x7fffffff, 0x10001, 0x1, 0x80000001, 0x1, 0x0, {0x0, @in6={{0xa, 0x4e22, 0x7, @remote}}, 0x3, 0x1, 0x10000, 0x100, 0x80000001}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @broadcast}}, 0x1ff, 0x100000001, 0x100000000, 0x7ff, 0x8}, &(0x7f0000000300)=0x98) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000080)={0x3, "910701fadbfdc5915ece88507c27a8c4ca6bef8254eab87b23c324f2fb17d8bb", 0x600, 0x1ff, 0x4, 0x1, 0x5}) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0xa2d, 0x5, 0x7fffffff, 0x4, 0x401}, 0x81}, 0xa) 23:37:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x2, &(0x7f0000000040)=""/9) [ 861.967103][ T4396] device lo entered promiscuous mode [ 861.967485][ T4404] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 861.980715][ T4404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 861.988691][ T4404] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:37:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') uname(&(0x7f00000003c0)=""/147) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa0, r2, 0x618, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xa0}, 0x1, 0x0, 0x0, 0x801}, 0x4004000) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000200)=0xe8) r4 = getegid() lchown(&(0x7f00000000c0)='./file0\x00', r3, r4) r5 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r5, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 862.069309][ T4417] device lo left promiscuous mode 23:37:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:56 executing program 3 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 862.197211][ T4430] FAULT_INJECTION: forcing a failure. [ 862.197211][ T4430] name failslab, interval 1, probability 0, space 0, times 0 [ 862.210299][ T4430] CPU: 0 PID: 4430 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 862.219333][ T4430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.229390][ T4430] Call Trace: [ 862.232689][ T4430] dump_stack+0x172/0x1f0 [ 862.237015][ T4430] should_fail.cold+0xa/0x15 [ 862.241596][ T4430] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 862.247387][ T4430] ? ___might_sleep+0x163/0x280 [ 862.252223][ T4430] __should_failslab+0x121/0x190 [ 862.257149][ T4430] should_failslab+0x9/0x14 [ 862.261635][ T4430] kmem_cache_alloc+0x2be/0x710 [ 862.266466][ T4430] ? __schedule+0x1387/0x1cc0 [ 862.271211][ T4430] __kernfs_new_node+0xef/0x690 [ 862.276047][ T4430] ? _raw_spin_unlock_irq+0x28/0x90 [ 862.281248][ T4430] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 862.286692][ T4430] ? __lock_acquire+0x55d/0x4710 [ 862.291614][ T4430] ? _raw_spin_unlock_irq+0x5e/0x90 [ 862.296802][ T4430] ? __schedule+0x1387/0x1cc0 [ 862.301495][ T4430] kernfs_new_node+0x99/0x130 [ 862.306159][ T4430] kernfs_create_dir_ns+0x52/0x160 [ 862.311254][ T4430] internal_create_group+0x7f8/0xc40 [ 862.316519][ T4430] ? bd_set_size+0x89/0xb0 [ 862.320925][ T4430] ? remove_files.isra.0+0x190/0x190 [ 862.326203][ T4430] sysfs_create_group+0x20/0x30 [ 862.331039][ T4430] lo_ioctl+0xf8f/0x20d0 [ 862.335269][ T4430] ? lo_rw_aio+0x1530/0x1530 [ 862.339856][ T4430] blkdev_ioctl+0xee8/0x1c40 [ 862.344430][ T4430] ? blkpg_ioctl+0xa90/0xa90 [ 862.349002][ T4430] ? perf_trace_lock_acquire+0xf5/0x580 [ 862.354536][ T4430] ? __fget+0x35a/0x550 [ 862.358669][ T4430] ? find_held_lock+0x35/0x130 [ 862.363414][ T4430] ? __fget+0x35a/0x550 [ 862.367561][ T4430] block_ioctl+0xee/0x130 [ 862.371870][ T4430] ? blkdev_fallocate+0x410/0x410 [ 862.376875][ T4430] do_vfs_ioctl+0xd6e/0x1390 [ 862.381450][ T4430] ? kasan_check_read+0x11/0x20 [ 862.386284][ T4430] ? ioctl_preallocate+0x210/0x210 [ 862.391373][ T4430] ? __fget+0x381/0x550 [ 862.395515][ T4430] ? ksys_dup3+0x3e0/0x3e0 [ 862.399914][ T4430] ? do_sys_open+0x31d/0x5d0 [ 862.404494][ T4430] ? security_file_ioctl+0x93/0xc0 [ 862.409809][ T4430] ksys_ioctl+0xab/0xd0 [ 862.413950][ T4430] __x64_sys_ioctl+0x73/0xb0 [ 862.418528][ T4430] do_syscall_64+0x103/0x610 [ 862.423107][ T4430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 862.428975][ T4430] RIP: 0033:0x457c97 [ 862.432854][ T4430] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 862.452439][ T4430] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 862.460843][ T4430] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 862.468798][ T4430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 862.476750][ T4430] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 862.484709][ T4430] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:37:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) uselib(&(0x7f0000000080)='./file0\x00') r2 = fcntl$dupfd(r1, 0x40d, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x2000, 0x0) [ 862.492661][ T4430] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 862.584626][ T4430] EXT4-fs (sda1): Cannot specify journal on remount 23:37:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0xfffdffffffffffff, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 862.717950][ T4431] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:37:56 executing program 3 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 862.857031][ T4431] CPU: 0 PID: 4431 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 862.866081][ T4431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.876134][ T4431] Call Trace: [ 862.879424][ T4431] dump_stack+0x172/0x1f0 [ 862.883763][ T4431] dump_header+0x10f/0xba6 [ 862.888181][ T4431] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 862.894003][ T4431] ? ___ratelimit+0x60/0x595 [ 862.898596][ T4431] ? do_raw_spin_unlock+0x57/0x270 23:37:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 862.903712][ T4431] oom_kill_process.cold+0x10/0x15 [ 862.908843][ T4431] out_of_memory+0x79a/0x1280 [ 862.913529][ T4431] ? lock_downgrade+0x880/0x880 [ 862.918373][ T4431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.918390][ T4431] ? oom_killer_disable+0x280/0x280 [ 862.929795][ T4431] ? find_held_lock+0x35/0x130 [ 862.934571][ T4431] mem_cgroup_out_of_memory+0x1ca/0x230 [ 862.940120][ T4431] ? memcg_event_wake+0x230/0x230 [ 862.945156][ T4431] ? do_raw_spin_unlock+0x57/0x270 [ 862.950264][ T4431] ? _raw_spin_unlock+0x2d/0x50 [ 862.950285][ T4431] try_charge+0x118d/0x1790 [ 862.950305][ T4431] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 862.965149][ T4431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.971394][ T4431] ? kasan_check_read+0x11/0x20 [ 862.976272][ T4431] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 862.981822][ T4431] mem_cgroup_try_charge+0x24d/0x5e0 [ 862.987114][ T4431] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 862.992752][ T4431] wp_page_copy+0x408/0x1740 [ 862.997336][ T4431] ? find_held_lock+0x35/0x130 [ 863.002101][ T4431] ? pmd_pfn+0x1d0/0x1d0 [ 863.006342][ T4431] ? lock_downgrade+0x880/0x880 [ 863.011480][ T4431] ? swp_swapcount+0x540/0x540 [ 863.016248][ T4431] ? kasan_check_read+0x11/0x20 [ 863.021098][ T4431] ? do_raw_spin_unlock+0x57/0x270 [ 863.026214][ T4431] do_wp_page+0x5d8/0x16c0 [ 863.030641][ T4431] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 863.036022][ T4431] __handle_mm_fault+0x22e8/0x3ec0 [ 863.041148][ T4431] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 863.046698][ T4431] ? find_held_lock+0x35/0x130 [ 863.051473][ T4431] ? handle_mm_fault+0x322/0xb30 [ 863.056424][ T4431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.062672][ T4431] ? kasan_check_read+0x11/0x20 [ 863.067532][ T4431] handle_mm_fault+0x43f/0xb30 [ 863.072308][ T4431] __do_page_fault+0x5ef/0xda0 [ 863.077078][ T4431] do_page_fault+0x71/0x581 [ 863.081588][ T4431] ? page_fault+0x8/0x30 [ 863.085833][ T4431] page_fault+0x1e/0x30 [ 863.089990][ T4431] RIP: 0033:0x40d1a0 23:37:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 863.093884][ T4431] Code: 89 f8 89 c6 81 e6 ff 1f 00 00 8b 14 b5 00 00 73 00 41 39 d0 74 23 85 d2 74 58 83 c0 01 41 39 c1 75 e0 48 89 f8 25 ff 1f 00 00 <89> 3c 85 00 00 73 00 83 c5 01 e8 d1 44 ff ff 41 83 c7 01 45 39 7c [ 863.113484][ T4431] RSP: 002b:00007ffd44e54d00 EFLAGS: 00010206 [ 863.119544][ T4431] RAX: 0000000000000714 RBX: 00000000df68a382 RCX: 0000001b31320000 [ 863.127513][ T4431] RDX: 000000002f436717 RSI: 0000000000000717 RDI: ffffffff3d846714 [ 863.135484][ T4431] RBP: 0000000000000007 R08: 000000003d846714 R09: 000000003d846718 [ 863.143455][ T4431] R10: 00007ffd44e54e90 R11: 0000000000000246 R12: 000000000073c028 [ 863.151426][ T4431] R13: 0000000080000000 R14: 00007f661d7a9008 R15: 000000000000000c [ 863.182811][ T4422] device lo entered promiscuous mode [ 863.198490][ T4463] FAULT_INJECTION: forcing a failure. [ 863.198490][ T4463] name failslab, interval 1, probability 0, space 0, times 0 [ 863.199941][ T4451] device lo left promiscuous mode [ 863.212081][ T4463] CPU: 0 PID: 4463 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 863.217463][ T4431] memory: usage 307200kB, limit 307200kB, failcnt 1951 [ 863.226242][ T4463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.226248][ T4463] Call Trace: [ 863.226271][ T4463] dump_stack+0x172/0x1f0 [ 863.226292][ T4463] should_fail.cold+0xa/0x15 [ 863.226309][ T4463] ? kernel_text_address+0x73/0xf0 [ 863.260433][ T4463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 863.266244][ T4463] ? unwind_get_return_address+0x61/0xa0 [ 863.267633][ T4431] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 863.271886][ T4463] ? __save_stack_trace+0x8a/0xf0 [ 863.271911][ T4463] __should_failslab+0x121/0x190 [ 863.271929][ T4463] should_failslab+0x9/0x14 [ 863.271947][ T4463] kmem_cache_alloc+0x47/0x710 [ 863.289660][ T4431] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 863.293799][ T4463] ? save_stack+0xa9/0xd0 [ 863.293817][ T4463] ? save_stack+0x45/0xd0 [ 863.293833][ T4463] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 863.293847][ T4463] ? kasan_slab_alloc+0xf/0x20 [ 863.293868][ T4463] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 863.293889][ T4463] idr_get_free+0x425/0x8d0 [ 863.293915][ T4463] idr_alloc_u32+0x19e/0x330 [ 863.293932][ T4463] ? __fprop_inc_percpu_max+0x230/0x230 [ 863.293957][ T4463] ? perf_trace_lock+0x510/0x510 [ 863.310264][ T4431] Memory cgroup stats for /syz2: cache:1592KB rss:236444KB rss_huge:204800KB shmem:1588KB mapped_file:1584KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1416KB active_anon:236512KB inactive_file:0KB active_file:0KB unevictable:0KB [ 863.314163][ T4463] idr_alloc_cyclic+0x132/0x270 [ 863.314183][ T4463] ? idr_alloc+0x150/0x150 [ 863.314211][ T4463] __kernfs_new_node+0x171/0x690 [ 863.314231][ T4463] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 863.314248][ T4463] ? __lock_acquire+0x55d/0x4710 [ 863.314268][ T4463] ? _raw_spin_unlock_irq+0x5e/0x90 [ 863.314286][ T4463] ? __schedule+0x1387/0x1cc0 [ 863.314318][ T4463] kernfs_new_node+0x99/0x130 [ 863.330135][ T4431] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14921,uid=0 [ 863.331166][ T4463] kernfs_create_dir_ns+0x52/0x160 [ 863.331186][ T4463] internal_create_group+0x7f8/0xc40 [ 863.331201][ T4463] ? bd_set_size+0x89/0xb0 [ 863.331222][ T4463] ? remove_files.isra.0+0x190/0x190 [ 863.347938][ T4431] Memory cgroup out of memory: Killed process 14921 (syz-executor.2) total-vm:72580kB, anon-rss:2200kB, file-rss:35804kB, shmem-rss:0kB [ 863.350737][ T4463] sysfs_create_group+0x20/0x30 [ 863.350756][ T4463] lo_ioctl+0xf8f/0x20d0 [ 863.350776][ T4463] ? lo_rw_aio+0x1530/0x1530 [ 863.350796][ T4463] blkdev_ioctl+0xee8/0x1c40 [ 863.479777][ T4463] ? blkpg_ioctl+0xa90/0xa90 [ 863.484374][ T4463] ? perf_trace_lock_acquire+0xf5/0x580 [ 863.489924][ T4463] ? __fget+0x35a/0x550 [ 863.494088][ T4463] ? find_held_lock+0x35/0x130 [ 863.498854][ T4463] ? __fget+0x35a/0x550 [ 863.503017][ T4463] block_ioctl+0xee/0x130 [ 863.507345][ T4463] ? blkdev_fallocate+0x410/0x410 [ 863.512389][ T4463] do_vfs_ioctl+0xd6e/0x1390 [ 863.516978][ T4463] ? kasan_check_read+0x11/0x20 [ 863.521835][ T4463] ? ioctl_preallocate+0x210/0x210 [ 863.526955][ T4463] ? __fget+0x381/0x550 [ 863.531120][ T4463] ? ksys_dup3+0x3e0/0x3e0 [ 863.535537][ T4463] ? do_sys_open+0x31d/0x5d0 [ 863.540151][ T4463] ? security_file_ioctl+0x93/0xc0 [ 863.545267][ T4463] ksys_ioctl+0xab/0xd0 [ 863.549432][ T4463] __x64_sys_ioctl+0x73/0xb0 [ 863.554039][ T4463] do_syscall_64+0x103/0x610 [ 863.558638][ T4463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.564536][ T4463] RIP: 0033:0x457c97 [ 863.568432][ T4463] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 863.588033][ T4463] RSP: 002b:00007f6972369a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 863.596440][ T4463] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 863.604404][ T4463] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 863.612371][ T4463] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 863.620342][ T4463] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 863.628309][ T4463] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 863.644639][ T4445] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 863.668195][ T4445] CPU: 0 PID: 4445 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 863.677227][ T4445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.687277][ T4445] Call Trace: [ 863.690565][ T4445] dump_stack+0x172/0x1f0 [ 863.694899][ T4445] dump_header+0x10f/0xba6 [ 863.699323][ T4445] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 863.705125][ T4445] ? ___ratelimit+0x60/0x595 [ 863.709713][ T4445] ? do_raw_spin_unlock+0x57/0x270 [ 863.714829][ T4445] oom_kill_process.cold+0x10/0x15 [ 863.719949][ T4445] out_of_memory+0x79a/0x1280 [ 863.724634][ T4445] ? oom_killer_disable+0x280/0x280 [ 863.729838][ T4445] ? find_held_lock+0x35/0x130 [ 863.734612][ T4445] mem_cgroup_out_of_memory+0x1ca/0x230 [ 863.740157][ T4445] ? memcg_event_wake+0x230/0x230 [ 863.745183][ T4445] ? do_raw_spin_unlock+0x57/0x270 [ 863.750293][ T4445] ? _raw_spin_unlock+0x2d/0x50 [ 863.755142][ T4445] try_charge+0xd4d/0x1790 [ 863.759568][ T4445] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 863.765107][ T4445] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 863.770644][ T4445] ? find_held_lock+0x35/0x130 [ 863.775413][ T4445] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 863.780959][ T4445] __memcg_kmem_charge_memcg+0x7c/0x130 [ 863.786485][ T4445] ? memcg_kmem_put_cache+0xb0/0xb0 [ 863.791670][ T4445] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 863.797200][ T4445] __memcg_kmem_charge+0x136/0x300 [ 863.802413][ T4445] __alloc_pages_nodemask+0x437/0x7e0 [ 863.807766][ T4445] ? find_held_lock+0x35/0x130 [ 863.812509][ T4445] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 863.818210][ T4445] ? __lock_acquire+0x55d/0x4710 [ 863.823125][ T4445] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 863.829346][ T4445] alloc_pages_current+0x107/0x210 [ 863.834435][ T4445] pte_alloc_one+0x1b/0x1a0 [ 863.838931][ T4445] __handle_mm_fault+0x3491/0x3ec0 [ 863.844239][ T4445] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 863.849937][ T4445] ? find_held_lock+0x35/0x130 [ 863.854682][ T4445] ? handle_mm_fault+0x322/0xb30 [ 863.859606][ T4445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.865821][ T4445] ? kasan_check_read+0x11/0x20 [ 863.870654][ T4445] handle_mm_fault+0x43f/0xb30 [ 863.875409][ T4445] __do_page_fault+0x5ef/0xda0 [ 863.880153][ T4445] do_page_fault+0x71/0x581 [ 863.884633][ T4445] ? page_fault+0x8/0x30 [ 863.888859][ T4445] page_fault+0x1e/0x30 [ 863.892994][ T4445] RIP: 0033:0x457e29 [ 863.896873][ T4445] Code: Bad RIP value. [ 863.900915][ T4445] RSP: 002b:00007f661b9a7c78 EFLAGS: 00010246 [ 863.906955][ T4445] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457e29 [ 863.914906][ T4445] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 863.922852][ T4445] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 863.930802][ T4445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f661b9a86d4 [ 863.938750][ T4445] R13: 00000000004be1da R14: 00000000004ce840 R15: 00000000ffffffff [ 863.957172][ T4445] memory: usage 304980kB, limit 307200kB, failcnt 1951 [ 863.968328][ T4445] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 863.977723][ T4445] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 863.988697][ T4445] Memory cgroup stats for /syz2: cache:1592KB rss:234380KB rss_huge:202752KB shmem:1588KB mapped_file:1584KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1416KB active_anon:234376KB inactive_file:0KB active_file:0KB unevictable:0KB [ 864.011446][ T4445] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=24029,uid=0 [ 864.020320][ T4452] device lo entered promiscuous mode [ 864.042804][ T4445] Memory cgroup out of memory: Killed process 24029 (syz-executor.2) total-vm:72580kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 864.060495][ T1044] oom_reaper: reaped process 24029 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 23:37:58 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@`\x00', 0x101}) 23:37:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x5421, &(0x7f0000000040)=""/9) 23:37:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x8000000000000, r0) r3 = semget(0x0, 0x3, 0x21) semctl$GETNCNT(r3, 0x3, 0xe, &(0x7f0000000140)=""/77) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000080)=0x40) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) 23:37:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x8000000004) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r2, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) write(r2, &(0x7f0000000040)="46ad45a5f76238d3ade8ba4628844fe57b07867eecb782b9b3de4d42291004", 0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x27ffff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x7, {{0x2, 0x4e23, @local}}}, 0x88) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000e40)={r3, 0x7ff, 0x1000, "3e5a90d1b9d1813f01e9cf0313f09c0b4e5f172d156d7d6da9c2c6d3f9ec7aa1772c66a1b0daeb5a255f4e4b2c5e40c787edd97684186ff99a5827af2d26133a8f686b4c98462719a1dd6c07cc2c3791a19698e515f0fa2632ed1e5877f75f55e0ee5e5dee9ee47a637051897c66db4b079a75c34133c018804846bd81026b705a683c7cc75d6e342ccee2b2c3fd537125b51599eeb5719a513b887b3baf987cb4778839dc0b23784376d3b45b4377bf9690ecb00df39e2272ae5e168e32936fd54a41b0aa5cfb6fbbc1f1db9a88b85e1219541dde2b68851fb63c3b1dcf500c3ba59fbbad3f4ea75ca77489297980db4ca74a3ee884fe27e2f473982de3f24d36670f6bcae91a91c789f36b64f65ae029b0867920aa49e64ad7490c2f4ebd321f9ad900b6443ce42c040e66aebb367880f921523fce23b49d7196ff970e6848fb74abaa9f41ace283f0d5e1aaea335d8e71794c70b2c1da3458b6a45db681449e8f40a1d360bdfb2a5faec9e26d2d775ab6cf9b5b69b92e79f90a89d11342c72054641b39f593dc9df6eff477a6c13c3227b2a96ed526f6e8fed1e373b4547a6520df623a921fa855b4338fa601abc1cce65b59344563e4ad8fa6f5bd9ddd3991f5eda628c3ec51f92a815c99628af7b22c2ec843bd0c858376c02b2a7f125893a9d78e1a0d283625ccf4c5daeb3bfe575bb238f604d7b4aa6152e41858a0df654a43467dc8605a0faccf157ca84a61397176523443a8ce8d5b8d19b1abcec85c72549cb0dbc008d220d5f507f19acc643274334c9de5244c50949eac7aa168c0124a2661d460085a4429eeebe0084153aa5a3c70fc685045bbe9f0bbc89372b81e43331df1f1c3c4035bc995fac1d0a3b5bd560f51cd66bdf032a7b55c0fa4a3c058807546c3de8dc74437e711dbcab4facae834a8ef2d35c5a51c1a8ae050a49d744af096eec8d355069d10ab45f611fd06f55335b95196730cab8605568bb02a4449f818c0c654ff18235c98e9e4d307b82edae8dc6d9a3fe8035f04d3e45fefa8f525b2f23853662984287ef0380da943c6438ca87972ad482f747268ef75e0948f431a7d1b2a7d16ad288f17376f52fb513a1bead3096dc35e4710171fac7a2220ae30b2638f7e3627a16909e1e1b08f33c71860e0bf0e5cf2c558fed67103ed22729a4542cbc0d9bd172c55ee0f0a5033aa60fb42fccddd56d2dd2d3ea8631624268b8d30da39264ee615a9bd223e9863de66d83b9a0d108b18522ce06b7cb5749b4b35fa6bcc57e063ecd58f9dc513974e99fb604f23c7dc46505ad73f5fa46a2ae18b721e0ba64f064ee86ec21de9e5fcb17122208af9645392efe386519fda551030e3b1443dee19b47db04180c5a0b3b1463ac05e89ea369e5f0a383722f2246ec57a6389345faa2041050c129917cb4ca8da3724499c387df85559ed0b7e596335fe2ea63cef301f3434d6d039c8d5a7fe2aaad173d34b05c8a92c5df82314276de3fd8bca5dc1d208ca4bda4365debab536d950aa61a6b4c29c8ab93faa41f04f86adb3d436de00565531243be4264a4fefa31ea5f216b80bbb385251cefb0bba0aefcce35afe1c3f66b01fb54b68ce591b8b6752d8fab5de052f77db483f9e6faa5c7003177cb21e9112e0af0211806f824aff6a045b045495a2e8eb746bafa155a57812b2bc4e92ae81999c15669331d12d08fb61189ac0a08d055107d6ee7535267c538e5e1562939843a8ae2b2376eed4e3ecf34b285920719a003be7768fd402049671fc126814040320579a139bfa3f09a64eea8a70e5a3815c89aeba147c2f3dc259487d730a525fe35fb312b5cb723b51c3f587abe45e1b1a31e1956d532ac3f5cf6b34e99cb0e58bd30bf0940723e58f296294b767b9f4d06917d0f3089c02d4d3df96eccf46ce808236e96ac133f5e348a846f0cb35c5b37ffea3657a6db9cbce812def7b0d33a38be9e5dec478b32a2b6b153bebe1d240637b1a31e89ac28ef4410396bfb6beaaa361a07f2eb9b862c9707a889095ff02229d57c23b4324bc8231b1f364a0f31b96d466f29e2383cee58fea8d3b1198bec2a0f4c30c0b5457e277c157e2df26692f6eae290f4337076ce18bf5ce0f4eb743f9611de1bb2cc350df20b8f7e585314fd4e2d7dff8c9e1dcc156e9a774a86d4b382686ba05e659ac9dd3f933038d66593b1fdc340629a116eb3861f95cf239386fe4f66610b0296a787237ed6524bbcee328d02db1b3ad2c6ecb3e22d4d3d7b041d06bf7915745394aa399c479520c9bb5c0aa2b2de59f0d50d8ec45bd524cd9e56be8986770e51468dc7ac69c6f8e8826fdce0f4be18c17d449d61cd80656b8b257c8dc4f4210ebfd73df87c525381e1e30500b39452335a803a02179f568eb93b1262ce28dee40cac6cfb9b4d0e4296dec476559e817d23a3c6c2bb7f2c116a28f71e26a07decc01cf503d5ac6e32690f90f4e735d2c519755c7865aba6fa8cedd59867f474f831eff1c08aebf50c9c369e368e025301f5534b65ae0d1f99cff76387d570a7b9e2a54046b4110bed3de6af8b3c3014771475d74863854943d48b05503b05ab7002b4ecbfa3d04a0645be6d3ca49fda37593d293a987665fa24473fcd2324825a93ed7e04325f42a72c4ddcbaa0137a630c3bb883d45d6dbba55c93dda69f03fe88bc4e23fa4a0b1ffeb9a375ad3b934db9b13c1d9e1b7a16f1e9450f9d241b1f84cbee6870164da62a9475eecc2de6c7280b5db987c958e50ee1239ec0d0e1802cb94d3e7eff9789fd5fd735a21c6d69686ba92057f6750e2ccd266b51f25b798002ab87a5f5b7eabfc8153e995953249e23dba320f9a2a5e40c2e2aa1002516d552e157d45045ed0484d0c123ee210bffea690b107b0e1ed2185a4278d9da861d04899574efc67ce03f1145b0026ef0b88b88f160300d35ec8a17603071ae3bf329e4053aca28402eb72c0983ab7c6998b201cdb48f5479ac678c88ef70d4d83964cc9782eb8b634851b52f49b1424e600287f54ec923f62994a98d0905ae44303bcee8ccaab3016da32fd44030b062b21ecbd3f31ddd921e4e200470afd24ad4dd20026fd9d858498eec102ad806d20c48be0ba5ad9151c33143fef440817b6161a7955eb88314311993d67d2ad1b69dab8d991393bd35d0abd96daca07da3e7201812e740eef77df9be2b297ac3c8be2d7469181b6133102c55da22ca6812fbdc2c5805747b9498f90cd1cef3337f971f54f8f73aef0f1826f79ef9f2c23da85ce604482ecd94eda68ebfe10a470e29e3c7350490f13095e74d37f63def3f1dad9f5eadce7266358d8f0ea60346b7b15fa259a0e1b4a52e045f83fe08a3be599a728ca9a99be0b03aae1a9b3282ca3b84da7a94a2855b5aabd98aaff16b24f3a0494c165aa661ecc91fe5bd2d8cc2ba1774327e15fe978c72f36ae9fbb0b317aede6fb43d1423407b7ad4a45ae72b77fe17c878d5d3fcaf794c0f44ad229abf8a4ce05ae844cdaf9febf4027ea38db719f57be2cc643870d4f73a6571296a62dbdf77e32eb3bbff842186994ffe2755234da63e6157e0e0b2f95b5f348a48949c85e48f65c18bc7861b12081981901e4985b4116e598a75bc97ddb2a0836038e45dd3e88eb4dc5eff5c99bb575c2aa9517d4e0acd3cea621401e0b23c73d700c57b7d3acc8ba0f8ab15e69159528d52e940b0484074567263b8201ecb2a2c0a92a776a9f6cec939fec573622f0493a8c2959307a7b87e090a8d16e465b89fceb51a4f5a5b1f758a7bf1999d0ef213b07ca1a97c138082ebf43940675b698ffc9e1cbefc96562d4ea87c871656654965196c82ff08b6c09add045a45793310903485aab404391c4e64a895b086eb929d478f8ba98eee7e52591cf509b0b2e3c97602b216a5cdd1db90a9377b15d3db793ebfc285b0b0c1fa1f98a2367b8ac3048525bd8006c9a16fccd324236606969142982b8210b784bd1b751f628984f2f1b5eed46ca4729a94199304f88457110bb68d716795c49588385cf94a28fb435ab164648ee9c4aae4204f3b5b760521f4753e83989c0f9bcd4e8548a0f96c5e597f415624c3d50d5f8f357723524ac13b6f8b9eb188f5e6e0219dcf76245cbcf08ed6ddb1c54ca62487ca6e213b63e28395fa2ee04b8bb55cd7a3e7c78c3e0fb14fcb4f77fe89c6106b02df53ae131adf9ef7cda0b14b7421ae2c7a8fba14bed3e7a6162c9af9670b48e79f9cc8436ea56aaf2a4d495f83c827ff48872bbbef42e68395d64ff0cb47623eca1286736cfb4db870c8153d5a44cefb93332bd8eb8a479e63ffa9e3f14d74e43cfd1da6f2b11c5dae8353f3691aabcc27c15600c610de22f313d6ee5714990f878e16173c1ce731d190d0dce36f8b54088621feb9eceb3e60901b41b429a9cef63938505066a86792d5e6daa55ded7b9e6fe5ce99ce7a59bde95a17d711e8608d6222998aa7df2362b48e4e5ac9e75ce817a6b273a59933642d666544d63cbb4916d25ef60e6dccd1aaeebfaeba36688caa950274b7ff0324fb6bec845072be45311a0980f90200139fec44fc29c89b119a8dda2dbd871591b47f7a7572f7219e99944dbd71697abdcde518f271885fdc0555680213cfb9f9855cbeea0fb9b18c47794f6c5be4900fb966d2eccf70b2a6257c16600b17fcb5072e328c02c15601e998653e04e6da9d7ca67a7ece41cf29b6203e373746b701a2cc7041cdb3418caeace8ae0d9069dc71f24530a0319e093830f9d0b21fa948776eb2b88418c2cf2e6a0d67e8acadc42140ed4bc3b24bf561c40b54d59c55e7999f883a623101aef4767c6fdc56a5ebdea0dec4e296f7c306e7259b4086b380073718e2745cfc557c6eb7ce3a330aab09e20bfd8d333605721225a9b772d25bcb6f8993cef961c402bfc706e9e6829bb0fb07b9c2d5bb5f3ead7853003a6834e774f9948b5f3fbe63d54f159d3915c72aaa566aa700b697b2e6513e4c48473c830a9b3d8a3bf681076947fb981dfe9a4511020bb1a3917908758900bc173417fe332ce347c24006543896e60ef2d5ad6652a2543a3f3be5bc0e574925bafd0738660d75b7a5d16bf1f98ed391e670f45b02403869bcfbc8a86a8c2b848136402c72cd8ca2ef0ba09fbbadf51e6a80716db4c907878fabf5faf75587bf87009d7e15422ab0a7ff491308b6cc71334ad94b9cf892e63e58c2f4f53c9d3e0f59b9b2bcf7e36df22e85e91e23328272585460e42a886dc85572876b28a4a978939ac65b9625974c297f4dc2728c421f05a8329614e7713a97d1a9d149857143a46bf5d8c219a233531d81d8381032239d1cb335cfb38be84747651658f4aed0ad433d9fff3c976259dd7a01ec6fac1929e21b32a94563e2c8a11619edfffaab42ea063195627e7fe8d29302067202bc3ac404333f46bbe2d3ea942e66446d14949a1ce0c8155b5bcdc57a09cbc8b29078caec41587efe1781d6b16a0ba2a34bdff65109ec5ff22b494341f7d6e8102480efa6ff5f8d0d5595212ca62ba90d1b1f979f9040cbc8dd81959e60355a6e8a248d43e884006c8fd1b569413ffe132834fd95bbdec65627cb077fed933a3da7dbcbbc07eda824fbfb56c6d2fee5422bcadfb3139cae91309783ec84d31141473cc4eba39759e7e3318b3349275828a8069f47bad0872882e99c48263125ec273f730cc4ada4b0aa066a04a7637896e5b3a453dc184410784db3b61ce49327b97bb735498d7c6fdd67cbff9fbb93d27e74f551a4d6784ed5b6cb50dd10d7e67d4703d"}, 0x1008) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'bridge0\x00z\x01\x00'}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) close(r0) 23:37:58 executing program 3 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 864.147072][ T4434] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 864.168065][ T4434] CPU: 0 PID: 4434 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 864.177104][ T4434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.187155][ T4434] Call Trace: [ 864.190449][ T4434] dump_stack+0x172/0x1f0 [ 864.194797][ T4434] dump_header+0x10f/0xba6 [ 864.199212][ T4434] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 864.205015][ T4434] ? ___ratelimit+0x60/0x595 [ 864.209628][ T4434] ? do_raw_spin_unlock+0x57/0x270 [ 864.214743][ T4434] oom_kill_process.cold+0x10/0x15 [ 864.219852][ T4434] out_of_memory+0x79a/0x1280 [ 864.224539][ T4434] ? oom_killer_disable+0x280/0x280 [ 864.229728][ T4434] ? find_held_lock+0x35/0x130 [ 864.234491][ T4434] mem_cgroup_out_of_memory+0x1ca/0x230 [ 864.240037][ T4434] ? memcg_event_wake+0x230/0x230 [ 864.245060][ T4434] ? do_raw_spin_unlock+0x57/0x270 [ 864.250168][ T4434] ? _raw_spin_unlock+0x2d/0x50 [ 864.255009][ T4434] try_charge+0xd4d/0x1790 [ 864.259431][ T4434] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 864.264976][ T4434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.264997][ T4434] ? kasan_check_read+0x11/0x20 [ 864.265017][ T4434] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 864.265037][ T4434] mem_cgroup_try_charge+0x24d/0x5e0 [ 864.265059][ T4434] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 864.265076][ T4434] wp_page_copy+0x408/0x1740 [ 864.265088][ T4434] ? find_held_lock+0x35/0x130 [ 864.265107][ T4434] ? pmd_pfn+0x1d0/0x1d0 [ 864.276170][ T4434] ? lock_downgrade+0x880/0x880 [ 864.276186][ T4434] ? swp_swapcount+0x540/0x540 [ 864.276205][ T4434] ? kasan_check_read+0x11/0x20 [ 864.276222][ T4434] ? do_raw_spin_unlock+0x57/0x270 [ 864.276239][ T4434] do_wp_page+0x5d8/0x16c0 [ 864.276260][ T4434] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 864.276286][ T4434] __handle_mm_fault+0x22e8/0x3ec0 [ 864.276307][ T4434] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 864.292702][ T4434] ? find_held_lock+0x35/0x130 [ 864.292719][ T4434] ? handle_mm_fault+0x322/0xb30 [ 864.292746][ T4434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.292766][ T4434] ? kasan_check_read+0x11/0x20 [ 864.292785][ T4434] handle_mm_fault+0x43f/0xb30 [ 864.292810][ T4434] __do_page_fault+0x5ef/0xda0 [ 864.292835][ T4434] do_page_fault+0x71/0x581 [ 864.311221][ T4434] ? page_fault+0x8/0x30 [ 864.311239][ T4434] page_fault+0x1e/0x30 [ 864.311251][ T4434] RIP: 0033:0x404478 [ 864.311266][ T4434] Code: 85 02 00 00 80 3d 1f c0 64 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 0c c0 64 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 73 d8 ff ff 48 2b 05 8c 3b 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 864.311279][ T4434] RSP: 002b:00007f661b9a7c90 EFLAGS: 00010246 [ 864.350502][ T4488] FAULT_INJECTION: forcing a failure. [ 864.350502][ T4488] name failslab, interval 1, probability 0, space 0, times 0 [ 864.351066][ T4434] RAX: 00007f661d9a9000 RBX: 0000000000000ed2 RCX: 0000000000457e29 [ 864.351076][ T4434] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 864.351086][ T4434] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 864.351095][ T4434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 864.351102][ T4434] R13: 00000000004be1da R14: 00000000004ce840 R15: 00000000ffffffff [ 864.373086][ T4434] memory: usage 302552kB, limit 307200kB, failcnt 1951 [ 864.377945][ T4480] device lo left promiscuous mode [ 864.381758][ T4434] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 864.421657][ T4488] CPU: 1 PID: 4488 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 864.434913][ T4434] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 864.441093][ T4488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.441099][ T4488] Call Trace: [ 864.441118][ T4488] dump_stack+0x172/0x1f0 [ 864.441138][ T4488] should_fail.cold+0xa/0x15 [ 864.441154][ T4488] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 864.441175][ T4488] ? ___might_sleep+0x163/0x280 [ 864.449572][ T4434] Memory cgroup stats for /syz2: cache:1592KB rss:232248KB rss_huge:200704KB shmem:1588KB mapped_file:1584KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1416KB active_anon:232224KB inactive_file:0KB active_file:0KB unevictable:0KB [ 864.457092][ T4488] __should_failslab+0x121/0x190 [ 864.457112][ T4488] should_failslab+0x9/0x14 [ 864.457128][ T4488] kmem_cache_alloc+0x2be/0x710 [ 864.457142][ T4488] ? find_held_lock+0x35/0x130 [ 864.457161][ T4488] ? kernfs_activate+0x192/0x1f0 [ 864.457181][ T4488] __kernfs_new_node+0xef/0x690 [ 864.457200][ T4488] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 864.465646][ T4434] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=573,uid=0 [ 864.473111][ T4488] ? lock_downgrade+0x880/0x880 [ 864.473130][ T4488] ? kasan_check_write+0x14/0x20 [ 864.473145][ T4488] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 864.473163][ T4488] ? wait_for_completion+0x440/0x440 [ 864.473187][ T4488] kernfs_new_node+0x99/0x130 [ 864.473213][ T4488] __kernfs_create_file+0x51/0x340 [ 864.480609][ T4434] Memory cgroup out of memory: Killed process 573 (syz-executor.2) total-vm:72580kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 864.485054][ T4488] sysfs_add_file_mode_ns+0x222/0x560 [ 864.485081][ T4488] internal_create_group+0x35b/0xc40 [ 864.485097][ T4488] ? bd_set_size+0x89/0xb0 [ 864.485121][ T4488] ? remove_files.isra.0+0x190/0x190 [ 864.485154][ T4488] sysfs_create_group+0x20/0x30 [ 864.682117][ T4488] lo_ioctl+0xf8f/0x20d0 [ 864.686383][ T4488] ? lo_rw_aio+0x1530/0x1530 [ 864.690974][ T4488] blkdev_ioctl+0xee8/0x1c40 [ 864.695563][ T4488] ? blkpg_ioctl+0xa90/0xa90 [ 864.700161][ T4488] ? perf_trace_lock_acquire+0xf5/0x580 [ 864.705707][ T4488] ? __fget+0x35a/0x550 [ 864.709875][ T4488] ? find_held_lock+0x35/0x130 [ 864.714639][ T4488] ? __fget+0x35a/0x550 [ 864.718801][ T4488] block_ioctl+0xee/0x130 [ 864.723132][ T4488] ? blkdev_fallocate+0x410/0x410 [ 864.728158][ T4488] do_vfs_ioctl+0xd6e/0x1390 [ 864.732752][ T4488] ? kasan_check_read+0x11/0x20 [ 864.737617][ T4488] ? ioctl_preallocate+0x210/0x210 [ 864.742727][ T4488] ? __fget+0x381/0x550 [ 864.746891][ T4488] ? ksys_dup3+0x3e0/0x3e0 [ 864.751313][ T4488] ? do_sys_open+0x31d/0x5d0 [ 864.755916][ T4488] ? security_file_ioctl+0x93/0xc0 [ 864.761029][ T4488] ksys_ioctl+0xab/0xd0 [ 864.765184][ T4488] __x64_sys_ioctl+0x73/0xb0 [ 864.769781][ T4488] do_syscall_64+0x103/0x610 [ 864.774381][ T4488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.780268][ T4488] RIP: 0033:0x457c97 [ 864.784163][ T4488] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 864.803763][ T4488] RSP: 002b:00007f6972348a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 864.812175][ T4488] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 864.820149][ T4488] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 864.828118][ T4488] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 864.836088][ T4488] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:37:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:37:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) recvfrom(r1, &(0x7f0000000080)=""/132, 0x84, 0x41, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x2, {0xa, 0x4e22, 0x6, @loopback, 0x3}}}, 0x80) r2 = fcntl$dupfd(r1, 0x0, r0) socket$bt_rfcomm(0x1f, 0x1, 0x3) open(&(0x7f0000000000)='./file0\x00', 0x480000, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file1\x00', r1}, 0x10) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 864.844061][ T4488] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:37:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x5450, &(0x7f0000000040)=""/9) 23:37:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:37:59 executing program 3 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 865.023319][ T4484] device lo entered promiscuous mode [ 865.047963][ T4494] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.055293][ T4494] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.120381][ T4514] FAULT_INJECTION: forcing a failure. [ 865.120381][ T4514] name failslab, interval 1, probability 0, space 0, times 0 [ 865.165908][ T4514] CPU: 1 PID: 4514 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 865.174967][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.185026][ T4514] Call Trace: [ 865.188329][ T4514] dump_stack+0x172/0x1f0 [ 865.192669][ T4514] should_fail.cold+0xa/0x15 [ 865.197273][ T4514] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 865.203097][ T4514] ? ___might_sleep+0x163/0x280 [ 865.207960][ T4514] __should_failslab+0x121/0x190 [ 865.212908][ T4514] should_failslab+0x9/0x14 [ 865.217417][ T4514] kmem_cache_alloc+0x2be/0x710 [ 865.222274][ T4514] ? lock_downgrade+0x880/0x880 [ 865.227131][ T4514] ? kasan_check_read+0x11/0x20 [ 865.231990][ T4514] __kernfs_new_node+0xef/0x690 [ 865.236849][ T4514] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 865.242313][ T4514] ? wait_for_completion+0x440/0x440 [ 865.247607][ T4514] ? mutex_unlock+0xd/0x10 [ 865.252027][ T4514] ? kernfs_activate+0x192/0x1f0 [ 865.256968][ T4514] kernfs_new_node+0x99/0x130 [ 865.261654][ T4514] __kernfs_create_file+0x51/0x340 [ 865.266769][ T4514] sysfs_add_file_mode_ns+0x222/0x560 [ 865.272143][ T4514] internal_create_group+0x35b/0xc40 [ 865.277429][ T4514] ? bd_set_size+0x89/0xb0 [ 865.281859][ T4514] ? remove_files.isra.0+0x190/0x190 [ 865.287154][ T4514] sysfs_create_group+0x20/0x30 [ 865.292010][ T4514] lo_ioctl+0xf8f/0x20d0 [ 865.296257][ T4514] ? lo_rw_aio+0x1530/0x1530 [ 865.300881][ T4514] blkdev_ioctl+0xee8/0x1c40 [ 865.305473][ T4514] ? blkpg_ioctl+0xa90/0xa90 [ 865.310064][ T4514] ? perf_trace_lock_acquire+0xf5/0x580 [ 865.315614][ T4514] ? __fget+0x35a/0x550 [ 865.319772][ T4514] ? find_held_lock+0x35/0x130 [ 865.324548][ T4514] ? __fget+0x35a/0x550 [ 865.328711][ T4514] block_ioctl+0xee/0x130 [ 865.333039][ T4514] ? blkdev_fallocate+0x410/0x410 [ 865.338066][ T4514] do_vfs_ioctl+0xd6e/0x1390 [ 865.342657][ T4514] ? kasan_check_read+0x11/0x20 [ 865.347514][ T4514] ? ioctl_preallocate+0x210/0x210 [ 865.352632][ T4514] ? __fget+0x381/0x550 [ 865.356798][ T4514] ? ksys_dup3+0x3e0/0x3e0 [ 865.361213][ T4514] ? do_sys_open+0x31d/0x5d0 [ 865.365828][ T4514] ? security_file_ioctl+0x93/0xc0 [ 865.370942][ T4514] ksys_ioctl+0xab/0xd0 [ 865.375098][ T4514] __x64_sys_ioctl+0x73/0xb0 [ 865.379691][ T4514] do_syscall_64+0x103/0x610 [ 865.384291][ T4514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.390178][ T4514] RIP: 0033:0x457c97 [ 865.394084][ T4514] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 865.413680][ T4514] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 865.422086][ T4514] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 865.430051][ T4514] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 865.438022][ T4514] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 865.445993][ T4514] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 865.453961][ T4514] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:37:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) prctl$PR_SVE_GET_VL(0x33, 0x4ebc) [ 865.467104][ T4508] device lo left promiscuous mode [ 865.559382][ T4514] EXT4-fs (sda1): Cannot specify journal on remount 23:37:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x5451, &(0x7f0000000040)=""/9) [ 865.692749][ C0] net_ratelimit: 18 callbacks suppressed [ 865.692762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 865.704201][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:37:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@h\x00', 0x101}) 23:37:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x1c, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e630c4011b859000400000000000000106308400300000000000000"], 0x48, 0x0, &(0x7f00000000c0)="56cc6af28d514627401745060a635cf8700f0365543687c0a79b4076222623aa24a15477ab44198d5d6e4f02f82f14de19cccd09af063a5cf04c7053c37cf9c6dddb684056d20c9e"}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000280)) r3 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x5}, 0x28, 0x2) 23:37:59 executing program 3 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:37:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @dev}, 'ipv_vti0\x00\x00\x00\x00\x00\x00\x05\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @empty}, {0x20000000304, @dev}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x200, 0x4) 23:37:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 865.862448][ T4510] device lo entered promiscuous mode [ 865.918573][ T4535] FAULT_INJECTION: forcing a failure. [ 865.918573][ T4535] name failslab, interval 1, probability 0, space 0, times 0 [ 865.932463][ T4541] device lo left promiscuous mode [ 865.936328][ T4535] CPU: 0 PID: 4535 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 865.946527][ T4535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.956578][ T4535] Call Trace: [ 865.959877][ T4535] dump_stack+0x172/0x1f0 [ 865.964214][ T4535] should_fail.cold+0xa/0x15 23:37:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x4}, 0x7) [ 865.968807][ T4535] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 865.974618][ T4535] ? ___might_sleep+0x163/0x280 [ 865.979485][ T4535] __should_failslab+0x121/0x190 [ 865.984427][ T4535] should_failslab+0x9/0x14 [ 865.988940][ T4535] kmem_cache_alloc+0x2be/0x710 [ 865.993789][ T4535] ? lock_downgrade+0x880/0x880 [ 865.998635][ T4535] ? kasan_check_read+0x11/0x20 [ 866.003498][ T4535] __kernfs_new_node+0xef/0x690 [ 866.008346][ T4535] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 866.013798][ T4535] ? wait_for_completion+0x440/0x440 [ 866.019088][ T4535] ? mutex_unlock+0xd/0x10 [ 866.023499][ T4535] ? kernfs_activate+0x192/0x1f0 [ 866.028454][ T4535] kernfs_new_node+0x99/0x130 [ 866.033144][ T4535] __kernfs_create_file+0x51/0x340 [ 866.038261][ T4535] sysfs_add_file_mode_ns+0x222/0x560 [ 866.043653][ T4535] internal_create_group+0x35b/0xc40 [ 866.048935][ T4535] ? bd_set_size+0x89/0xb0 [ 866.053355][ T4535] ? remove_files.isra.0+0x190/0x190 [ 866.058654][ T4535] sysfs_create_group+0x20/0x30 [ 866.063507][ T4535] lo_ioctl+0xf8f/0x20d0 [ 866.067791][ T4535] ? lo_rw_aio+0x1530/0x1530 [ 866.072387][ T4535] blkdev_ioctl+0xee8/0x1c40 [ 866.076978][ T4535] ? blkpg_ioctl+0xa90/0xa90 [ 866.081568][ T4535] ? perf_trace_lock_acquire+0xf5/0x580 [ 866.087117][ T4535] ? __fget+0x35a/0x550 [ 866.091275][ T4535] ? find_held_lock+0x35/0x130 [ 866.096036][ T4535] ? __fget+0x35a/0x550 [ 866.100196][ T4535] block_ioctl+0xee/0x130 [ 866.104529][ T4535] ? blkdev_fallocate+0x410/0x410 [ 866.109554][ T4535] do_vfs_ioctl+0xd6e/0x1390 [ 866.114143][ T4535] ? kasan_check_read+0x11/0x20 [ 866.118995][ T4535] ? ioctl_preallocate+0x210/0x210 [ 866.124102][ T4535] ? __fget+0x381/0x550 [ 866.128267][ T4535] ? ksys_dup3+0x3e0/0x3e0 [ 866.132679][ T4535] ? do_sys_open+0x31d/0x5d0 [ 866.137269][ T4535] ? security_file_ioctl+0x93/0xc0 [ 866.142379][ T4535] ksys_ioctl+0xab/0xd0 [ 866.146534][ T4535] __x64_sys_ioctl+0x73/0xb0 [ 866.151143][ T4535] do_syscall_64+0x103/0x610 [ 866.155742][ T4535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.161631][ T4535] RIP: 0033:0x457c97 [ 866.165522][ T4535] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 866.185132][ T4535] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.193537][ T4535] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 866.201502][ T4535] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.209477][ T4535] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 866.217442][ T4535] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 866.225411][ T4535] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 866.227192][ T4543] device lo entered promiscuous mode [ 866.250621][ T4535] EXT4-fs (sda1): Cannot specify journal on remount 23:38:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x5452, &(0x7f0000000040)=""/9) [ 866.326086][ T4541] device lo left promiscuous mode 23:38:00 executing program 3 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x200, 0x9, 0xfffffffffffff800, 0x0, 0x5, 0x22000, 0x4, 0x2, 0x7, 0x4, 0x6, 0x80000001, 0xffffffff, 0x3e055fb9, 0x0, 0x4, 0xc000000, 0x4, 0x9, 0xfff, 0xff59, 0x7, 0x0, 0x5, 0x1, 0x10001, 0x8, 0x1, 0x8, 0x0, 0x100, 0x76a, 0x2, 0x200, 0xf4, 0x0, 0x8, 0x3, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0xffff, 0x7, 0x0, 0x0, 0x8, 0x100000000}, r1, 0xd, 0xffffffffffffff9c, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x94, "eb4c053430addaa32cda3c253646d8e0e370a01c4d6a67c2a4c7c12d919196d4111f2f3c4be656c14f2b423106af4bc1746aaa5a9e84ebd2ec69b5e2bc1f28b8dccdd7f9211466b9728337353e69a67c488cf74139a4ba008a858d1b34b67eeeadd7bcaa9440fc1cf9a92a5f23bd67ae82008d7d4bab056664d6eaa24d0baf7416ffa3d9d5476437468e05c13e31842ad912cee4"}, &(0x7f00000001c0)=0x9c) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r3, 0x7}, &(0x7f0000000240)=0x8) 23:38:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 866.493589][ T4569] FAULT_INJECTION: forcing a failure. [ 866.493589][ T4569] name failslab, interval 1, probability 0, space 0, times 0 [ 866.537817][ T4569] CPU: 0 PID: 4569 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 866.546871][ T4569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.556922][ T4569] Call Trace: [ 866.560218][ T4569] dump_stack+0x172/0x1f0 [ 866.564556][ T4569] should_fail.cold+0xa/0x15 [ 866.569155][ T4569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 866.574973][ T4569] ? ___might_sleep+0x163/0x280 [ 866.579827][ T4569] __should_failslab+0x121/0x190 [ 866.584766][ T4569] should_failslab+0x9/0x14 [ 866.589268][ T4569] kmem_cache_alloc+0x2be/0x710 [ 866.594127][ T4569] ? lock_downgrade+0x880/0x880 [ 866.598990][ T4569] ? kasan_check_read+0x11/0x20 [ 866.603847][ T4569] __kernfs_new_node+0xef/0x690 [ 866.608719][ T4569] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 866.614175][ T4569] ? wait_for_completion+0x440/0x440 [ 866.619471][ T4569] ? mutex_unlock+0xd/0x10 [ 866.623898][ T4569] ? kernfs_activate+0x192/0x1f0 [ 866.628839][ T4569] kernfs_new_node+0x99/0x130 [ 866.633527][ T4569] __kernfs_create_file+0x51/0x340 [ 866.638639][ T4569] sysfs_add_file_mode_ns+0x222/0x560 [ 866.644028][ T4569] internal_create_group+0x35b/0xc40 [ 866.649317][ T4569] ? bd_set_size+0x89/0xb0 [ 866.653743][ T4569] ? remove_files.isra.0+0x190/0x190 [ 866.659041][ T4569] sysfs_create_group+0x20/0x30 [ 866.663893][ T4569] lo_ioctl+0xf8f/0x20d0 [ 866.668138][ T4569] ? lo_rw_aio+0x1530/0x1530 [ 866.672728][ T4569] blkdev_ioctl+0xee8/0x1c40 [ 866.677314][ T4569] ? blkpg_ioctl+0xa90/0xa90 [ 866.681909][ T4569] ? perf_trace_lock_acquire+0xf5/0x580 [ 866.687459][ T4569] ? __fget+0x35a/0x550 [ 866.691631][ T4569] ? find_held_lock+0x35/0x130 [ 866.696401][ T4569] ? __fget+0x35a/0x550 [ 866.700569][ T4569] block_ioctl+0xee/0x130 [ 866.704897][ T4569] ? blkdev_fallocate+0x410/0x410 [ 866.709922][ T4569] do_vfs_ioctl+0xd6e/0x1390 [ 866.714521][ T4569] ? kasan_check_read+0x11/0x20 [ 866.719372][ T4569] ? ioctl_preallocate+0x210/0x210 [ 866.724480][ T4569] ? __fget+0x381/0x550 [ 866.728650][ T4569] ? ksys_dup3+0x3e0/0x3e0 [ 866.733072][ T4569] ? do_sys_open+0x31d/0x5d0 [ 866.737678][ T4569] ? security_file_ioctl+0x93/0xc0 [ 866.742795][ T4569] ksys_ioctl+0xab/0xd0 [ 866.746957][ T4569] __x64_sys_ioctl+0x73/0xb0 [ 866.751553][ T4569] do_syscall_64+0x103/0x610 [ 866.756151][ T4569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.762037][ T4569] RIP: 0033:0x457c97 [ 866.765934][ T4569] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:38:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x8, 0x4) [ 866.785534][ T4569] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.793939][ T4569] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 866.801904][ T4569] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.809872][ T4569] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 866.817836][ T4569] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 866.817852][ T4543] device lo entered promiscuous mode [ 866.825816][ T4569] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 866.864833][ T4569] EXT4-fs (sda1): Cannot specify journal on remount [ 866.892748][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 866.892784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 866.898555][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:38:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x1c, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e630c4011b859000400000000000000106308400300000000000000"], 0x48, 0x0, &(0x7f00000000c0)="56cc6af28d514627401745060a635cf8700f0365543687c0a79b4076222623aa24a15477ab44198d5d6e4f02f82f14de19cccd09af063a5cf04c7053c37cf9c6dddb684056d20c9e"}) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000280)) r3 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x5}, 0x28, 0x2) 23:38:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@l\x00', 0x101}) [ 866.904317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 866.910041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 866.915696][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 866.921391][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:38:01 executing program 3 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:01 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x10000, 0x55f, 0x2, 0x3, 0x1b, 0x9}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) 23:38:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x5460, &(0x7f0000000040)=""/9) [ 867.100157][ T4591] device lo left promiscuous mode [ 867.140384][ T4594] FAULT_INJECTION: forcing a failure. [ 867.140384][ T4594] name failslab, interval 1, probability 0, space 0, times 0 [ 867.167653][ T4594] CPU: 1 PID: 4594 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 867.176697][ T4594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.186744][ T4594] Call Trace: [ 867.190035][ T4594] dump_stack+0x172/0x1f0 [ 867.194388][ T4594] should_fail.cold+0xa/0x15 [ 867.198986][ T4594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 867.204811][ T4594] ? ___might_sleep+0x163/0x280 [ 867.209673][ T4594] __should_failslab+0x121/0x190 [ 867.214629][ T4594] should_failslab+0x9/0x14 [ 867.219136][ T4594] kmem_cache_alloc+0x2be/0x710 [ 867.223985][ T4594] ? lock_downgrade+0x880/0x880 [ 867.228835][ T4594] ? kasan_check_read+0x11/0x20 [ 867.233691][ T4594] __kernfs_new_node+0xef/0x690 [ 867.238547][ T4594] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 867.244004][ T4594] ? wait_for_completion+0x440/0x440 [ 867.249294][ T4594] ? mutex_unlock+0xd/0x10 [ 867.253707][ T4594] ? kernfs_activate+0x192/0x1f0 [ 867.258647][ T4594] kernfs_new_node+0x99/0x130 [ 867.263328][ T4594] __kernfs_create_file+0x51/0x340 [ 867.268445][ T4594] sysfs_add_file_mode_ns+0x222/0x560 [ 867.273826][ T4594] internal_create_group+0x35b/0xc40 [ 867.279109][ T4594] ? bd_set_size+0x89/0xb0 [ 867.283542][ T4594] ? remove_files.isra.0+0x190/0x190 [ 867.288840][ T4594] sysfs_create_group+0x20/0x30 [ 867.293692][ T4594] lo_ioctl+0xf8f/0x20d0 [ 867.297938][ T4594] ? lo_rw_aio+0x1530/0x1530 [ 867.302533][ T4594] blkdev_ioctl+0xee8/0x1c40 [ 867.307129][ T4594] ? blkpg_ioctl+0xa90/0xa90 [ 867.311814][ T4594] ? perf_trace_lock_acquire+0xf5/0x580 [ 867.317371][ T4594] ? __fget+0x35a/0x550 [ 867.321538][ T4594] ? find_held_lock+0x35/0x130 [ 867.326301][ T4594] ? __fget+0x35a/0x550 [ 867.330461][ T4594] block_ioctl+0xee/0x130 [ 867.334797][ T4594] ? blkdev_fallocate+0x410/0x410 [ 867.339826][ T4594] do_vfs_ioctl+0xd6e/0x1390 [ 867.344413][ T4594] ? kasan_check_read+0x11/0x20 [ 867.349385][ T4594] ? ioctl_preallocate+0x210/0x210 [ 867.354494][ T4594] ? __fget+0x381/0x550 [ 867.358656][ T4594] ? ksys_dup3+0x3e0/0x3e0 [ 867.363094][ T4594] ? do_sys_open+0x31d/0x5d0 [ 867.367694][ T4594] ? security_file_ioctl+0x93/0xc0 [ 867.372809][ T4594] ksys_ioctl+0xab/0xd0 [ 867.376967][ T4594] __x64_sys_ioctl+0x73/0xb0 [ 867.381557][ T4594] do_syscall_64+0x103/0x610 [ 867.386154][ T4594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.392040][ T4594] RIP: 0033:0x457c97 [ 867.395931][ T4594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.415527][ T4594] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 867.423934][ T4594] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 867.431897][ T4594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:38:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0xda3, 0x9}]}, 0xc, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x6, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10ff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a000000000000000000000000000000", 0x58}], 0x1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x12100, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f00000001c0)="99dbba0c739a0f1809de0bce8b8405a678e59c7cd86242ea6dfe77a83062197e2cad54e85870b4315b72b2b5a80d5d052e85b685fa8de8b4440d53fe0dab14d1d9984923e44c168c80b8e90200c3f8a0cc4d1a72840b6205353eea7d08a99d41734f4d4ebfa47b229afbd68d15fb0645873e6dfcdce214b5c2b7b8fc6a162f0766f0f267e816b4b36af0913326dc64848e150319ee0071af613afb5a8576d55755e04a136992f6d2937c54e42616ba5face9205db8e61eda95bd92e7395b69487a5f283fb1306e9662b7b79ec3a68cec02820a873d6f9265153774b40ab5c3fd67b9c9e513adb497304235f4a000"}, 0x10) 23:38:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 867.439862][ T4594] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 867.447827][ T4594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 867.455792][ T4594] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 867.456777][ T4598] device lo entered promiscuous mode [ 867.472248][ T4594] EXT4-fs (sda1): Cannot specify journal on remount [ 867.513472][ T4591] device lo left promiscuous mode 23:38:01 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x1, 0x0, 0x0, 0x3f}, 0x0}, 0xa) 23:38:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:01 executing program 3 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40044581, &(0x7f0000000040)=""/9) 23:38:01 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$void(0xffffffffffffffff, 0x5451) [ 867.741005][ T4626] FAULT_INJECTION: forcing a failure. [ 867.741005][ T4626] name failslab, interval 1, probability 0, space 0, times 0 [ 867.754175][ T4626] CPU: 0 PID: 4626 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 867.763204][ T4626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.773254][ T4626] Call Trace: [ 867.776546][ T4626] dump_stack+0x172/0x1f0 [ 867.780893][ T4626] should_fail.cold+0xa/0x15 [ 867.785490][ T4626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 867.791306][ T4626] ? ___might_sleep+0x163/0x280 [ 867.796172][ T4626] __should_failslab+0x121/0x190 [ 867.801115][ T4626] should_failslab+0x9/0x14 [ 867.805622][ T4626] kmem_cache_alloc+0x2be/0x710 [ 867.810472][ T4626] ? lock_downgrade+0x880/0x880 [ 867.815319][ T4626] ? kasan_check_read+0x11/0x20 [ 867.820186][ T4626] __kernfs_new_node+0xef/0x690 [ 867.825055][ T4626] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 867.830517][ T4626] ? wait_for_completion+0x440/0x440 [ 867.835810][ T4626] ? mutex_unlock+0xd/0x10 [ 867.840229][ T4626] ? kernfs_activate+0x192/0x1f0 [ 867.845410][ T4626] kernfs_new_node+0x99/0x130 [ 867.850093][ T4626] __kernfs_create_file+0x51/0x340 [ 867.855210][ T4626] sysfs_add_file_mode_ns+0x222/0x560 [ 867.860603][ T4626] internal_create_group+0x35b/0xc40 [ 867.865890][ T4626] ? bd_set_size+0x89/0xb0 [ 867.870313][ T4626] ? remove_files.isra.0+0x190/0x190 [ 867.875632][ T4626] sysfs_create_group+0x20/0x30 [ 867.880488][ T4626] lo_ioctl+0xf8f/0x20d0 [ 867.884736][ T4626] ? lo_rw_aio+0x1530/0x1530 [ 867.889341][ T4626] blkdev_ioctl+0xee8/0x1c40 [ 867.893937][ T4626] ? blkpg_ioctl+0xa90/0xa90 [ 867.898533][ T4626] ? perf_trace_lock_acquire+0xf5/0x580 [ 867.904086][ T4626] ? __fget+0x35a/0x550 [ 867.908243][ T4626] ? find_held_lock+0x35/0x130 [ 867.913007][ T4626] ? __fget+0x35a/0x550 [ 867.917163][ T4626] block_ioctl+0xee/0x130 [ 867.921493][ T4626] ? blkdev_fallocate+0x410/0x410 [ 867.926522][ T4626] do_vfs_ioctl+0xd6e/0x1390 [ 867.931124][ T4626] ? kasan_check_read+0x11/0x20 [ 867.935981][ T4626] ? ioctl_preallocate+0x210/0x210 [ 867.941090][ T4626] ? __fget+0x381/0x550 [ 867.945248][ T4626] ? ksys_dup3+0x3e0/0x3e0 [ 867.949670][ T4626] ? do_sys_open+0x31d/0x5d0 [ 867.954271][ T4626] ? security_file_ioctl+0x93/0xc0 [ 867.959394][ T4626] ksys_ioctl+0xab/0xd0 [ 867.963580][ T4626] __x64_sys_ioctl+0x73/0xb0 [ 867.968172][ T4626] do_syscall_64+0x103/0x610 [ 867.972764][ T4626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.978656][ T4626] RIP: 0033:0x457c97 [ 867.982571][ T4626] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.002172][ T4626] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 868.010586][ T4626] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 868.018551][ T4626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 868.026526][ T4626] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 868.034509][ T4626] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:38:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 868.042478][ T4626] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 868.050669][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 868.084062][ T4626] EXT4-fs (sda1): Cannot specify journal on remount [ 868.151064][ T4598] device lo entered promiscuous mode 23:38:02 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@t\x00', 0x101}) 23:38:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) 23:38:02 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmsg(r0, &(0x7f0000001240)={&(0x7f0000000080)=@generic={0x0, "0e6e9a13dc1e4e6f6be0a2846599dfa644666ee8379130cb6af943576340197b134776398f1bdba9f7decd0fac65abecb9deb67bae0617b71d137a2ba0d2bb7bc51a1788ca27cea92b1467e2ac56bf0168f7b167260e46dd91b02cfaaa83983b80260fea379dffa45fc39f3a611b81f20a29826dca43a6045bd7a0ddaeeb"}, 0x80, 0x0}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffff, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000100)) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x100, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x5, 0x5, 0x8, 0x4355, 0x1, 0x4}) 23:38:02 executing program 3 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:02 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_tcp(0x2, 0x1, 0x0) tgkill(0x0, 0x0, 0x0) clock_getres(0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) unshare(0x400) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) fcntl$lock(r2, 0x7, &(0x7f00000001c0)) tkill(0x0, 0x1000000000016) dup3(r1, r2, 0x0) 23:38:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40044590, &(0x7f0000000040)=""/9) [ 868.318484][ T4658] device lo left promiscuous mode 23:38:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x1, 0x3, 0x4, 0x2, {}, {0x2, 0x1, 0x4, 0xc, 0x1, 0x6, "77ae9050"}, 0x2, 0x4, @offset=0xffff, 0x4}) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000000)=@default) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) [ 868.351504][ T4660] FAULT_INJECTION: forcing a failure. [ 868.351504][ T4660] name failslab, interval 1, probability 0, space 0, times 0 [ 868.396248][ T4660] CPU: 1 PID: 4660 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 868.405307][ T4660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.415364][ T4660] Call Trace: [ 868.418656][ T4660] dump_stack+0x172/0x1f0 [ 868.422992][ T4660] should_fail.cold+0xa/0x15 [ 868.427589][ T4660] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 868.433406][ T4660] ? ___might_sleep+0x163/0x280 [ 868.438268][ T4660] __should_failslab+0x121/0x190 [ 868.443219][ T4660] should_failslab+0x9/0x14 [ 868.447731][ T4660] kmem_cache_alloc_trace+0x2d1/0x760 [ 868.453113][ T4660] kobject_uevent_env+0x2fb/0x1030 [ 868.458238][ T4660] kobject_uevent+0x20/0x26 [ 868.462755][ T4660] lo_ioctl+0x100b/0x20d0 [ 868.467094][ T4660] ? lo_rw_aio+0x1530/0x1530 [ 868.471692][ T4660] blkdev_ioctl+0xee8/0x1c40 [ 868.476294][ T4660] ? blkpg_ioctl+0xa90/0xa90 [ 868.480886][ T4660] ? perf_trace_lock_acquire+0xf5/0x580 [ 868.486432][ T4660] ? __fget+0x35a/0x550 [ 868.490585][ T4660] ? find_held_lock+0x35/0x130 [ 868.495351][ T4660] ? __fget+0x35a/0x550 [ 868.499526][ T4660] block_ioctl+0xee/0x130 [ 868.503852][ T4660] ? blkdev_fallocate+0x410/0x410 [ 868.508878][ T4660] do_vfs_ioctl+0xd6e/0x1390 [ 868.513469][ T4660] ? kasan_check_read+0x11/0x20 [ 868.518328][ T4660] ? ioctl_preallocate+0x210/0x210 [ 868.523439][ T4660] ? __fget+0x381/0x550 [ 868.527604][ T4660] ? ksys_dup3+0x3e0/0x3e0 [ 868.532017][ T4660] ? do_sys_open+0x31d/0x5d0 [ 868.536624][ T4660] ? security_file_ioctl+0x93/0xc0 [ 868.541742][ T4660] ksys_ioctl+0xab/0xd0 [ 868.545900][ T4660] __x64_sys_ioctl+0x73/0xb0 [ 868.550493][ T4660] do_syscall_64+0x103/0x610 [ 868.555088][ T4660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.560978][ T4660] RIP: 0033:0x457c97 [ 868.564872][ T4660] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.584468][ T4660] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:38:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 868.592881][ T4660] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 868.600846][ T4660] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 868.608812][ T4660] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 868.616778][ T4660] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 868.624747][ T4660] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:38:02 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_tcp(0x2, 0x1, 0x0) tgkill(0x0, 0x0, 0x0) clock_getres(0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) unshare(0x400) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) fcntl$lock(r2, 0x7, &(0x7f00000001c0)) tkill(0x0, 0x1000000000016) dup3(r1, r2, 0x0) [ 868.703985][ T4660] EXT4-fs (sda1): Cannot specify journal on remount 23:38:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r0}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x20, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x4, 0x13}]}, 0x20}}, 0x0) r2 = dup(r0) r3 = fcntl$dupfd(r2, 0x0, r0) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0x81, 0x5, 0x2}, 0x0}, 0xa) 23:38:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 868.799211][ T4667] device lo entered promiscuous mode [ 868.812026][ T4658] device lo left promiscuous mode 23:38:03 executing program 3 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:03 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_tcp(0x2, 0x1, 0x0) tgkill(0x0, 0x0, 0x0) clock_getres(0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) unshare(0x400) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) fcntl$lock(r2, 0x7, &(0x7f00000001c0)) tkill(0x0, 0x1000000000016) dup3(r1, r2, 0x0) 23:38:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40044591, &(0x7f0000000040)=""/9) 23:38:03 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@z\x00', 0x101}) 23:38:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 869.200426][ T4667] device lo entered promiscuous mode 23:38:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}, 0x0}, 0xa) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)="de43873c945d18e28ffba42d09df98423c48d28e4ebd3246c3cdba34235406adc4897211a64e2ede6356c601c474e54126a5e187e935b1eacb066fc6a69d820730286d12adbcc7bc689b9eb78d4e8268a1c5c91a144f365130a032810c117308a4a3a25234342db2587bdcc2ed7ebd73b8abad490df9ef67895c295e6dcf0f3b3db221848d9f2281944010f008f2b9f4e4b41af4b7c069547c17c220129f35d1e19c2144bebe08ad46e8133736844bca570490c9645d8f4a1219a650e7eba7bf47e42fc9abe515ee36e867af5a13fd5d") ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x0, 0x9, 0x2, 0x0, 0x8000, 0xfffffffffffffff7, 0x0, 0x0, 0x4, 0x2, 0x5, 0x4, 0x0, 0x200, 0x9, 0x1, 0x9, 0x9, 0xfffffffffffffffc}) [ 869.270069][ T4710] FAULT_INJECTION: forcing a failure. [ 869.270069][ T4710] name failslab, interval 1, probability 0, space 0, times 0 [ 869.283696][ T4710] CPU: 0 PID: 4710 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 869.283744][ T4720] device lo left promiscuous mode [ 869.292724][ T4710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.292731][ T4710] Call Trace: [ 869.292751][ T4710] dump_stack+0x172/0x1f0 [ 869.292774][ T4710] should_fail.cold+0xa/0x15 [ 869.292794][ T4710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 869.292817][ T4710] ? ___might_sleep+0x163/0x280 [ 869.292839][ T4710] __should_failslab+0x121/0x190 [ 869.292859][ T4710] should_failslab+0x9/0x14 [ 869.292874][ T4710] __kmalloc+0x2dc/0x740 [ 869.292891][ T4710] ? kobject_uevent_env+0x2fb/0x1030 [ 869.292906][ T4710] ? rcu_read_lock_sched_held+0x110/0x130 [ 869.292919][ T4710] ? kobject_get_path+0xc4/0x1b0 [ 869.292937][ T4710] kobject_get_path+0xc4/0x1b0 [ 869.292955][ T4710] kobject_uevent_env+0x31f/0x1030 [ 869.292981][ T4710] kobject_uevent+0x20/0x26 [ 869.292996][ T4710] lo_ioctl+0x100b/0x20d0 [ 869.293023][ T4710] ? lo_rw_aio+0x1530/0x1530 [ 869.383579][ T4710] blkdev_ioctl+0xee8/0x1c40 [ 869.388165][ T4710] ? blkpg_ioctl+0xa90/0xa90 [ 869.392764][ T4710] ? perf_trace_lock_acquire+0xf5/0x580 [ 869.398310][ T4710] ? __fget+0x35a/0x550 [ 869.402472][ T4710] ? find_held_lock+0x35/0x130 [ 869.407234][ T4710] ? __fget+0x35a/0x550 [ 869.411398][ T4710] block_ioctl+0xee/0x130 [ 869.415727][ T4710] ? blkdev_fallocate+0x410/0x410 [ 869.420745][ T4710] do_vfs_ioctl+0xd6e/0x1390 [ 869.425329][ T4710] ? kasan_check_read+0x11/0x20 [ 869.430184][ T4710] ? ioctl_preallocate+0x210/0x210 [ 869.435306][ T4710] ? __fget+0x381/0x550 [ 869.439474][ T4710] ? ksys_dup3+0x3e0/0x3e0 [ 869.443888][ T4710] ? do_sys_open+0x31d/0x5d0 [ 869.448488][ T4710] ? security_file_ioctl+0x93/0xc0 [ 869.453607][ T4710] ksys_ioctl+0xab/0xd0 [ 869.457766][ T4710] __x64_sys_ioctl+0x73/0xb0 [ 869.462359][ T4710] do_syscall_64+0x103/0x610 [ 869.466953][ T4710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 869.472836][ T4710] RIP: 0033:0x457c97 [ 869.476724][ T4710] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 869.496323][ T4710] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 869.504730][ T4710] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 869.512700][ T4710] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 869.520669][ T4710] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 869.528635][ T4710] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 869.536605][ T4710] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 869.566399][ T4710] EXT4-fs (sda1): Cannot specify journal on remount 23:38:03 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_tcp(0x2, 0x1, 0x0) tgkill(0x0, 0x0, 0x0) clock_getres(0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) unshare(0x400) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) fcntl$lock(r2, 0x7, &(0x7f00000001c0)) tkill(0x0, 0x1000000000016) dup3(r1, r2, 0x0) 23:38:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x400445a0, &(0x7f0000000040)=""/9) 23:38:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4$packet(r0, 0x0, &(0x7f0000000000)=0x3c3, 0x800) r1 = dup(r0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x1) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x1, 0x2f, 0x4, 0xe4d, 0x0, 0x8}, 0x7adb02c8}, 0xa) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xfffffffffffffeff, 0x6, 0x56f, 0x0, 0x1000}, 0x0}, 0xa) accept$alg(r1, 0x0, 0x0) 23:38:03 executing program 3 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 869.816291][ T4724] device lo entered promiscuous mode 23:38:03 executing program 1: syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0xfffffffffffffee8) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x200000000) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x800, 0x880) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000100), 0x4) connect$caif(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) listen(0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f2, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000240)={0x79}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c3908530e4f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2def6721639176fad9512ee9b4c5de1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093faee04114663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c466"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f0000000380)="0f0766b818008ed80f20e035000040000f22e00faea66647000066ba2000b801000000efc4c13565d4b805000000b9f4ce05c80f01d9670f01750c66b8e3000f00d8c4c2e99626", 0x47}], 0x1, 0x0, 0x0, 0x0) r5 = getgid() r6 = getegid() setregid(r5, r6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 869.866638][ T4720] device lo left promiscuous mode [ 869.908192][ T4747] FAULT_INJECTION: forcing a failure. [ 869.908192][ T4747] name failslab, interval 1, probability 0, space 0, times 0 23:38:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/213, 0xd5}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/246, 0xf6}, {&(0x7f00000001c0)=""/52, 0x34}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f00000013c0)=""/142, 0x8e}, {&(0x7f0000001480)=""/78, 0x4e}, {&(0x7f0000001500)=""/182, 0xb6}], 0xa) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000280)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0xfffffffffffffffe, @dev={[], 0x21}, 'ip_vti0\x00'}}) [ 870.002752][ T4747] CPU: 1 PID: 4747 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 870.011814][ T4747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.021864][ T4747] Call Trace: [ 870.025173][ T4747] dump_stack+0x172/0x1f0 [ 870.029521][ T4747] should_fail.cold+0xa/0x15 [ 870.034115][ T4747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.039933][ T4747] ? ___might_sleep+0x163/0x280 [ 870.044790][ T4747] __should_failslab+0x121/0x190 [ 870.049731][ T4747] should_failslab+0x9/0x14 [ 870.054238][ T4747] kmem_cache_alloc_node+0x265/0x710 [ 870.059521][ T4747] ? find_held_lock+0x35/0x130 [ 870.064291][ T4747] __alloc_skb+0xd5/0x5e0 [ 870.068616][ T4747] ? skb_trim+0x190/0x190 [ 870.072950][ T4747] ? kasan_check_read+0x11/0x20 [ 870.077804][ T4747] alloc_uevent_skb+0x83/0x1e2 [ 870.082574][ T4747] kobject_uevent_env+0xa63/0x1030 [ 870.087696][ T4747] kobject_uevent+0x20/0x26 [ 870.092195][ T4747] lo_ioctl+0x100b/0x20d0 [ 870.096532][ T4747] ? lo_rw_aio+0x1530/0x1530 [ 870.101120][ T4747] blkdev_ioctl+0xee8/0x1c40 [ 870.105717][ T4747] ? blkpg_ioctl+0xa90/0xa90 [ 870.110308][ T4747] ? perf_trace_lock_acquire+0xf5/0x580 [ 870.115853][ T4747] ? __fget+0x35a/0x550 [ 870.120002][ T4747] ? find_held_lock+0x35/0x130 [ 870.124850][ T4747] ? __fget+0x35a/0x550 [ 870.129006][ T4747] block_ioctl+0xee/0x130 [ 870.133330][ T4747] ? blkdev_fallocate+0x410/0x410 [ 870.138349][ T4747] do_vfs_ioctl+0xd6e/0x1390 [ 870.142964][ T4747] ? kasan_check_read+0x11/0x20 [ 870.147810][ T4747] ? ioctl_preallocate+0x210/0x210 [ 870.152922][ T4747] ? __fget+0x381/0x550 [ 870.157078][ T4747] ? ksys_dup3+0x3e0/0x3e0 [ 870.161488][ T4747] ? do_sys_open+0x31d/0x5d0 [ 870.166085][ T4747] ? security_file_ioctl+0x93/0xc0 [ 870.171195][ T4747] ksys_ioctl+0xab/0xd0 [ 870.175353][ T4747] __x64_sys_ioctl+0x73/0xb0 [ 870.179962][ T4747] do_syscall_64+0x103/0x610 [ 870.184553][ T4747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.190437][ T4747] RIP: 0033:0x457c97 [ 870.194329][ T4747] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.213923][ T4747] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 870.222328][ T4747] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 870.230297][ T4747] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 870.238265][ T4747] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 23:38:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40049409, &(0x7f0000000040)=""/9) 23:38:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 870.246231][ T4747] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 870.254198][ T4747] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 870.271072][ T4747] EXT4-fs (sda1): Cannot specify journal on remount 23:38:04 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\xfc\x00', 0x101}) 23:38:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x15, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 23:38:04 executing program 3 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 870.433651][ T4767] device lo entered promiscuous mode [ 870.467904][ T4767] device lo left promiscuous mode 23:38:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40084503, &(0x7f0000000040)=""/9) 23:38:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x4) [ 870.581628][ T4778] FAULT_INJECTION: forcing a failure. [ 870.581628][ T4778] name failslab, interval 1, probability 0, space 0, times 0 [ 870.615384][ T4778] CPU: 0 PID: 4778 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 870.624427][ T4778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.634478][ T4778] Call Trace: [ 870.637774][ T4778] dump_stack+0x172/0x1f0 [ 870.642123][ T4778] should_fail.cold+0xa/0x15 [ 870.646726][ T4778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.652562][ T4778] ? ___might_sleep+0x163/0x280 [ 870.657424][ T4778] __should_failslab+0x121/0x190 [ 870.662379][ T4778] should_failslab+0x9/0x14 [ 870.666885][ T4778] kmem_cache_alloc_node+0x265/0x710 [ 870.672184][ T4778] ? find_held_lock+0x35/0x130 [ 870.676953][ T4778] __alloc_skb+0xd5/0x5e0 [ 870.681289][ T4778] ? skb_trim+0x190/0x190 [ 870.685623][ T4778] ? kasan_check_read+0x11/0x20 [ 870.690483][ T4778] alloc_uevent_skb+0x83/0x1e2 [ 870.695253][ T4778] kobject_uevent_env+0xa63/0x1030 [ 870.700381][ T4778] kobject_uevent+0x20/0x26 [ 870.704890][ T4778] lo_ioctl+0x100b/0x20d0 [ 870.709242][ T4778] ? lo_rw_aio+0x1530/0x1530 [ 870.713839][ T4778] blkdev_ioctl+0xee8/0x1c40 [ 870.718441][ T4778] ? blkpg_ioctl+0xa90/0xa90 [ 870.723035][ T4778] ? perf_trace_lock_acquire+0xf5/0x580 [ 870.728591][ T4778] ? __fget+0x35a/0x550 [ 870.732748][ T4778] ? find_held_lock+0x35/0x130 [ 870.737559][ T4778] ? __fget+0x35a/0x550 [ 870.741719][ T4778] block_ioctl+0xee/0x130 [ 870.741734][ T4778] ? blkdev_fallocate+0x410/0x410 [ 870.741751][ T4778] do_vfs_ioctl+0xd6e/0x1390 [ 870.741773][ T4778] ? kasan_check_read+0x11/0x20 [ 870.760500][ T4778] ? ioctl_preallocate+0x210/0x210 [ 870.765610][ T4778] ? __fget+0x381/0x550 [ 870.769769][ T4778] ? ksys_dup3+0x3e0/0x3e0 [ 870.774188][ T4778] ? do_sys_open+0x31d/0x5d0 [ 870.778789][ T4778] ? security_file_ioctl+0x93/0xc0 [ 870.783902][ T4778] ksys_ioctl+0xab/0xd0 [ 870.788061][ T4778] __x64_sys_ioctl+0x73/0xb0 [ 870.792660][ T4778] do_syscall_64+0x103/0x610 [ 870.797257][ T4778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.803148][ T4778] RIP: 0033:0x457c97 [ 870.807037][ T4778] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.826634][ T4778] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 870.835039][ T4778] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 870.843013][ T4778] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 870.850978][ T4778] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 870.858940][ T4778] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 870.866911][ T4778] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 870.912063][ T4778] EXT4-fs (sda1): Cannot specify journal on remount 23:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000000c0)=0xe8) bind$xdp(r1, &(0x7f0000000280)={0x2c, 0x7, r2, 0x39, r1}, 0x10) r3 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) fcntl$setlease(r3, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet6_int(r3, 0x29, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) 23:38:05 executing program 3 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:05 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000002800)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10002) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) [ 871.052733][ C0] net_ratelimit: 10 callbacks suppressed [ 871.052740][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 871.052770][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 871.058434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 871.058534][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 871.064257][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.069910][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 871.075633][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:38:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 871.184985][ T4772] device lo entered promiscuous mode [ 871.197035][ T4802] FAULT_INJECTION: forcing a failure. [ 871.197035][ T4802] name failslab, interval 1, probability 0, space 0, times 0 [ 871.215673][ T4802] CPU: 1 PID: 4802 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 871.224717][ T4802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:38:05 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\xfd\x00', 0x101}) 23:38:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@deltclass={0x4bc, 0x29, 0x100, 0x70bd26, 0x25dfdbfc, {0x0, r2, {0x7, 0xffff}, {0xfff7, 0xffed}, {0x1}}, [@tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x1c, 0x2, [@TCA_ATM_FD={0x8, 0x1, r0}, @TCA_ATM_HDR={0x8, 0x3, "44916289"}, @TCA_ATM_FD={0x8, 0x1, r0}]}}, @TCA_RATE={0x8, 0x5, {0x7f, 0xffffffffffffffff}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x438, 0x2, [@TCA_HTB_RATE64={0xc, 0x6, 0x8000}, @TCA_HTB_CEIL64={0xc, 0x7, 0x2}, @TCA_HTB_RTAB={0x404, 0x4, [0x0, 0x7, 0x400, 0x7, 0xfffffffffffff800, 0x8000, 0x2, 0x8, 0x260, 0x7, 0x141, 0xf04d, 0x75, 0x6, 0x8, 0x9, 0x60, 0x10000000000000, 0x3, 0x100000001, 0x8, 0x1, 0x7, 0xfffffffffffffff7, 0x101, 0x1, 0x7, 0x7, 0x1, 0xffffffffffffffd1, 0x5, 0x8, 0x375ff7, 0x4, 0x0, 0x2, 0x58, 0x800, 0x6, 0x8, 0x100000000, 0xb0, 0x5, 0x1, 0xfffffffffffffffd, 0x7fffffff, 0x2, 0x0, 0x1, 0x9, 0x0, 0x8001, 0x7, 0x7f, 0x0, 0x4, 0x6, 0x3f, 0x2f8, 0x5, 0x6, 0xfffffffffffffffc, 0xba4, 0x4, 0x4, 0x6b6, 0x0, 0x7, 0xfffffffeffffffff, 0xfceb, 0xfffffffffffffffe, 0x1, 0xdaac, 0xfffffffffffffffb, 0x2, 0xeb, 0x9, 0x8, 0xfffffffffffffff9, 0x9, 0x338, 0x3800000000000, 0x8, 0x7, 0x1dc, 0x2, 0x6, 0x81, 0x5, 0x2, 0x5, 0xbff, 0x0, 0x0, 0x24a0, 0xcff8, 0x10000, 0x90a, 0x4, 0x5, 0x80000000, 0x7, 0x7fff, 0x20, 0x6, 0x3, 0x8, 0x7, 0x3ff, 0x49d, 0x80, 0xd80e, 0x8, 0x1, 0x0, 0xe6, 0x4, 0x3, 0x4000000000000000, 0x9, 0x6452, 0x200, 0x2, 0x3, 0x4, 0x100000001, 0xc1, 0x36c54f1b, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x6, 0x7fff, 0x8, 0xd298, 0x4, 0x10000, 0x7, 0xfff, 0x10000, 0x4b, 0xfffffffffffffffb, 0xd29e, 0xecc, 0x8e9f, 0x7f, 0x1000, 0x3ff, 0x81, 0x4, 0xd7, 0x40000, 0x8, 0x6, 0x3, 0x4, 0x9d5, 0x5, 0x100, 0x1, 0x4, 0x8, 0x4, 0x5, 0x458c78b2, 0x6, 0x8, 0x5, 0x7f, 0x0, 0x7, 0x7, 0x6, 0x3, 0x200, 0x6, 0x7, 0x1, 0x10000, 0x7, 0x10000, 0x8, 0x100000001, 0x81, 0x410d, 0x40, 0xfffffffffffff7b0, 0x2, 0x7c9, 0x3, 0xb64, 0x3, 0x0, 0x164, 0x0, 0x1f, 0x8, 0x6, 0x7, 0xc8a, 0xa1, 0x6, 0x1, 0x0, 0xc638, 0x90000000000, 0xffffffffffff01a0, 0x8001, 0x8, 0x7, 0x4, 0x7, 0x0, 0x100000000, 0x7fff, 0xff, 0x401, 0x5, 0x5, 0xffffffffffffffff, 0x100000001, 0x1, 0x0, 0xffff, 0x3, 0xfff, 0xfffffffffffffbff, 0x2, 0xd91, 0x1, 0x401, 0x1, 0x7, 0x6, 0x3, 0x6, 0xffffffffffff0001, 0x100000000, 0x100000000, 0x2, 0xc342, 0x0, 0x871, 0x2896, 0x3, 0x3, 0x9, 0xcf8, 0x2, 0x100, 0x5, 0x3, 0xffffffff, 0x0, 0x10001]}, @TCA_HTB_CEIL64={0xc, 0x7, 0x3}, @TCA_HTB_RATE64={0xc, 0x6, 0x250}]}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x1c, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x12, 0x3, 0x8, 0x9, 0x8000000, 0x81dd, 0x64e, 0x6}}]}}, @TCA_RATE={0x8, 0x5, {0x0, 0x3}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x880}, 0x40080) capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) [ 871.234769][ T4802] Call Trace: [ 871.238083][ T4802] dump_stack+0x172/0x1f0 [ 871.242425][ T4802] should_fail.cold+0xa/0x15 [ 871.247027][ T4802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 871.252856][ T4802] ? ___might_sleep+0x163/0x280 [ 871.257713][ T4802] __should_failslab+0x121/0x190 [ 871.262658][ T4802] should_failslab+0x9/0x14 [ 871.267170][ T4802] kmem_cache_alloc+0x2be/0x710 [ 871.272017][ T4802] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 871.277830][ T4802] ? lock_downgrade+0x880/0x880 [ 871.282688][ T4802] skb_clone+0x150/0x3b0 [ 871.286940][ T4802] netlink_broadcast_filtered+0x870/0xb20 [ 871.292670][ T4802] netlink_broadcast+0x3a/0x50 [ 871.297431][ T4802] kobject_uevent_env+0xa94/0x1030 [ 871.302541][ T4802] kobject_uevent+0x20/0x26 [ 871.307027][ T4802] lo_ioctl+0x100b/0x20d0 [ 871.311345][ T4802] ? lo_rw_aio+0x1530/0x1530 [ 871.315916][ T4802] blkdev_ioctl+0xee8/0x1c40 [ 871.320487][ T4802] ? blkpg_ioctl+0xa90/0xa90 [ 871.325082][ T4802] ? perf_trace_lock_acquire+0xf5/0x580 [ 871.330632][ T4802] ? __fget+0x35a/0x550 [ 871.334777][ T4802] ? find_held_lock+0x35/0x130 [ 871.339544][ T4802] ? __fget+0x35a/0x550 [ 871.343693][ T4802] block_ioctl+0xee/0x130 [ 871.348002][ T4802] ? blkdev_fallocate+0x410/0x410 [ 871.353011][ T4802] do_vfs_ioctl+0xd6e/0x1390 [ 871.357601][ T4802] ? kasan_check_read+0x11/0x20 [ 871.362437][ T4802] ? ioctl_preallocate+0x210/0x210 [ 871.367525][ T4802] ? __fget+0x381/0x550 [ 871.371663][ T4802] ? ksys_dup3+0x3e0/0x3e0 [ 871.376078][ T4802] ? do_sys_open+0x31d/0x5d0 [ 871.380671][ T4802] ? security_file_ioctl+0x93/0xc0 [ 871.385782][ T4802] ksys_ioctl+0xab/0xd0 [ 871.389930][ T4802] __x64_sys_ioctl+0x73/0xb0 [ 871.394508][ T4802] do_syscall_64+0x103/0x610 [ 871.399089][ T4802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.404968][ T4802] RIP: 0033:0x457c97 [ 871.408854][ T4802] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.428440][ T4802] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 871.436827][ T4802] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 871.444776][ T4802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 871.452746][ T4802] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 871.460708][ T4802] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 871.468658][ T4802] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 871.478204][ T4810] device lo left promiscuous mode [ 871.488549][ T4802] EXT4-fs (sda1): Cannot specify journal on remount 23:38:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40084504, &(0x7f0000000040)=""/9) 23:38:05 executing program 3 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:05 executing program 1: pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x1, &(0x7f0000000340)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000005c0)={r2, 0x8, &(0x7f00000004c0)=[0x8000, 0x4, 0x7, 0x1ff, 0x5, 0x6, 0x3, 0x0], &(0x7f0000000500)=[0x89, 0x3, 0x9, 0x8, 0x6, 0x2, 0xa9, 0x474800000000000, 0x4, 0x0], 0x71241575d8c36957, 0x8, 0x8, &(0x7f0000000540)=[0x5, 0xac, 0x968, 0x9, 0x401, 0xff, 0x9, 0x1], &(0x7f0000000580)=[0x8000, 0x2, 0x1c, 0x5, 0x1, 0x8, 0x2, 0x5, 0x5]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x0, 0x20000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) ioctl$TUNSETGROUP(r3, 0x400454ce, 0x0) mkdir(0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000200)="2400000021002551075c0165ff0ffc020a00000000100f0007e1000c0800060000000000bc0000008f3943793a5ea67658cb22d900000000d808c96ecc2ecec777433b00003ad4b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70766", 0xe0) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x14) openat$cgroup_int(r4, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f00000003c0), 0x38b) stat(&(0x7f0000004980)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14, 0x800) preadv(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x4e20, 0x7f, @dev={0xfe, 0x80, [], 0x28}, 0x8001}}, 0x0, 0x6, 0x0, "e0070a31f51354c58a710a8a65e11883dd0756823c08799b1987793566069531bf30ad54c8861cbfffa05ed7e73eb543b0747e82f8bb57c3f6f1f35d8b27225f24a56c6f7e28e30afa2c3e154ed8afb2"}, 0xd8) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r7, 0x7003, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(r3, 0x8954, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r7, 0x800455d1, &(0x7f0000000100)) close(r7) [ 871.679147][ T4819] FAULT_INJECTION: forcing a failure. [ 871.679147][ T4819] name failslab, interval 1, probability 0, space 0, times 0 [ 871.706415][ T4819] CPU: 1 PID: 4819 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 871.715456][ T4819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.725505][ T4819] Call Trace: [ 871.728803][ T4819] dump_stack+0x172/0x1f0 [ 871.733140][ T4819] should_fail.cold+0xa/0x15 [ 871.737739][ T4819] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 871.743562][ T4819] ? ___might_sleep+0x163/0x280 [ 871.748421][ T4819] __should_failslab+0x121/0x190 [ 871.753363][ T4819] should_failslab+0x9/0x14 [ 871.757865][ T4819] kmem_cache_alloc+0x2be/0x710 [ 871.762720][ T4819] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 871.768528][ T4819] ? lock_downgrade+0x880/0x880 [ 871.773385][ T4819] skb_clone+0x150/0x3b0 [ 871.777652][ T4819] netlink_broadcast_filtered+0x870/0xb20 [ 871.783382][ T4819] netlink_broadcast+0x3a/0x50 [ 871.788150][ T4819] kobject_uevent_env+0xa94/0x1030 [ 871.793270][ T4819] kobject_uevent+0x20/0x26 [ 871.797779][ T4819] lo_ioctl+0x100b/0x20d0 [ 871.802118][ T4819] ? lo_rw_aio+0x1530/0x1530 [ 871.806708][ T4819] blkdev_ioctl+0xee8/0x1c40 [ 871.811300][ T4819] ? blkpg_ioctl+0xa90/0xa90 [ 871.815895][ T4819] ? perf_trace_lock_acquire+0xf5/0x580 [ 871.821442][ T4819] ? __fget+0x35a/0x550 [ 871.825601][ T4819] ? find_held_lock+0x35/0x130 [ 871.830365][ T4819] ? __fget+0x35a/0x550 [ 871.834531][ T4819] block_ioctl+0xee/0x130 [ 871.838858][ T4819] ? blkdev_fallocate+0x410/0x410 [ 871.844105][ T4819] do_vfs_ioctl+0xd6e/0x1390 [ 871.848730][ T4819] ? kasan_check_read+0x11/0x20 [ 871.853590][ T4819] ? ioctl_preallocate+0x210/0x210 [ 871.858698][ T4819] ? __fget+0x381/0x550 [ 871.862875][ T4819] ? ksys_dup3+0x3e0/0x3e0 [ 871.867287][ T4819] ? do_sys_open+0x31d/0x5d0 [ 871.871889][ T4819] ? security_file_ioctl+0x93/0xc0 [ 871.877012][ T4819] ksys_ioctl+0xab/0xd0 [ 871.881177][ T4819] __x64_sys_ioctl+0x73/0xb0 [ 871.885773][ T4819] do_syscall_64+0x103/0x610 [ 871.890367][ T4819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.896258][ T4819] RIP: 0033:0x457c97 [ 871.900150][ T4819] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.919756][ T4819] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 871.928164][ T4819] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 871.936218][ T4819] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 871.944181][ T4819] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 871.952146][ T4819] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 871.960221][ T4819] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 23:38:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 872.044046][ T4819] EXT4-fs (sda1): Cannot specify journal on remount [ 872.064545][ T4811] device lo entered promiscuous mode 23:38:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 872.102011][ T4810] device lo left promiscuous mode 23:38:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050000000000000005006d20002b1f00c05d080a4a51f10101c7033400b0", 0x26) connect$netlink(r0, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) open(&(0x7f0000000000)='./file0\x00', 0x2080, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) recvmsg(r0, &(0x7f00005b5000)={0x0, 0x0, 0x0}, 0x0) 23:38:06 executing program 3 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 872.172723][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.178555][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40104593, &(0x7f0000000040)=""/9) [ 872.273049][ T4841] FAULT_INJECTION: forcing a failure. [ 872.273049][ T4841] name failslab, interval 1, probability 0, space 0, times 0 [ 872.293465][ T4841] CPU: 0 PID: 4841 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 872.302504][ T4841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.312557][ T4841] Call Trace: [ 872.315853][ T4841] dump_stack+0x172/0x1f0 [ 872.320192][ T4841] should_fail.cold+0xa/0x15 [ 872.324799][ T4841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.330615][ T4841] ? ___might_sleep+0x163/0x280 [ 872.335472][ T4841] __should_failslab+0x121/0x190 [ 872.340418][ T4841] should_failslab+0x9/0x14 [ 872.344927][ T4841] kmem_cache_alloc+0x2be/0x710 [ 872.349781][ T4841] ? __fget+0x381/0x550 [ 872.353946][ T4841] getname_flags+0xd6/0x5b0 [ 872.358462][ T4841] do_mkdirat+0xa0/0x2a0 [ 872.362706][ T4841] ? __ia32_sys_mknod+0xb0/0xb0 [ 872.367556][ T4841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 872.373018][ T4841] ? do_syscall_64+0x26/0x610 [ 872.377693][ T4841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.383760][ T4841] ? do_syscall_64+0x26/0x610 [ 872.388441][ T4841] ? lockdep_hardirqs_on+0x418/0x5d0 [ 872.393735][ T4841] __x64_sys_mkdir+0x5c/0x80 [ 872.398327][ T4841] do_syscall_64+0x103/0x610 [ 872.402920][ T4841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.408815][ T4841] RIP: 0033:0x457247 [ 872.412709][ T4841] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.432306][ T4841] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 872.440715][ T4841] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 872.448683][ T4841] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 872.456656][ T4841] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 872.464630][ T4841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 872.472601][ T4841] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 872.489318][ T4841] EXT4-fs (sda1): Cannot specify journal on remount 23:38:06 executing program 3 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 872.684208][ T4850] FAULT_INJECTION: forcing a failure. [ 872.684208][ T4850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 872.697434][ T4850] CPU: 1 PID: 4850 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 872.706447][ T4850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.716492][ T4850] Call Trace: [ 872.719780][ T4850] dump_stack+0x172/0x1f0 [ 872.724115][ T4850] should_fail.cold+0xa/0x15 [ 872.728703][ T4850] ? lo_ioctl+0x188/0x20d0 [ 872.733120][ T4850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.738942][ T4850] should_fail_alloc_page+0x50/0x60 [ 872.744135][ T4850] __alloc_pages_nodemask+0x1a1/0x7e0 [ 872.749508][ T4850] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 872.755227][ T4850] ? find_held_lock+0x35/0x130 [ 872.760009][ T4850] ? __fget+0x35a/0x550 [ 872.764164][ T4850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.769966][ T4850] cache_grow_begin+0x9c/0x850 [ 872.774727][ T4850] ? getname_flags+0xd6/0x5b0 23:38:06 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x03\x00', 0x101}) [ 872.779399][ T4850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.785648][ T4850] kmem_cache_alloc+0x645/0x710 [ 872.790515][ T4850] ? __fget+0x381/0x550 [ 872.794688][ T4850] getname_flags+0xd6/0x5b0 [ 872.799195][ T4850] do_mkdirat+0xa0/0x2a0 [ 872.803443][ T4850] ? __ia32_sys_mknod+0xb0/0xb0 [ 872.808290][ T4850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 872.813744][ T4850] ? do_syscall_64+0x26/0x610 [ 872.818511][ T4850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.824567][ T4850] ? do_syscall_64+0x26/0x610 [ 872.829238][ T4850] ? lockdep_hardirqs_on+0x418/0x5d0 [ 872.834521][ T4850] __x64_sys_mkdir+0x5c/0x80 [ 872.839103][ T4850] do_syscall_64+0x103/0x610 [ 872.843693][ T4850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.849575][ T4850] RIP: 0033:0x457247 [ 872.853464][ T4850] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.867325][ T4854] device lo entered promiscuous mode [ 872.873053][ T4850] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 872.873068][ T4850] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 872.873077][ T4850] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 872.873085][ T4850] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 872.873093][ T4850] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 872.873101][ T4850] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 872.894501][ T4850] EXT4-fs (sda1): Cannot specify journal on remount 23:38:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1c000) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7d, r1}) syz_mount_image$erofs(&(0x7f00000003c0)='erofs\x00', &(0x7f0000000400)='./file0\x00', 0x76f, 0x0, 0x0, 0x0, 0x0) 23:38:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 872.935596][ T4854] device lo left promiscuous mode 23:38:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xd07f, 0x103001) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001600)=0x0) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001780)={0x0}, &(0x7f00000017c0)=0xc) r8 = getuid() stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000018c0)={0x0}, &(0x7f0000001900)=0xc) r11 = getuid() getresgid(&(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001a00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in=@initdev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001b40)=0xe8) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0)=0x0, &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001d80)=0xe8) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000001fc0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001580)=[{&(0x7f0000000140)="9b4a5b5cb686822e8ac9f9c1e1fc20415b06ebc92a849ea8602306987da6ba0341a850e7c8544ea03f71f93d0bb74ee8039c08562f20635ab7102d5a6e43ed26d26f00a90ee57f7679f6a6c1c6dd77428ae2cac10815267408fa", 0x5a}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f00000001c0)="9c060917421b7958205d953a5bdd5236694462862ce5ccf2896fab583aa7be501c985c97dbcf651d2c50c41710ca6652aca83f", 0x33}, {&(0x7f0000000200)="1c2908edf38ff803a30d163d2ae47e4b332c03996d40a7dd51ffa4b77a5e00e452ca5ce4de639c4b23a689d440ce7bccc0d037c0dfcc816d965766fd11a53097fe66a608bbc35e135b664844247b0286453472d07809ee415fc9408d3f979e8d42f51b4e5dda546105297f7d7f6612d79c5307cc7c5d80ed1b7260ffa10b8239819257929771a8f5eb233b03de47ef617e13", 0x92}, {&(0x7f00000002c0)="98c36ed5c847774dc92122c02d1f449546ef873b074de8353961d6c797649f4b2c0143cf8925e3dbf888f87da8c132893240ff70a62dc2f1cec4a029a860709c3b1bf22803afd8797f9c9799386595c5a91ecef40977922c195ce1c96f2341c629ae7e9a1d7f989e242981cf7e1dddda8e6fd87dd586c86aebde4c6270c3e7e1a40bed3050260c83083ffbbaa9deab40eb251d394c19a7a6f75a648d9c480a390db9d291bc11925e4b8947d0962c56feee66d9ef62a409f3e086487168c5cb909e3f65", 0xc3}, {&(0x7f0000001400)="bb05c546de15be3119dbab951189c3bfac1aeba1881c569faa6be21a62be9dd6b49cdf9923d58cc8c4f7caf9f08765988f10a57268b9ec46c024aed767ff9eb19fa14d491cafc4f540b754910c9b26dfc887d75cfae4ec921e676ef43f010a6f15f9f7dc285c4c0f707d60ab3a6437108feeebe2b9f207c9b65ce32cdcada3ca8e1104c593067a9e7be1bc051b96029fcee56bfbaf3c62db26c76ed563845959ff67295507836b4e4a6623487e3f3616ef74cd0a52ec906d42568759a6d6ef2eaccea5de2c7721edf78328bfad21cc573024c624b853da0773e59bc87754a3", 0xdf}, {&(0x7f0000001500)}, {&(0x7f0000001540)="56160bf46273b57822ae556d2a3a1aef65fce6f16e0fb8cc2c9b0be3a69673a3717955b85b88a1", 0x27}], 0x8, &(0x7f0000001e80)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000002000200", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x1}, 0x0) r19 = dup2(r2, r1) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) ioctl$TCSETAW(r19, 0x5407, &(0x7f0000000000)={0x0, 0xe1a4, 0x55, 0x401, 0x2, 0x0, 0xfffffffffffffff9}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r19, &(0x7f0000000100)={0x11, 0x10, 0x0, 0x1, 0x0, 0x6, @random="56b4a5f58b00"}, 0x14) [ 873.022030][ T4857] erofs: read_super, device -> /dev/loop1 [ 873.039926][ T4857] erofs: options -> 23:38:07 executing program 3 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 873.069377][ T4857] erofs: cannot read erofs superblock 23:38:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x4020940d, &(0x7f0000000040)=""/9) [ 873.132746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 873.184623][ T4867] FAULT_INJECTION: forcing a failure. [ 873.184623][ T4867] name failslab, interval 1, probability 0, space 0, times 0 [ 873.197725][ T4867] CPU: 1 PID: 4867 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 873.206745][ T4867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.216792][ T4867] Call Trace: [ 873.220086][ T4867] dump_stack+0x172/0x1f0 [ 873.224422][ T4867] should_fail.cold+0xa/0x15 [ 873.229012][ T4867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 873.234817][ T4867] ? __sigqueue_alloc+0x173/0x4d0 [ 873.239841][ T4867] ? find_held_lock+0x35/0x130 [ 873.244615][ T4867] __should_failslab+0x121/0x190 [ 873.249578][ T4867] should_failslab+0x9/0x14 [ 873.254085][ T4867] kmem_cache_alloc+0x47/0x710 [ 873.258858][ T4867] ? kasan_check_read+0x11/0x20 [ 873.263719][ T4867] __sigqueue_alloc+0x268/0x4d0 [ 873.268572][ T4867] __send_signal+0xda3/0x1590 [ 873.273254][ T4867] send_signal+0x49/0xd0 [ 873.277499][ T4867] force_sig_info+0x251/0x310 23:38:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) socketpair(0x10, 0x80800, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000080)=""/186, 0xba) 23:38:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 873.282187][ T4867] force_sig_fault+0xbb/0xf0 [ 873.286775][ T4867] ? force_sigsegv+0x120/0x120 [ 873.291550][ T4867] ? trace_hardirqs_on+0x67/0x230 [ 873.296580][ T4867] __bad_area_nosemaphore+0x332/0x420 [ 873.301953][ T4867] bad_area+0x69/0x80 [ 873.305942][ T4867] __do_page_fault+0x996/0xda0 [ 873.310715][ T4867] do_page_fault+0x71/0x581 [ 873.315219][ T4867] ? page_fault+0x8/0x30 [ 873.319464][ T4867] page_fault+0x1e/0x30 [ 873.323614][ T4867] RIP: 0033:0x451adf [ 873.327512][ T4867] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 873.347111][ T4867] RSP: 002b:00007f697238aa88 EFLAGS: 00010283 [ 873.353173][ T4867] RAX: 00007f697238aad0 RBX: 0000000000000010 RCX: 0000000000000000 [ 873.361146][ T4867] RDX: 000000000000001f RSI: 0000000000000000 RDI: 00007f697238aad0 [ 873.369120][ T4867] RBP: 0000000000000000 R08: 000000000000001f R09: 000000000000000a [ 873.377086][ T4867] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 873.385053][ T4867] R13: 0000000000000000 R14: 00000000004dbb60 R15: 0000000000000003 [ 873.468370][ T4867] EXT4-fs (sda1): Cannot specify journal on remount 23:38:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x14, 0x7c, &(0x7f0000000180)="4826627220458c419d0fcaf3061d3d075f9356eeae2f5ffb3dce433c5e057cb4a014943cb1821d7dfac58c92261be0df7ffe1a5b6ea7153ef2c26b1582fc40f45ac9d01d5e72493b9c4d09b71be58969afb9783592ef03fe7adade91d3b36a35556859ddcf6cc2713c7d3e469cb4f2aa49e18526d1d3de2ec41e2c1d"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) 23:38:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:07 executing program 3 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:07 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x05\x00', 0x101}) 23:38:07 executing program 1: r0 = eventfd(0xfffffffffffffff9) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/84, 0x54}], 0x1) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x0, 0x1, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xffffffffffffff9f}) [ 873.639286][ T4855] device lo entered promiscuous mode [ 873.740422][ T4897] FAULT_INJECTION: forcing a failure. [ 873.740422][ T4897] name failslab, interval 1, probability 0, space 0, times 0 [ 873.758928][ T4899] device lo left promiscuous mode [ 873.759735][ T4897] CPU: 1 PID: 4897 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 873.772979][ T4897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.783129][ T4897] Call Trace: [ 873.786423][ T4897] dump_stack+0x172/0x1f0 23:38:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xd07f, 0x103001) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001600)=0x0) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001780)={0x0}, &(0x7f00000017c0)=0xc) r8 = getuid() stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000018c0)={0x0}, &(0x7f0000001900)=0xc) r11 = getuid() getresgid(&(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001a00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in=@initdev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001b40)=0xe8) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0)=0x0, &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001d80)=0xe8) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000001fc0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001580)=[{&(0x7f0000000140)="9b4a5b5cb686822e8ac9f9c1e1fc20415b06ebc92a849ea8602306987da6ba0341a850e7c8544ea03f71f93d0bb74ee8039c08562f20635ab7102d5a6e43ed26d26f00a90ee57f7679f6a6c1c6dd77428ae2cac10815267408fa", 0x5a}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f00000001c0)="9c060917421b7958205d953a5bdd5236694462862ce5ccf2896fab583aa7be501c985c97dbcf651d2c50c41710ca6652aca83f", 0x33}, {&(0x7f0000000200)="1c2908edf38ff803a30d163d2ae47e4b332c03996d40a7dd51ffa4b77a5e00e452ca5ce4de639c4b23a689d440ce7bccc0d037c0dfcc816d965766fd11a53097fe66a608bbc35e135b664844247b0286453472d07809ee415fc9408d3f979e8d42f51b4e5dda546105297f7d7f6612d79c5307cc7c5d80ed1b7260ffa10b8239819257929771a8f5eb233b03de47ef617e13", 0x92}, {&(0x7f00000002c0)="98c36ed5c847774dc92122c02d1f449546ef873b074de8353961d6c797649f4b2c0143cf8925e3dbf888f87da8c132893240ff70a62dc2f1cec4a029a860709c3b1bf22803afd8797f9c9799386595c5a91ecef40977922c195ce1c96f2341c629ae7e9a1d7f989e242981cf7e1dddda8e6fd87dd586c86aebde4c6270c3e7e1a40bed3050260c83083ffbbaa9deab40eb251d394c19a7a6f75a648d9c480a390db9d291bc11925e4b8947d0962c56feee66d9ef62a409f3e086487168c5cb909e3f65", 0xc3}, {&(0x7f0000001400)="bb05c546de15be3119dbab951189c3bfac1aeba1881c569faa6be21a62be9dd6b49cdf9923d58cc8c4f7caf9f08765988f10a57268b9ec46c024aed767ff9eb19fa14d491cafc4f540b754910c9b26dfc887d75cfae4ec921e676ef43f010a6f15f9f7dc285c4c0f707d60ab3a6437108feeebe2b9f207c9b65ce32cdcada3ca8e1104c593067a9e7be1bc051b96029fcee56bfbaf3c62db26c76ed563845959ff67295507836b4e4a6623487e3f3616ef74cd0a52ec906d42568759a6d6ef2eaccea5de2c7721edf78328bfad21cc573024c624b853da0773e59bc87754a3", 0xdf}, {&(0x7f0000001500)}, {&(0x7f0000001540)="56160bf46273b57822ae556d2a3a1aef65fce6f16e0fb8cc2c9b0be3a69673a3717955b85b88a1", 0x27}], 0x8, &(0x7f0000001e80)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000002000200", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x1}, 0x0) r19 = dup2(r2, r1) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) ioctl$TCSETAW(r19, 0x5407, &(0x7f0000000000)={0x0, 0xe1a4, 0x55, 0x401, 0x2, 0x0, 0xfffffffffffffff9}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r19, &(0x7f0000000100)={0x11, 0x10, 0x0, 0x1, 0x0, 0x6, @random="56b4a5f58b00"}, 0x14) 23:38:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x40284504, &(0x7f0000000040)=""/9) [ 873.790763][ T4897] should_fail.cold+0xa/0x15 [ 873.795366][ T4897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 873.801177][ T4897] ? ___might_sleep+0x163/0x280 [ 873.801200][ T4897] __should_failslab+0x121/0x190 [ 873.810951][ T4897] should_failslab+0x9/0x14 [ 873.815455][ T4897] kmem_cache_alloc_trace+0x2d1/0x760 [ 873.820846][ T4897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.827079][ T4897] ? _copy_from_user+0xdd/0x150 [ 873.827098][ T4897] copy_mount_options+0x5c/0x440 [ 873.827116][ T4897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.843294][ T4897] ksys_mount+0xa7/0x150 [ 873.847535][ T4897] __x64_sys_mount+0xbe/0x150 [ 873.852211][ T4897] do_syscall_64+0x103/0x610 [ 873.852235][ T4897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.852247][ T4897] RIP: 0033:0x45a89a [ 873.852261][ T4897] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:38:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000002c0)={0x1f, 0x0, {0x0, 0x1, 0x0, 0x0, 0x2, 0x2}}, 0xe) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10100, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20100, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) [ 873.852274][ T4897] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 873.866589][ T4897] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 873.866599][ T4897] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 873.866609][ T4897] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 873.866618][ T4897] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 873.866627][ T4897] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 23:38:08 executing program 3 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) r2 = memfd_create(&(0x7f0000000280)='#em1#+\x00', 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x101200) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000040)={@local, @empty}, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r2, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) [ 874.062044][ T4914] FAULT_INJECTION: forcing a failure. [ 874.062044][ T4914] name failslab, interval 1, probability 0, space 0, times 0 [ 874.092440][ T4914] CPU: 1 PID: 4914 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 874.101477][ T4914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.111525][ T4914] Call Trace: [ 874.114830][ T4914] dump_stack+0x172/0x1f0 [ 874.119167][ T4914] should_fail.cold+0xa/0x15 [ 874.123763][ T4914] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.129584][ T4914] ? ___might_sleep+0x163/0x280 [ 874.134448][ T4914] __should_failslab+0x121/0x190 [ 874.139392][ T4914] should_failslab+0x9/0x14 [ 874.143895][ T4914] __kmalloc_track_caller+0x2d8/0x740 [ 874.149273][ T4914] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 874.155514][ T4914] ? strndup_user+0x77/0xd0 [ 874.160045][ T4914] memdup_user+0x26/0xb0 [ 874.164292][ T4914] strndup_user+0x77/0xd0 [ 874.168624][ T4914] ksys_mount+0x7b/0x150 [ 874.172868][ T4914] __x64_sys_mount+0xbe/0x150 [ 874.177550][ T4914] do_syscall_64+0x103/0x610 [ 874.182154][ T4914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.188039][ T4914] RIP: 0033:0x45a89a [ 874.191926][ T4914] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 874.211519][ T4914] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 874.219929][ T4914] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 874.227906][ T4914] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 874.235875][ T4914] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 874.243845][ T4914] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 874.251819][ T4914] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 23:38:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f0000000000)="7f", 0x1) close(r1) accept(r0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000080)) 23:38:08 executing program 3 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 874.526464][ T4901] device lo entered promiscuous mode [ 874.549091][ T4899] device lo left promiscuous mode 23:38:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000140), &(0x7f0000000080)=0xffffffb0) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc008240a, 0x70eff7) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 874.586069][ T4932] FAULT_INJECTION: forcing a failure. [ 874.586069][ T4932] name failslab, interval 1, probability 0, space 0, times 0 [ 874.622916][ T4932] CPU: 0 PID: 4932 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 874.631947][ T4932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.642113][ T4932] Call Trace: [ 874.645405][ T4932] dump_stack+0x172/0x1f0 [ 874.649739][ T4932] should_fail.cold+0xa/0x15 [ 874.654338][ T4932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.660154][ T4932] ? ___might_sleep+0x163/0x280 [ 874.665010][ T4932] __should_failslab+0x121/0x190 [ 874.669950][ T4932] should_failslab+0x9/0x14 [ 874.674444][ T4932] kmem_cache_alloc_trace+0x2d1/0x760 [ 874.679814][ T4932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 874.686052][ T4932] ? _copy_from_user+0xdd/0x150 [ 874.690909][ T4932] copy_mount_options+0x5c/0x440 [ 874.695844][ T4932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 874.702085][ T4932] ksys_mount+0xa7/0x150 [ 874.706327][ T4932] __x64_sys_mount+0xbe/0x150 [ 874.711010][ T4932] do_syscall_64+0x103/0x610 [ 874.715610][ T4932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.721492][ T4932] RIP: 0033:0x45a89a [ 874.725379][ T4932] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 874.744971][ T4932] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 874.753377][ T4932] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 874.761344][ T4932] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 874.769307][ T4932] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 874.777269][ T4932] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 874.785230][ T4932] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 23:38:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80044501, &(0x7f0000000040)=""/9) 23:38:08 executing program 3 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:08 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x06\x00', 0x101}) 23:38:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000480)=0x6, 0x4) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000), 0x10e755) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x12, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x9, 0x800, 0xfffffffffffffff8, 0xab, 0x5}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000005c0)={r5, @in6={{0xa, 0x4e22, 0x100000001, @mcast2, 0x1}}, [0x100, 0x1, 0x8000, 0x0, 0xfffffffffffffffc, 0xc93b, 0x4, 0x7, 0x401, 0x7, 0x5, 0x2, 0x3, 0x4, 0xfffffffffffffffe]}, &(0x7f0000000440)=0x100) recvfrom$llc(r2, &(0x7f0000000740)=""/214, 0xd6, 0x40, &(0x7f00000000c0)={0x1a, 0x30f, 0x657, 0xe064, 0x1, 0x60000000000, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000340)="47d984be26d05f321badb059f7012de5601c13979e8ac9f1883898d3a52b5dab3353f8f466c5a703f30e8cd6739c90e5e7403ffd6d4f88040a7cfcc479d611d1594fc37ec2fdce9decfd5ffb282e4c860c42a65b2d72b8a26cacdb8e04a42196f3a2c7c94c2fcf93e9d9f502f9300cb8aeff5127d70956b83a7a7023b251ecb9898f5735c28fee8a88947ea83d44948f42d132391f9987a2eccaad6e379d09454c4a9787a2b6e005272894f072e35f73cab05b5f77a2c76448558e6bc0823a288648ea4f9086", 0xc6) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000240)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={r3, r4, r6}, 0xc) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x3bb8588f, 0x1, 0x0, 0xc, 0x80000000, 0x1}, &(0x7f0000000300)=0x20) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x4) [ 874.940883][ T4901] device lo entered promiscuous mode [ 875.001158][ T4946] FAULT_INJECTION: forcing a failure. [ 875.001158][ T4946] name failslab, interval 1, probability 0, space 0, times 0 [ 875.021717][ T4946] CPU: 1 PID: 4946 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 875.030853][ T4946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.040904][ T4946] Call Trace: [ 875.040926][ T4946] dump_stack+0x172/0x1f0 [ 875.040950][ T4946] should_fail.cold+0xa/0x15 [ 875.040971][ T4946] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 875.040990][ T4946] ? ___might_sleep+0x163/0x280 [ 875.041014][ T4946] __should_failslab+0x121/0x190 [ 875.048607][ T4946] should_failslab+0x9/0x14 [ 875.048626][ T4946] kmem_cache_alloc+0x2be/0x710 [ 875.048643][ T4946] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 875.048658][ T4946] ? find_held_lock+0x35/0x130 [ 875.048678][ T4946] getname_flags+0xd6/0x5b0 [ 875.092977][ T4946] user_path_at_empty+0x2f/0x50 [ 875.097834][ T4946] do_mount+0x150/0x2c40 [ 875.102078][ T4946] ? copy_mount_options+0x5c/0x440 [ 875.107188][ T4946] ? copy_mount_string+0x40/0x40 [ 875.112126][ T4946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 875.118374][ T4946] ? _copy_from_user+0xdd/0x150 [ 875.123293][ T4946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.129538][ T4946] ? copy_mount_options+0x30e/0x440 [ 875.134746][ T4946] ksys_mount+0xdb/0x150 [ 875.138991][ T4946] __x64_sys_mount+0xbe/0x150 [ 875.143678][ T4946] do_syscall_64+0x103/0x610 [ 875.148273][ T4946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.154160][ T4946] RIP: 0033:0x45a89a [ 875.158051][ T4946] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 875.177658][ T4946] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 875.186081][ T4946] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 875.194045][ T4946] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 23:38:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f0000000240)={0x1, 0x0, 0x8, 0x2, 0x5, 0x0, 0x6}, &(0x7f0000000280)={0x98d3, 0x1f, 0x8, 0x58, 0x5, 0x2, 0x9, 0x1ff}, &(0x7f00000002c0)={0x8, 0xf, 0x4, 0x8000, 0x80, 0x1, 0x1, 0x9d3}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={0x1}, 0x8}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f0000000040)={0x2, 0x7, 0x17, 0x7fffffff, 0xfff, 0xff, 0x6, 0x1f}, &(0x7f0000000080)={0x9, 0x100000001, 0x1, 0x7, 0x80, 0x77, 0x100000000, 0x3ff}, &(0x7f00000000c0)={0x0, 0x9c, 0xf5, 0x6, 0x76, 0x9, 0x4, 0x1}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f0000000180)={0x100000001}, 0x8}) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0xf406, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff86, 0x3}]}}, @icmp=@timestamp_reply={0xe, 0x9}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0x1000000]}) [ 875.194055][ T4946] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 875.194064][ T4946] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 875.194073][ T4946] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 [ 875.229709][ T4953] device lo left promiscuous mode 23:38:09 executing program 3 (fault-call:2 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80044584, &(0x7f0000000040)=""/9) [ 875.394847][ T4965] FAULT_INJECTION: forcing a failure. [ 875.394847][ T4965] name failslab, interval 1, probability 0, space 0, times 0 [ 875.426006][ T4965] CPU: 0 PID: 4965 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 875.435034][ T4965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:38:09 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000500)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) [ 875.445089][ T4965] Call Trace: [ 875.448387][ T4965] dump_stack+0x172/0x1f0 [ 875.452730][ T4965] should_fail.cold+0xa/0x15 [ 875.457325][ T4965] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 875.463141][ T4965] ? ___might_sleep+0x163/0x280 [ 875.467999][ T4965] __should_failslab+0x121/0x190 [ 875.472936][ T4965] should_failslab+0x9/0x14 [ 875.477443][ T4965] kmem_cache_alloc_trace+0x2d1/0x760 [ 875.482816][ T4965] ? apparmor_capable+0x2ed/0x630 [ 875.487842][ T4965] ? cap_capable+0x205/0x270 [ 875.493207][ T4965] alloc_fs_context+0x5a/0x640 [ 875.493226][ T4965] fs_context_for_reconfigure+0x73/0x90 [ 875.493242][ T4965] do_mount+0x8ba/0x2c40 [ 875.493265][ T4965] ? copy_mount_string+0x40/0x40 [ 875.493284][ T4965] ? _copy_from_user+0xdd/0x150 [ 875.493304][ T4965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.493317][ T4965] ? copy_mount_options+0x30e/0x440 [ 875.493336][ T4965] ksys_mount+0xdb/0x150 [ 875.493352][ T4965] __x64_sys_mount+0xbe/0x150 [ 875.493370][ T4965] do_syscall_64+0x103/0x610 [ 875.493389][ T4965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.493402][ T4965] RIP: 0033:0x45a89a [ 875.493416][ T4965] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 875.493424][ T4965] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 875.493439][ T4965] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 875.493447][ T4965] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 875.493455][ T4965] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 875.493463][ T4965] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 875.493470][ T4965] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 23:38:09 executing program 3 (fault-call:2 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000180), 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:38:09 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\a\x00', 0x101}) 23:38:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_acct\x00') sendfile(r0, r0, 0x0, 0x800000bf) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8c) [ 875.904655][ T4975] FAULT_INJECTION: forcing a failure. [ 875.904655][ T4975] name failslab, interval 1, probability 0, space 0, times 0 [ 875.956161][ T4980] device lo entered promiscuous mode [ 875.969285][ T4975] CPU: 1 PID: 4975 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 875.978324][ T4975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.988368][ T4975] Call Trace: [ 875.991662][ T4975] dump_stack+0x172/0x1f0 [ 875.995995][ T4975] should_fail.cold+0xa/0x15 [ 876.000596][ T4975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 876.006408][ T4975] ? ___might_sleep+0x163/0x280 [ 876.011267][ T4975] __should_failslab+0x121/0x190 [ 876.016203][ T4975] should_failslab+0x9/0x14 [ 876.020704][ T4975] kmem_cache_alloc_trace+0x2d1/0x760 [ 876.026080][ T4975] ? kasan_check_read+0x11/0x20 [ 876.030997][ T4975] legacy_init_fs_context+0x48/0xe0 [ 876.036196][ T4975] ? generic_parse_monolithic+0x200/0x200 [ 876.041905][ T4975] alloc_fs_context+0x365/0x640 [ 876.046762][ T4975] fs_context_for_reconfigure+0x73/0x90 [ 876.052292][ T4975] do_mount+0x8ba/0x2c40 [ 876.056621][ T4975] ? copy_mount_string+0x40/0x40 [ 876.061560][ T4975] ? _copy_from_user+0xdd/0x150 [ 876.066491][ T4975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.072721][ T4975] ? copy_mount_options+0x30e/0x440 [ 876.077910][ T4975] ksys_mount+0xdb/0x150 [ 876.082139][ T4975] __x64_sys_mount+0xbe/0x150 [ 876.086812][ T4975] do_syscall_64+0x103/0x610 [ 876.091410][ T4975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.097292][ T4975] RIP: 0033:0x45a89a [ 876.101174][ T4975] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 876.120870][ T4975] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 876.129274][ T4975] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 876.137240][ T4975] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 876.145214][ T4975] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 23:38:10 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000da706829ffffff0000dffc0c00000000000000000000005b659a62290ffc380c2dbfd464fbc3f4c1b4e2bf581fb1c7949869c29855615e17341e9a4a603486191a5a5fb3a44a38e409d4700612dbc31a08000000a158cf0d70309f7f1989136edfd73294c0356675ffff000044f2a432a17b4c036aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f000023f000)=0xa, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:38:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80084502, &(0x7f0000000040)=""/9) [ 876.153180][ T4975] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 876.161147][ T4975] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 [ 876.169617][ T4980] device lo left promiscuous mode 23:38:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080), 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x9, 0x4) fcntl$setpipe(r1, 0x407, 0x5988b8c8) socket$packet(0x11, 0x2, 0x300) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000000c0)=0xb5) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000002c0), 0x3, 0x0, &(0x7f0000006700)) [ 876.332734][ C0] net_ratelimit: 17 callbacks suppressed [ 876.332741][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 876.344196][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:10 executing program 3 (fault-call:2 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:10 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1ce62000000000, 0x8000, 0x81, 0x12a, 0x1}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x8001, 0x5, 0x8001, r1}, &(0x7f0000000140)=0x10) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x100) [ 876.474741][ T5004] EXT4-fs (sda1): Cannot specify journal on remount [ 876.575895][ T5004] FAULT_INJECTION: forcing a failure. [ 876.575895][ T5004] name failslab, interval 1, probability 0, space 0, times 0 [ 876.618925][ T5004] CPU: 1 PID: 5004 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 876.627949][ T5004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.637989][ T5004] Call Trace: [ 876.641273][ T5004] dump_stack+0x172/0x1f0 [ 876.645613][ T5004] should_fail.cold+0xa/0x15 [ 876.649909][ T4985] device lo entered promiscuous mode [ 876.650203][ T5004] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 876.661263][ T5004] ? ___might_sleep+0x163/0x280 [ 876.666115][ T5004] __should_failslab+0x121/0x190 [ 876.671041][ T5004] should_failslab+0x9/0x14 [ 876.675530][ T5004] kmem_cache_alloc_trace+0x2d1/0x760 [ 876.680902][ T5004] ? kernfs_put+0x372/0x600 [ 876.685407][ T5004] kobject_uevent_env+0x2fb/0x1030 [ 876.690521][ T5004] kobject_uevent+0x20/0x26 [ 876.695020][ T5004] __loop_clr_fd+0x4ee/0xc90 [ 876.699613][ T5004] lo_ioctl+0x37c/0x20d0 [ 876.703850][ T5004] ? __save_stack_trace+0x8a/0xf0 [ 876.708867][ T5004] ? lo_rw_aio+0x1530/0x1530 [ 876.713450][ T5004] blkdev_ioctl+0xee8/0x1c40 [ 876.718032][ T5004] ? blkpg_ioctl+0xa90/0xa90 [ 876.722623][ T5004] ? perf_trace_lock_acquire+0xf5/0x580 [ 876.728159][ T5004] ? save_stack+0x45/0xd0 [ 876.732482][ T5004] ? __kasan_slab_free+0x102/0x150 [ 876.737586][ T5004] ? kasan_slab_free+0xe/0x10 [ 876.742261][ T5004] ? __fget+0x35a/0x550 [ 876.746407][ T5004] ? find_held_lock+0x35/0x130 [ 876.751162][ T5004] ? __fget+0x35a/0x550 [ 876.755318][ T5004] block_ioctl+0xee/0x130 [ 876.759644][ T5004] ? blkdev_fallocate+0x410/0x410 [ 876.764664][ T5004] do_vfs_ioctl+0xd6e/0x1390 [ 876.769253][ T5004] ? kasan_check_read+0x11/0x20 [ 876.774100][ T5004] ? ioctl_preallocate+0x210/0x210 [ 876.779207][ T5004] ? __fget+0x381/0x550 [ 876.783373][ T5004] ? ksys_dup3+0x3e0/0x3e0 [ 876.787787][ T5004] ? kfree+0x173/0x230 [ 876.791851][ T5004] ? kfree+0x173/0x230 [ 876.795933][ T5004] ? lockdep_hardirqs_on+0x418/0x5d0 [ 876.801224][ T5004] ? security_file_ioctl+0x93/0xc0 [ 876.806329][ T5004] ksys_ioctl+0xab/0xd0 [ 876.810492][ T5004] __x64_sys_ioctl+0x73/0xb0 [ 876.815104][ T5004] do_syscall_64+0x103/0x610 [ 876.819696][ T5004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.825578][ T5004] RIP: 0033:0x457c97 [ 876.829477][ T5004] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 876.849073][ T5004] RSP: 002b:00007f697238aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.857474][ T5004] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 0000000000457c97 23:38:10 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\n\x00', 0x101}) [ 876.865438][ T5004] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 876.873397][ T5004] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 876.881359][ T5004] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 876.889319][ T5004] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 23:38:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x5, &(0x7f0000000040)) [ 876.926568][ T5013] device lo left promiscuous mode 23:38:11 executing program 3 (fault-call:2 fault-nth:34): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) dup2(r2, r0) tkill(r1, 0x15) sendmmsg$nfc_llcp(r2, &(0x7f0000000a00)=[{&(0x7f0000000040)={0x27, 0x1, 0x1, 0x4, 0x7, 0x1, "8e17d0647ea129be5dcc37f1713c1bdfe5373e3e82ce3772739bf3be5e7a07b4d33e995b737029e89057c6e732f34f8f37a748a6345837156c85e2dc5bcdbf", 0x36}, 0x60, &(0x7f00000003c0)=[{&(0x7f00000000c0)="1e09f7168dd418f5", 0x8}, {&(0x7f0000000100)="27e5090180bae17e0cbe71858aa52c560cd7d94f7b66c25e1ed5dd28a57daf26f92ea6dd0811e598d07c992bbb8cd62ed4fb4fafbda03b2c5484376330055718c01e6ea580c1a8243be0cd8fa73d462018c49a7379879557852828086a0ca6190850d8188684399617b4be4cdba5aa674f6a5957941e5ec7fd002453ded2852ae92d5f4bf8b161efbe89644c05c1e3d1456d4aee5c60e6ba2e08e48f47d9cb107cda1dbcad8902ad1d373bd4ff3e0ea03b7e1603ece2e06d77a3ac55d8c411f7186c8d2b332f407f583e", 0xca}, {&(0x7f0000000200)="de96637423f5b870b824069adbee1e78db728a8556376c05d9f45f651133e73d01fd295474dfcf1d78a8d6768564864b8e921b1c673c7e7782f9e889ea413e4d4b5fbaa8f751cb73bd3720c5a9726430d387b27ddeabb77d4084ef7b019bf8fdfe8bc52a9e018810aef3ea604b55dc9de2317554847d50f9b6166a29853c78804ab8be9fc9e4d1c408dc73383542505cdaa4b189e9171d2bdd792c1f5ff5f50503458dcd74c84305088dfe869d84aa21d2b6768e0a1ff976bc09401929eff0b3f0fe10a7b2a5cf10c712cfa3bcd5eb7bdfb5dc99d689ac6d92a63660d73a9c552380a8c3aa70bd68328cbde1ecd0b2cc793e", 0xf2}, {&(0x7f0000000300)="44b5125b9aa73ba7e06d80a70de9111d173d89b25bc7430cbadc84ae075f9eb9c5ed2f37c29d721d4efeb74a6e2dab7cb00904b12eb9b2169529cf7bca5bf9cb1e25a0c0fd46658e56c804ecb85178e89e2df0b49dd8cdc1287fc11c82d12d43ea0f2aedc4ecf30442ced7a0fd6f42d4a592e9719014262249412d56", 0x7c}, {&(0x7f0000000380)="b081dde4dd6d5c685d2d34b640c806c2cffd856e02ad2cf8fd9d326fe115e0a3a9cb658ca687e932a9bbccf68931b1886239", 0x32}], 0x5, &(0x7f0000000480)={0xe8, 0x13f, 0x100000000, "54eaa15d7a1fc94037f7008a72ddbadc9ab1e95dc4518d20f60a09be2f15582690b8eb4daf714b7c28c1ffcea03449033403ea2b5f88dfa5a8fb3c89f99cc3f742a1c8a4719f38ab5876e08ebf3bd3d8d3702298a760fbbe3f06d2f61670680feeeaa11a50a858c09e687f4dcde8a7214e15f2f0a657ac96d7825beb07c8395e93065e4bf0edea9567de1c06d90fcf0b08802d74e911e32f8d16e4d0bd0514d25d3033f516b8751b5e577ff6f523fb5bc84ff35fc7e222bbaa4a2b82c67a41aa6bded0f5265a0a86422a7f8a16127f9e56"}, 0xe8, 0x800}, {&(0x7f0000000580)={0x27, 0x1, 0x1, 0x5, 0x2, 0x39272b4e, "a50deba07d3bae8f3319b7d309dcb7989df58599fe7b53ddbdfc628048d502a8cffb6622686d550fef2db393b01b12e201ca0d6aaec8a98813e71c2e6d2c23", 0x14}, 0x60, &(0x7f0000000780)=[{&(0x7f0000000600)="74e0ad2f098a547ee5a8ee890afdc2dfc800cf9f4e41f64a5a7d0eed6f98de344994ddb03bc29750afaf3d1779a8bc3f79d700b945d62593d49f54441924569515b4f54c53c7e0f301b9582b1f967885a1", 0x51}, {&(0x7f0000000ac0)="4037c0a0b60ea633fe821dc5e166a328691cca7e64d69a00f5edd5439d84b8f77702d095fac966b71eb0ba112a928bed667c16e0d9061878d6ff7783455b999782fb1c4910ac60910bbc83da010c86795534371f5f53d319723995e9657a9ad5cd0c2c3e29a540b8f83fb9fd0700a0c900c204a02ce7b1b951d673e58c9ded7e8334c50328641d03d9e2df23dbcfa0ae035e9ae040eda43d60d604b2a7ea6f2f250d759cb640dc131080333aef7f8f6b52537974c2b6575e8c3ebeb831887dfbebf04ad5621b44310612", 0xca}], 0x2, 0x0, 0xfffffffffffffe1e, 0x1}, {&(0x7f00000007c0)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb2, "31c24d68b622a2bb969f22e44d6e59c9189e20acdba7859cfdf6e125bb5970c74259c335e0706cf82def34f23956f59852883ccfc91888bd6ba890176655e5", 0x14}, 0x60, &(0x7f00000008c0)=[{&(0x7f0000000840)="b3840758dc6040847b93bd28acb75c61047f9e39d5164cbae58870f651ebb81e135f88244040a08cc8bd2b56682200494a58dae1df896e5d9b56716d5b175587f795edfb1dccef2046", 0x49}], 0x1, &(0x7f0000000900)={0xd8, 0x29, 0x7, "df31e1f859445ee468214d5b59b6c083fdf16df5d1870a444fc7fb03cfdd2e73827c04a077f44c4c6cb1098b3d6760c8939b398803ea03da295e366c360d2f05a71edf3fd2ddcffc9888ef16250a0279b3147c88a4d5ea697158ebbfd3a94f7a064e7f16901d77575d22f58261845a771d113d5de6d05a78c9f9880928da9c9fe33a7748a8ab005a8d2e8b8600dfe89b217096e2a8052b2bcaea061a5ecdd16e9f8a7602c4fe6619c737fb822239d4a5cebc31416aa96eb22f3087a762d8db9c6d90558d"}, 0xd8, 0x10}], 0x3, 0x800) 23:38:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80084503, &(0x7f0000000040)=""/9) [ 877.051822][ T5019] FAULT_INJECTION: forcing a failure. [ 877.051822][ T5019] name failslab, interval 1, probability 0, space 0, times 0 [ 877.092858][ T5019] CPU: 1 PID: 5019 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 877.101904][ T5019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.111953][ T5019] Call Trace: [ 877.115335][ T5019] dump_stack+0x172/0x1f0 [ 877.119666][ T5019] should_fail.cold+0xa/0x15 [ 877.124252][ T5019] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 877.130063][ T5019] ? ___might_sleep+0x163/0x280 [ 877.134914][ T5019] __should_failslab+0x121/0x190 [ 877.139843][ T5019] should_failslab+0x9/0x14 [ 877.144341][ T5019] __kmalloc_track_caller+0x2d8/0x740 [ 877.149709][ T5019] ? lockref_put_or_lock+0x6f/0x90 [ 877.154884][ T5019] ? ext4_remount+0xe3/0x2190 [ 877.159574][ T5019] kstrdup+0x3a/0x70 [ 877.163463][ T5019] ? ext4_register_li_request+0x7f0/0x7f0 [ 877.169196][ T5019] ext4_remount+0xe3/0x2190 [ 877.173697][ T5019] ? lock_downgrade+0x880/0x880 [ 877.178548][ T5019] ? kasan_check_read+0x11/0x20 [ 877.183415][ T5019] ? _raw_spin_unlock+0x2d/0x50 [ 877.188266][ T5019] ? ext4_register_li_request+0x7f0/0x7f0 [ 877.193978][ T5019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.200216][ T5019] ? shrink_dentry_list+0x319/0x720 [ 877.205412][ T5019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 877.211126][ T5019] ? find_next_bit+0x107/0x130 [ 877.215886][ T5019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 877.222120][ T5019] ? shrink_dcache_sb+0x224/0x270 [ 877.227140][ T5019] ? shrink_dentry_list+0x720/0x720 [ 877.232334][ T5019] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 877.238581][ T5019] ? apparmor_capable+0x2ed/0x630 [ 877.243606][ T5019] ? cap_capable+0x205/0x270 [ 877.248214][ T5019] ? ext4_register_li_request+0x7f0/0x7f0 [ 877.253932][ T5019] legacy_reconfigure+0x113/0x170 [ 877.253952][ T5019] reconfigure_super+0x2d0/0x900 [ 877.253967][ T5019] ? fs_umode_to_dtype+0xb0/0xb0 [ 877.253986][ T5019] do_mount+0x1650/0x2c40 [ 877.254008][ T5019] ? copy_mount_string+0x40/0x40 [ 877.254032][ T5019] ? _copy_from_user+0xdd/0x150 [ 877.273205][ T5019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.273221][ T5019] ? copy_mount_options+0x30e/0x440 [ 877.273241][ T5019] ksys_mount+0xdb/0x150 [ 877.273258][ T5019] __x64_sys_mount+0xbe/0x150 [ 877.273278][ T5019] do_syscall_64+0x103/0x610 [ 877.273300][ T5019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.273316][ T5019] RIP: 0033:0x45a89a [ 877.273334][ T5019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 877.292790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 877.295160][ T5019] RSP: 002b:00007f697238aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 877.299420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 877.304025][ T5019] RAX: ffffffffffffffda RBX: 00007f697238ab30 RCX: 000000000045a89a [ 877.304034][ T5019] RDX: 00007f697238aad0 RSI: 0000000020000080 RDI: 00007f697238aaf0 [ 877.304042][ T5019] RBP: 0000000020000080 R08: 00007f697238ab30 R09: 00007f697238aad0 [ 877.304050][ T5019] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 23:38:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 877.304057][ T5019] R13: 0000000000100020 R14: 00000000004dbb60 R15: 0000000000000003 [ 877.304279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 877.308730][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 877.314554][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 877.318420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 877.338075][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 877.426341][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:38:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000240)={'bond0\x00\x00\x00T\x00\x00\x00\x00\x01\x05\x00', @ifru_names='bond_slave_1\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x8}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) recvmmsg(r1, &(0x7f0000000400)=[{{&(0x7f0000000000)=@pppol2tpv3, 0x80, 0x0, 0x0, 0x0, 0xfffffe20}}], 0x1, 0x0, 0x0) 23:38:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x2}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r1, r2, 0x0, 0x1ffe09) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) sendto$rxrpc(r3, &(0x7f00000000c0)="d4c57f5f4443422f", 0x8, 0x85, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) [ 877.612361][ T5016] device lo entered promiscuous mode [ 877.639589][ T5013] device lo left promiscuous mode 23:38:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80084504, &(0x7f0000000040)=""/9) [ 877.919575][ T5040] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 877.940018][ T5040] CPU: 0 PID: 5040 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 877.949047][ T5040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.959097][ T5040] Call Trace: [ 877.962384][ T5040] dump_stack+0x172/0x1f0 [ 877.966718][ T5040] dump_header+0x10f/0xba6 [ 877.971136][ T5040] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 877.976944][ T5040] ? ___ratelimit+0x60/0x595 [ 877.981550][ T5040] ? do_raw_spin_unlock+0x57/0x270 [ 877.986662][ T5040] oom_kill_process.cold+0x10/0x15 [ 877.991779][ T5040] out_of_memory+0x79a/0x1280 [ 877.996454][ T5040] ? lock_downgrade+0x880/0x880 [ 878.001311][ T5040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.007549][ T5040] ? oom_killer_disable+0x280/0x280 [ 878.012742][ T5040] ? find_held_lock+0x35/0x130 [ 878.017526][ T5040] mem_cgroup_out_of_memory+0x1ca/0x230 [ 878.023070][ T5040] ? memcg_event_wake+0x230/0x230 [ 878.028101][ T5040] ? do_raw_spin_unlock+0x57/0x270 [ 878.033221][ T5040] ? _raw_spin_unlock+0x2d/0x50 [ 878.038075][ T5040] try_charge+0x118d/0x1790 [ 878.042604][ T5040] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 878.048155][ T5040] ? rcu_read_unlock_special+0xf3/0x210 [ 878.053703][ T5040] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 878.059248][ T5040] mem_cgroup_try_charge+0x24d/0x5e0 [ 878.064542][ T5040] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 878.070178][ T5040] shmem_getpage_gfp+0x69e/0x2500 [ 878.075220][ T5040] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 878.081366][ T5040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 878.086647][ T5040] ? retint_kernel+0x2d/0x2d [ 878.091239][ T5040] ? trace_hardirqs_on_caller+0x6a/0x220 [ 878.096882][ T5040] shmem_file_read_iter+0x30a/0xbc0 [ 878.102098][ T5040] ? shmem_write_begin+0x1e0/0x1e0 [ 878.107207][ T5040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.113442][ T5040] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 878.119157][ T5040] ? iov_iter_pipe+0xba/0x2f0 [ 878.123834][ T5040] generic_file_splice_read+0x4b4/0x800 [ 878.129381][ T5040] ? add_to_pipe+0x350/0x350 [ 878.133985][ T5040] ? rw_verify_area+0x118/0x360 [ 878.138922][ T5040] ? add_to_pipe+0x350/0x350 [ 878.143513][ T5040] do_splice_to+0x12a/0x190 [ 878.148012][ T5040] splice_direct_to_actor+0x2d2/0x970 [ 878.153382][ T5040] ? generic_pipe_buf_nosteal+0x10/0x10 [ 878.158928][ T5040] ? do_splice_to+0x190/0x190 [ 878.163613][ T5040] ? rw_verify_area+0x118/0x360 23:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 878.168467][ T5040] do_splice_direct+0x1da/0x2a0 [ 878.173323][ T5040] ? splice_direct_to_actor+0x970/0x970 [ 878.178878][ T5040] ? rw_verify_area+0x118/0x360 [ 878.183738][ T5040] do_sendfile+0x597/0xd00 [ 878.188173][ T5040] ? do_compat_pwritev64+0x1c0/0x1c0 [ 878.193470][ T5040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 878.199713][ T5040] ? put_timespec64+0xda/0x140 [ 878.202350][ T5016] device lo entered promiscuous mode [ 878.204492][ T5040] __x64_sys_sendfile64+0x1dd/0x220 [ 878.204513][ T5040] ? __ia32_sys_sendfile+0x230/0x230 [ 878.204527][ T5040] ? do_syscall_64+0x26/0x610 [ 878.204546][ T5040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 878.230212][ T5040] ? trace_hardirqs_on+0x67/0x230 [ 878.235244][ T5040] do_syscall_64+0x103/0x610 [ 878.239838][ T5040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.245731][ T5040] RIP: 0033:0x457e29 [ 878.249758][ T5040] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:38:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x805, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)=0x19) write$binfmt_misc(r0, 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x212c, 0x6}) 23:38:12 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\f\x00', 0x101}) [ 878.269351][ T5040] RSP: 002b:00007f851c400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 878.277741][ T5040] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 878.285690][ T5040] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 878.293640][ T5040] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 878.301602][ T5040] R10: 00000000001ffe09 R11: 0000000000000246 R12: 00007f851c4016d4 [ 878.309552][ T5040] R13: 00000000004c4dcf R14: 00000000004d8a58 R15: 00000000ffffffff [ 878.346872][ T5046] device lo left promiscuous mode [ 878.382180][ T5048] EXT4-fs (sda1): Cannot specify journal on remount 23:38:12 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x48400) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="b0000000000000000200000000000000030000000000000001000000000000000d000000060000007070703176626f786e6574302900000005000000000000001f000000000000001100000000020000706f7369785f61636c5f6163636573733a0000000000000004000000000000002723000000000000100000000900000047504c6d696d655f74797065656d31400200000000000000010100000000000001000000d006000029000000000000003157e0c963dec95295ef6d1cd8e37e2126eac9db40a19129d06dceb04686ac678ec8e8d3"], 0xb0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000280)=0x8000000) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000040)=0xf4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x400000000000003, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000000c0)={0x38}, 0xffffffffffffffa9) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/188) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x6}, 0xe) 23:38:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80104592, &(0x7f0000000040)=""/9) 23:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:12 executing program 1: setrlimit(0xf, &(0x7f0000000000)) mlockall(0x2) r0 = accept4$x25(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000140)=0x12, 0x80000) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x440342, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x5, 0x4) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000000c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffc000/0x4000)=nil) [ 878.574835][ T5040] memory: usage 307200kB, limit 307200kB, failcnt 61 [ 878.604367][ T5059] EXT4-fs (sda1): Cannot specify journal on remount [ 878.625538][ T5040] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 878.667092][ T5040] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 23:38:12 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xc0240, 0x0) r1 = getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = openat$vhci(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhci\x00', 0x2000) r5 = syz_open_dev$vcsn(&(0x7f00000014c0)='/dev/vcs#\x00', 0x74, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dlm-control\x00', 0x80, 0x0) r7 = socket$isdn(0x22, 0x3, 0x11) r8 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001540)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000001580)=0x1c, 0x800) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/dlm_plock\x00', 0x2000, 0x0) r10 = syz_open_dev$mice(&(0x7f0000001600)='/dev/input/mice\x00', 0x0, 0x200000) r11 = socket(0x1, 0x8080f, 0x3f) r12 = syz_open_dev$admmidi(&(0x7f0000001640)='/dev/admmidi#\x00', 0x1, 0x20800) r13 = syz_open_dev$cec(&(0x7f0000001680)='/dev/cec#\x00', 0x2, 0x2) r14 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000016c0)='syz0\x00', 0x200002, 0x0) r15 = syz_open_dev$sndtimer(&(0x7f0000001700)='/dev/snd/timer\x00', 0x0, 0x101000) r16 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000001740)='/dev/video37\x00', 0x2, 0x0) r17 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) r18 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001780)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_open_procfs$namespace(0x0, &(0x7f00000017c0)='ns/ipc\x00') r20 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001840)={&(0x7f0000001800)='./file0\x00'}, 0x10) r21 = syz_open_dev$ndb(&(0x7f0000001880)='/dev/nbd#\x00', 0x0, 0x200) sendmsg$unix(r0, &(0x7f0000001980)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="c271d1096d4a6dbeb3f40b17e4f515a143317bd520503366c866f1cd4bfb08b35f62a6d6b0abdad11c0cdff186e454677e2f3bc51bd1fc2c2587dd5bc1d146b39aada15190405ff58934678cf25a17eacc97fb3b0460885df263444041844f93fe41a35f317e4fc4d209f717697177aef8aef5af22781fe56360b677837d377e0f442c1c15b3e52bf20fac213f374dee738b5272552922438750c8d559f8cbcacfca04502d6b53d6946e24ba44d69c9bfdf2cb35008e3ce26c18db396c9b3af8e2daf10655f8143891481b185d1dcb908bfdd40c4f0ec46fc59a4986df2958a029917adcff12a9ea", 0xe8}, {&(0x7f0000000440)="7d0fd2b3740aaf6f5ab33d0226060dd3446d1d3946375a72bac0a2c05d4efff1158a2e14eeb76cfd814fa3b1f4ed292dbe02de433dfe34deb8c8893c5125c2abcd5b0203e2032540fcc2239232003ca59eef974c7a4ecb47e0532e2003b53a36d054790c1122cb3f4f51bd9ec6295da4ac782d8ec1e407bf279404f3df53a266309c9351c61d407400335cb792aedf0832b19233a6ab859ca82deb5b40ef20fb8155129ad779b9836e555be43d0cbc728aeb92cd3c5c8f6436f1774f0d0c62916a6782c8399980108afc94fa1bbf6817f5033e8cb4b7102ae9a23acf583f7368522676f8d5d0c1c64083c16839a25dc7dba6969533f744100926c11318f4ee33933236a292df4f5448d4e1a4f648a2dfe4fd918c4b5046f8397fd91abfd79fdcc3ed195e8e498ad797e3186b74bcb34ff6af20380bbdaff125d179128fc3c54a67cc7a071ceb5c047391dd63bf518dc11cd3b3a312d7b2b9f0c14d20ef8df35ba577b4deaf235751322bb0fda14ba9f954767c62cf83f3d5ad99bf7b52bb357488a18ecfd1f35fdce078c76bbc454470b12ba446b128c31724ab0d2ed49f8ed08f1706f9b2d5e74ab87a2a1881c8cc7cbd529bc635851b0b14aeb5516e71744864e4027c99d457cb68967ad4417050a3d2eeb716c77a3ce042094c59cd24b67f81677bed8462acc04c61c11f32b8f5ebeccf5df40719fddddcf369ed5a484e7e0712f38408bf4ab6663249049a69bdc48d8bfd01715de49f82b427b838656d5d23bb9a2c893e1c7cf9c7bcbb86d8b3d8485f281240693b902c90f751fdbdd7ccac137ab0c30892bc403495e9d8290d4c2a91241a30ae653804863bc84f064e0ad1ee8727adc2470d6c2dc37427fd6137c9c3b1fa160a951211d5eb0e4ba13cbe84828b6b193b807525504bb3697ce8f47667e5cbce06d118a46ab418917ef112cbb42f8749d768bfd9483e3f2e11442dbf266381487d1cc89de69a2ecdbcff9dd0375face901c46b5cd14d7b7bcb1620c19272c461a0937f5f6d895927e4d6814065407d3307ef3c149ec1df08ac2de931139a219909ff55ee38bd020f53b47641ff6a346ec19d6b3338d8a6f917bbd96a99df2fe0982380a7dd825611fdfa272b1054369af26e6e9c16af4377a07c636161474ee49a69051f339614fbfa4006febf57fee301307b14eef831f35a84b27242a8ada808199be20247aeddc75da07e6133b7f98003ae0de62a3111f2e53308627bd378f4ba808d4648824bc6d92525e3214044a0e22cf52a4160cafff0336ea4ba9629c92da6469e63da772ec750c0f06e02b72a0a45aa82cd74691e400de57e57425ffc90598027692dcd216deaa5730513a4a0cf4ff34ee43c7977b553144d992e30dcd671041b4da037b13f9ec24f6144b7c17d74f726d8459f6c5588ace4acf1a6f71f14e821cd957e967dbd00380d4cf68153b7cf18503ecadccf71c9ddc69fb98acdb11ae88a46186d5f1fbd6c16790438638c1721b1c4c662a0cd15e2271cb1d7d2b078e8707c672e20fecadc4fcbb1915ab566e053c8cdf0e62dd55bb35f17e0df0c6f7edb537a41d98cc566c7b16df2be7fce2b07e2179b8cea2c7c62a515dd208563359e62967f4f08eea28e04129470b4484901ce5aff9f22844df561a97f310fbded7b3f1da2cc9d46e9557e9ebb866ddbdc873c03847bf2e2e50b9fb01d620ecbe54b1c7ab82811fc6da60404a70afd86449b902b2e5837ad566e1c1e39b2e125df5c30ddb6363ad59fb8b26ab052fbc24fcfb61c20a5b605a71a2f4a89d922deac3f69c4917e213cdc6cf6c80eb6f85c2661fba7c3c33de364b955ca1349f19e6a461efbc9799fa8298aafa07ef52983676405122e8e20b23031781a97b8c3f9a17bd8a89de3e03356605b24a014e64f39c778299517521165fee8d5b0e648ee24e2621b8167272d3f902220b54c12454725d56a351a4326a595a8499073665d508118df12c2b7fb81b2fd98834cbd9c1278150213e2b16a35f1739f7b998fe7de5efcc99b059de1db4bd862dafb46fdb51e6e99a2553fdfee97fd86b857686f228a65036124f953169d0420b3cb6ff4f5175d0e5feb317477411ef9bf279743cfc7e75705537e1ace96b2bc0066a80c67402730cee9a4de9035e17c9757999a252a46e5e37066a674a9d25a55cf84a5ab21a988059e649f941eccf359673720c5542f1c14ad68b1e9775ef59a633d4082a7bf96b11c8dec4157ba8c77f0fa45d0079bb651cd506f1375e839970cafead2e71a45fe2690c5df47065243b4fc081ccf460ea752178a1fb2f5692867b6613f62ad3eeaf23105f3df4aaced6766fbcf8e3d43ca55d8b03d1f99e0ad1d8b880e14487a80dfd89a229d64d46a34c4a50c8fe0432212ad8db901a204f93100703ba72bedafc9dbf9953b63b941e76ac5d80999b0722f1ba5a7a004f0453825947605a2008f4b5176b6bbb2e240392fa59258aedc5e68d9d4037c53b2697370e0459d22e6f627d8cc0f2f4032ee0f239687a65ec9fc6b2f8d340ed49d0204327522612eca60d5534bb1145aefbc649b69f0c89b62b0169bd146992273fd56ee7bbb55805d754b5abf1f059698a87c881c9cb28576ccebf22da5f4c26bde73b249158623bb5c07d3f78a43bf7213baea5c293cacabc31f636c32d51015093b10236a177609d2e4367c44747c08b31a0520a75d5e76b88a9b5a8fa280c9a117eacd5fd5a06cd1eb0709e1b539319870162c03e7bde65e61122efb7dc104e95183fe6d84b8755a7523128ca2d652ea411f24539dc3ad55d7f61b8ab75c1905542cb2eaae74cecbb656c03b4fea9563ab9575168ee4b4c34747d229b353362ffed5411da85bc2bf0fd20fc5761bce4cf95b4f3f4267bdec9409b418e8921a2d350cd9b5f63f001e3b4b1e2531948df46b74550087658fef5a2969e9b6340ebb2c5891804ed7fb4de28b13136492e19b949abd43a3ac85b1f3652955d2c296ff5188ef5dc3e2535f71ca826386715ac3780dd8745b6b072cc2ae47a15d9d1441975f957dd3c4b14a27bff78afec9697d405cd67799348ab63b951ff3a36a176bf05a88c867f30f934677ddb2492ff7b99b5dbad4fb8bf239215b1b7ec9efd13d485be9141e2cbb0dee27f27601d004b9e559a0cdb3935fc872ff43c4810cfebaa0a25e8700dcada087dce9fad46349816b4ffb4027f13e23a46693dfd43097b2ef33a4895f0965939be269708d88be6af4a4e1d0fdeb7dd46c9d8c10687a14004c6a96f66b301787c78e9eef7ba2d40198fae5e34ea7b23039e1f2be2921dac51a00ea5aa388f4da41d0df259c997547ead1ebe92f2a366327b68e8f6617fc540b75df5b658aa3ad89bf75589504b0a623e70f96bb8ddfbf8efffe903824735ef5ee2f3aa226ccdc800e605cfb4d5a78dc01505e193575c8e6f90591ad71c6bf6bbc172bf7f6a9d611fab5258a3b1393f40df73a4dddc0fa85731cd175b50d6a6ce57341f8b7e8fa0c19e65e3e3b028b28a48425c0c9f0da705a59c88617d940c908c4b843bd6544ffee44b84189c019c0c14abce57694383be26b8c7a9d04616b39afd1e194c3292aae48491906c908c81c378c474667c7a6cadde732917110eef21166897345f3f87f292ee6ba64561f70be34b91885ee7de318554b95a7292e4ae494571c726986fa1c42a8be85855b8f16793f574b3c2214f99379d2c9731c2cef9444f1ea4536377b04ab3563f6b05ab422c3227637b63dd75eebaf31e5b3fc9c05d6bcac1b0aad243025c519dfd34beeb79f31162605e9f716900a0887d16d829e3514835753f90c69238e0c5a5929ffbbd87da89d3c3a4f87e7203a641be46bbb1da03d32c507d7a343cf7886784559ceadffe4aaa854bb43fc537d9aeabd2258e97214189968e55891ef941a9ca0805decce74a0d91fe2e72258f5b174488ab2b0f40adaaf1895b5bb7257a0bf260eab5cd3cde484452d1138ea441163b13055b8025356ee9840dfb7364a57698fbfc5fae83cb8f23b44aa3be57505f97ef7be1067b80cca67ddedb8951613782a8b0c85964017d019daf172407074b9ff197683a5ebe71e8b84861c373dbd17fefced7fc2c557e3c247e37ec035af6046502052daa93ec5542d5300c0b1cae099e0eaac88ece6fcfd6c4d51ff8b33dfbda69140940c57f7e50e94b00651f359bd56b1c86b78aa0de18973811fe318d0398564457b2a325db293e48b98c75d4b2a7a2649fc5fcc31c4980fc7b72e6d74a87ffcf57adc64b809b0b79057cc599b3a1b3b8d5e3afa119ff993ca57afffd6b4cb785496a5869a8f446c2336ece9bf6c83d78f71ef8f4eccea0a6ac9ddc3853268076244ced9fe6aa46b4d3b766cb6e8d7f11fa9ddc4b14860c6f6917714602e4703835f2c3ba637f38634fbff35c7433bdd35a59ff4ef36f4588bbdf7824d28fb6da048c06ac51863f3f83b493990f18b60bcea6c92b1fc73b6188e482caf29658660c5b5bdd60cf12d9ee31655201e7a0a38d8c82721ddaa78e9a8e9df14c42d37071ff273e01940140bd785e6c3f637e6e98bd02e6cf079886679796e1f48529ba2b2b1aee289e534a8e4159372845b4887bcb3e17034107f94bd7e7a5ae83050e2f5176a7955f4bed4e09601b963601f2d0ca1e24db02040c199de9ec61dd8514f10b68ef41e091d21d6b20929d66fa4f6fc34e1c0ea162c8d5e9a07cd2a28a078cda3b597256f2ddae34f5609df01160647ef772db9aea1becbd5602ad840c16334c1772d97a0f2b68aab14b4e18b34d1f700065a891f16df2aac737e51f5ebd23f7f4f0d84ecafcbe25db6a95bd357416d2d44b0f2299bde3c4dadebc147446310415b2af2db2bed62e5b2bb6fef5f6f9d7da8f91bb72d1314e90fd418dd8b71f1e5938effcb630e00bc6209a0d0b3cd4737c28dbb0ab2557c4c3fe5dc6dba8bd473efbaf17795c0a437916c1c35d15d68099471296d64f4de9476dac3a5ae2231fa78369d88103f45875e133ad2ddd9cfdb1468e5a346be5f1476bf5ff4a0b3396498c75c45d046128c385b1dcea1bdc8bbc46f7d918a3c05ef8242ae3bb520212f919354cfa2c455bce6324850719cd799d479303437e40851c3fe88dbf790e2aba880de703ef98a24709b4613ce209e2fd316272a6b49658a82c88059e0cb767e9b959ff5424ccb146be00129855cc1cece1cf78e5779a8a6e3e81263369c0f472baf555e77d754a90495c2b366ed40d4f2a38bb9d2bc657745e0027272bf9bd824dfeca2ec291249b1530ff5123011e6d4ca825856200582098a040d71fc8db2fcdaf0ae02ee9eb5dc31713d29a5f86624eb2da88f2308d0e6bbd2a396961225e0a163570b470b33b59455cddd86eb591c56e01671b828259c224172dafdcb42bc2da8faaf1d4445d76df645de2c8368d08941e5ab4ac081ac80adb871546e779d4d55b23a6f529961069ef7c371d3029fc6a4d3636042cf16ce62983366b442122a6dee09187b090a275fa7080331c4f959a01e31d8d829eb8e749763ded62c23f21f444b41fb6eb358382550dcff583e85accb83a0e6d3e29608a1a152ff7666f38c25683ac9ffafc2ea28697d8c8675e55ef61d42adb5d3dcd683169bafb80289447d6f5d68792c276b37446abfa233adfe028116d586c80249fac752b061f358b63223397ebb2c655e5c4fdf2ad263ef048c8d3f3c4ba09e78b5a13ae6539117c75895f209ba8b56aa31123314ba1efc59906a1f311b07cd72e03ecf6b7ee81b21432472748b2e3df3f53f21348ecf7738", 0x1000}, {&(0x7f00000000c0)="69842bb4dab0d1b39f7222c100d6a5508152edc9b67f15d95e03e8c7bab9a71803c87324ac4c19f46c4b39", 0x2b}, {&(0x7f00000002c0)="13a9e7a0e351a140710242c9aaf8ceb4ac692cf1c86a1cff5a4267c98c569e706544641084095c15542c9a9a9ca184aa8151307db16293ee45710c91ec93544e8fd85ccd052ae6793e79ebd4f09628c309718b8dfe389ee1b84c28340653559cf0a8671d5019f0a4a3b5ca82ce29b4afc7d5e7ea42ac814b02bbe85a38d3a3414e4d2b4166c92cce5789217e7debe70eacccdf62a43ec895f85e265682b84d7c63e2e840e16351dfa3e20fd9f71dd09915fa694f", 0xb4}], 0x4, &(0x7f00000018c0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r4]}, @rights={0x38, 0x1, 0x1, [r5, r6, r7, r8, r9, r10, r11, r12, r13]}, @rights={0x30, 0x1, 0x1, [r14, r15, r16, r17, r18, r19, r20]}, @rights={0x18, 0x1, 0x1, [r21]}], 0xb8, 0x8000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x8}, 0x2c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 878.693506][ T5040] Memory cgroup stats for /syz0: cache:592KB rss:230448KB rss_huge:196608KB shmem:572KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:608KB active_anon:230260KB inactive_file:0KB active_file:0KB unevictable:148KB [ 878.730701][ T5072] EXT4-fs (sda1): Cannot specify journal on remount [ 878.782916][ T5040] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=7533,uid=0 23:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 878.849581][ T5040] Memory cgroup out of memory: Killed process 7533 (syz-executor.0) total-vm:72712kB, anon-rss:16540kB, file-rss:35808kB, shmem-rss:0kB [ 878.916074][ T5052] device lo entered promiscuous mode [ 878.943915][ T5081] EXT4-fs (sda1): Cannot specify journal on remount [ 878.966889][ T5038] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 878.977759][ T5046] device lo left promiscuous mode [ 879.030461][ T5083] EXT4-fs (sda1): Cannot specify journal on remount [ 879.071043][ T5038] CPU: 0 PID: 5038 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 879.080072][ T5038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.090120][ T5038] Call Trace: [ 879.093420][ T5038] dump_stack+0x172/0x1f0 [ 879.097753][ T5038] dump_header+0x10f/0xba6 [ 879.102165][ T5038] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 879.107976][ T5038] ? ___ratelimit+0x60/0x595 [ 879.112544][ T5038] ? do_raw_spin_unlock+0x57/0x270 [ 879.117671][ T5038] oom_kill_process.cold+0x10/0x15 [ 879.122773][ T5038] out_of_memory+0x79a/0x1280 [ 879.127434][ T5038] ? oom_killer_disable+0x280/0x280 [ 879.132697][ T5038] ? find_held_lock+0x35/0x130 [ 879.137454][ T5038] mem_cgroup_out_of_memory+0x1ca/0x230 [ 879.142989][ T5038] ? memcg_event_wake+0x230/0x230 [ 879.148010][ T5038] ? do_raw_spin_unlock+0x57/0x270 [ 879.153107][ T5038] ? _raw_spin_unlock+0x2d/0x50 [ 879.158036][ T5038] try_charge+0xd4d/0x1790 [ 879.162437][ T5038] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 879.167960][ T5038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 879.174185][ T5038] ? kasan_check_read+0x11/0x20 [ 879.179020][ T5038] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 879.184548][ T5038] mem_cgroup_try_charge+0x24d/0x5e0 [ 879.189835][ T5038] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 879.195453][ T5038] __handle_mm_fault+0x1e1f/0x3ec0 [ 879.200540][ T5038] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 879.206067][ T5038] ? find_held_lock+0x35/0x130 [ 879.210817][ T5038] ? handle_mm_fault+0x322/0xb30 [ 879.215734][ T5038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 879.221951][ T5038] ? kasan_check_read+0x11/0x20 [ 879.226779][ T5038] handle_mm_fault+0x43f/0xb30 [ 879.231534][ T5038] __do_page_fault+0x5ef/0xda0 [ 879.236282][ T5038] do_page_fault+0x71/0x581 [ 879.240787][ T5038] ? page_fault+0x8/0x30 [ 879.245010][ T5038] page_fault+0x1e/0x30 [ 879.249159][ T5038] RIP: 0033:0x40f98f [ 879.253042][ T5038] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 879.272727][ T5038] RSP: 002b:00007fff21624990 EFLAGS: 00010206 [ 879.278783][ T5038] RAX: 00007f851c39f000 RBX: 0000000000020000 RCX: 0000000000457e7a [ 879.286740][ T5038] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 879.294709][ T5038] RBP: 00007fff21624a70 R08: ffffffffffffffff R09: 0000000000000000 [ 879.302697][ T5038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff21624b50 [ 879.310659][ T5038] R13: 00007f851c3bf700 R14: 0000000000000003 R15: 000000000073c04c [ 879.462855][ T5038] memory: usage 292024kB, limit 307200kB, failcnt 69 [ 879.470834][ T5038] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 879.505850][ T5038] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 879.532134][ T5038] Memory cgroup stats for /syz0: cache:2044KB rss:213852KB rss_huge:180224KB shmem:2024KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:2144KB active_anon:213748KB inactive_file:0KB active_file:0KB unevictable:148KB [ 879.543835][ T5052] device lo entered promiscuous mode [ 879.576557][ T5038] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10468,uid=0 [ 879.592881][ T5038] Memory cgroup out of memory: Killed process 10468 (syz-executor.0) total-vm:72580kB, anon-rss:2204kB, file-rss:35840kB, shmem-rss:0kB 23:38:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x2}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r1, r2, 0x0, 0x1ffe09) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) sendto$rxrpc(r3, &(0x7f00000000c0)="d4c57f5f4443422f", 0x8, 0x85, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) 23:38:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)=""/9) modify_ldt$read(0x0, &(0x7f0000000080)=""/50, 0x32) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x200000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000200)={0xa8, 0x0, 0x7, [{0x3, 0x8000, 0x14, 0x1, 'posix_acl_accessuser'}, {0x6, 0x401, 0xa, 0x100000001, '/dev/ptmx\x00'}, {0x5, 0x3611, 0xa, 0xb47f, '/dev/ptmx\x00'}, {0x3, 0x1000, 0x0, 0x9a4}]}, 0xa8) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) 23:38:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80284504, &(0x7f0000000040)=""/9) 23:38:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:13 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x0e\x00', 0x101}) [ 879.699602][ T5091] EXT4-fs (sda1): Cannot specify journal on remount [ 879.709020][ T5089] device lo left promiscuous mode 23:38:13 executing program 1: syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x40) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@generic={0x3, 0xffffffffffffffea, 0xffffffffffffff01}) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f023c123f3188a070") r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=@profile={'permprofile ', '&&^}\x00'}, 0x11) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) [ 879.825576][ T5106] EXT4-fs (sda1): Cannot specify journal on remount 23:38:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 879.882389][ T26] audit: type=1400 audit(1550446693.880:67): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="&&^}" pid=5108 comm="syz-executor.1" 23:38:13 executing program 0: rseq(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x2}, 0xd1, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x6, 0x0, 0x5, 0x100000001]}) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="dcd4a0ae04d1cd8cb3a401f6efe0707e165752e29c0d1c7e73b54aab53ca35070f1df74ad84ac9138e9e64b3f5de743f363b54cb6e649c", 0x37, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000001c0)={r1, 0x2, 0x400}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'poly1305-simd\x00'}}, &(0x7f0000000280)="c21f7fbce2eef9778034a874f4c75250d8baf15d735d7465f9be7561d5", &(0x7f00000002c0)=""/175) rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x2) [ 880.036840][ T5115] EXT4-fs (sda1): Cannot specify journal on remount 23:38:14 executing program 0: setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x35, &(0x7f0000000300)={0x1}, 0x8) [ 880.149711][ T5118] EXT4-fs (sda1): Cannot specify journal on remount 23:38:14 executing program 0: r0 = socket(0x2, 0x1, 0xffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x414, 0xc, 0x0, {[], 0x2}}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) syz_init_net_socket$rose(0xb, 0x5, 0x0) 23:38:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:14 executing program 0: r0 = timerfd_create(0x0, 0x0) get_thread_area(&(0x7f0000000300)={0xd9dc, 0x0, 0xffffffffffffffff, 0x1, 0x7c, 0x7, 0x1, 0xfffffffffffffffc, 0x7, 0x3}) timer_create(0x5, &(0x7f0000000100)={0x0, 0x25, 0x1, @thr={&(0x7f0000000040)="3582db4f64ad6effa1048e687e1ba03c4d1c3fab4ea0def093", &(0x7f00000001c0)="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"}}, &(0x7f0000000140)=0x0) timer_gettime(r1, &(0x7f00000002c0)) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x404, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {r2, r3+30000000}}, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000340)=0x1, 0x4) [ 880.362071][ T5100] device lo entered promiscuous mode 23:38:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 880.397734][ T5089] device lo left promiscuous mode 23:38:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0xc0045878, &(0x7f0000000040)=""/9) 23:38:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000380)=0xbb, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[]}}, 0x8013) accept4$alg(r2, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 23:38:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:14 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x16\x00', 0x101}) 23:38:14 executing program 1: socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000002880)=0x7) recvmmsg(r2, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ae}, 0x101}, {{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f0000000500)=""/232, 0xe8, 0x7}, 0x8}, {{&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/168, 0xa8}, {0x0}, {&(0x7f0000000900)=""/56, 0x38}, {0x0}, {&(0x7f0000000c00)=""/248, 0xf8}], 0x5, &(0x7f0000000a40)=""/37, 0x25, 0x8001}, 0x9}, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, &(0x7f0000000d00)=""/163, 0xa3, 0x100000001}, 0x40}, {{&(0x7f0000001080)=@nfc, 0x80, &(0x7f0000002400)=[{&(0x7f0000001140)=""/67, 0x43}, {&(0x7f00000011c0)=""/131, 0x83}, {&(0x7f0000001280)=""/145, 0x91}, {0x0}, {&(0x7f0000001380)=""/77, 0x4d}, {0x0}], 0x6}}], 0x5, 0x41, &(0x7f0000002640)) r5 = dup2(r4, r2) sendmsg$netlink(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="28040000000000000100000001004000", @ANYRES32=r5, @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="e5ffffff0c2cf01d9bcd19c1d403c9c7c36f1e7e3bb9ebef917d9f12262ee7d50e5d8a1d44d4693b17ec6216de68b642f752bdc8710a88128ada5c6d87d16afb11"], 0x28}, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x1, 0x6, 0x5, 0x7}) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 880.898518][ T5100] device lo entered promiscuous mode 23:38:14 executing program 0: clone(0x1000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e*z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 23:38:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:15 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x6, "0df5754d1515c9acbfbefaec53023a87d6e22c8c637e29da44960750143d6b49", 0x2, 0x1}) syz_emit_ethernet(0xba, &(0x7f0000000100)={@random="734894c800a6", @broadcast, [{[], {0x8100, 0x2, 0x8, 0x4}}], {@ipv4={0x800, {{0x28, 0x4, 0x40, 0x401, 0xa8, 0x64, 0x1, 0x10001, 0x7f, 0x0, @local, @remote, {[@end, @generic={0x0, 0x11, "3cb5c546582dc92fb7e0eb9022ede1"}, @noop, @cipso={0x86, 0x40, 0x8, [{0x7, 0xe, "3c69b726a76a54088f5d4792"}, {0x0, 0x7, "daac8663e0"}, {0x5, 0x7, "17de255a7a"}, {0x7, 0x10, "db98eb6db1b1bc918e95a9d966de"}, {0x7, 0xe, "a4d055c02f1f6a18c6de1c0d"}]}, @ra={0x94, 0x6, 0xffffffffffff169c}, @generic={0x44, 0x10, "5e785264ecb63c6e82c909ff945e"}, @lsrr={0x83, 0x1b, 0x6, [@multicast1, @broadcast, @empty, @rand_addr=0x4, @broadcast, @rand_addr=0x3ff]}, @generic={0x86, 0x8, "602871a9c2a0"}]}}, @icmp=@info_request={0xf, 0x0, 0x0, 0x74000000, 0xc99}}}}}, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004700008d353474d19186de78ac1414aa8303ef890304000000009078ffffffff"], 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000000)) [ 880.992528][ T5159] device lo left promiscuous mode 23:38:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f0000000480)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') rmdir(&(0x7f0000000340)='./file0\x00') r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) statx(r0, &(0x7f0000000140)='./file0\x00', 0x4000, 0xfff, &(0x7f0000000180)) 23:38:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0xc0045878, &(0x7f0000000040)=""/9) 23:38:15 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @local}, 0xc) signalfd4(r0, &(0x7f0000000000)={0x2}, 0x8, 0x80000) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x5) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="7525820aedb800001400000008004500001c000000000011907800000000e000000100004e2100089078df7b785cc7d2db14affccffacb25b29a947e2edceccb8c56563c7698e1662af3209825c50e723178536b627d591094100f7844c6b13bf67d0e90af559f1cdc8ece5d9a6cf5e3cc08009464c892d59d4f78723476db362ef5ea596701f861d468b31480698783e154a0bb2dd673aa3be4cc4029d5e3878ce3fe1a7ec142ef986801655078819a2b0baf5ddb5320a0dfb1fb94b4cc67c21025"], 0x0) 23:38:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:15 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x3, 0x8}, 0xc) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000100)={0x2, 0x800}, 0x2) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd25, 0x25dfdbff, {0x80, 0x94, 0x10, 0x3f, 0xfe, 0x0, 0xfe, 0xc, 0x100}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x44090) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x7}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x8}, 0x8) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x60a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r0, 0x100000001, 0x8}, 0xc) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000340)=0x3, 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in={{0x2, 0x4e20, @broadcast}}, 0x0, 0xffffffffffffff47, 0x4, 0x6, 0xe6}, 0x98) r4 = accept4$vsock_stream(r2, &(0x7f0000000440)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000480)=0x60, 0x4) ioctl$TIOCMGET(r2, 0x5415, &(0x7f00000004c0)) setsockopt$inet_tcp_buf(r2, 0x6, 0x3f, &(0x7f0000000500)="05a6ed008462ff89fc55a22d8c9f", 0xe) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000640)=0xe8) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000680)=""/228) prctl$PR_GET_NAME(0x10, &(0x7f0000000780)=""/49) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000007c0)={r3, @in={{0x2, 0x4e22, @local}}}, 0x84) getsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000000880)=""/247, &(0x7f0000000980)=0xf7) r5 = gettid() write$FUSE_LK(r2, &(0x7f00000009c0)={0x28, 0x0, 0x6, {{0x5, 0xff, 0x3, r5}}}, 0x28) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000a00), 0x4) bind$inet(r2, &(0x7f0000000a40)={0x2, 0x4e23, @remote}, 0x10) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000a80), 0x4) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000ac0)={'veth0_to_bond\x00', 0x7, 0x10001}) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000bc0)='trusted.overlay.redirect\x00', &(0x7f0000000c00)='./file0\x00', 0x8, 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000c40)='htcp\x00', 0x5) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000c80)=0xd8, 0x4) request_key(&(0x7f0000000cc0)='user\x00', &(0x7f0000000d00)={'syz', 0x0}, &(0x7f0000000d40)='[eth0@GPL\x00', 0xfffffffffffffffc) 23:38:15 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) close(r0) 23:38:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 881.452744][ C1] net_ratelimit: 12 callbacks suppressed [ 881.452750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 881.452779][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 881.458534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 881.464279][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 881.481331][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 881.528366][ T5162] device lo entered promiscuous mode [ 881.542724][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 881.548506][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 881.554546][ T5159] device lo left promiscuous mode 23:38:16 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x17\x00', 0x101}) 23:38:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:16 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000240)='./file1\x00', 0xd40beb2474dfd229, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) modify_ldt$read(0x0, &(0x7f0000000180)=""/10, 0xa) sendfile(r0, r0, 0x0, 0x10000) syz_open_dev$sndpcmc(0x0, 0x100, 0x101000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0xfffffffffffffffd) clone(0x800, &(0x7f0000000600)="614e97d989137eeb0ea8f15a47a0ca9a949a308ad0e8484585f19d66c0b3c8157f3c1694855d52f7f9a1e91648f3a05662ed1eae4aaf9ff4b9e3a51b8e5c242dc9701307e752c2f55b5ee908d75dc8f8704a354c5d5a7ea2c39c6f4b377d40e21b7fe13cb023cbb4ffb80f4503f62416fb867308c989b2a456c216b0534513eb9b2b03f987548193a8e5ff931c9f570c0c1fea4345f7b2c0e98319520bfbe924c1998ae87d3a76b7aac2f3bacc56075417eea4f9a15ba4b62b97d1af645bc38f486b760d82df59ad3242c6408aac26c018543f1baf5cce937a1f8e98dcededb50d5b595773a7cf48c9c27b56115cbbff66d043a61dec5d0f4f55da8ad591376888729085af25f7bda04fe4e925a7fca27199f2682f49439e55266fd076547dd147983a0a329015672a59be3bee08c2278dd1a1034ac1cbd4c102a17e75da716da07a251a4f70ba21eeaf6079460c90de4595afc3f58dd80b3aac1e916800cf72bb116b8730dcc48a091d67adc637e7b34cf04644a1541a32163f1dd65af7dae85b663a1b58a8052a011d95f1c50242e2e56651b5941cd2af7095b18bea72dccda4ee8614376590d785f7f64bcb5f664ba21aaa1ff98db2ba7e5bfee938dbe6b6aab70a808870b93f22217a9d29f9ef2757da40145dfa528d230d79f43675058ec111b5148362714ffd02a370ec7da81a8c8005943c3fe8091ead49083a10763ac1a9c0db0f1e51ae88d1f0069685ee13bca8137036aab9ac8a0811f40eda950140bf9fb1fa590c3b8583ae542dce1b46c986197af6017f2a5b1e8a15f7bc253bc01d106706df65ef9a825d69da4578764c746cb98378672f9ff92c476169caf12cdd6e39d77378e6b42c066531339a640dec9b3b6f78214a7ca78427608e4d66f06385cca1f34b13d4005565cafa4e3dd67a1484caf79dbe0ea738244eea300c53f96d380757122d0e5a9d89e9b36b4d18da3ae36fb5075474f5422dc90b4182cb83565a42c441b2738ea102e05cf2e23c1ec0d30a3b150f0239d1cee33ce58a535ad4c868de8efa7323a195948d8112aeab54fa0b36235bd31755af6bd5a16ab4166983cfb2f793cc1267165e41658d2865a36136b4d47d45598154615915377f33b6954f8f58ebef50499ba1359aad557fdb4f0ec9ed875b131b8b411b8429a122de8c22c54949edd7749c71b3bb8c0c03c32d5364efb545740c33fa12ae01e9ddf91cde7a36077e83e352ef5d0b3c8b1f459e821b11ce0d24fc7dbaae05e2fc47f6cdcb85e04ca43ae3732f23b5db379167d08d6cc80c16767eca403b68eeb7fb9464f484188b6e6f207e30dec875a103bd63c5df634dd92deb0689b925275e83616bc034401171dba20964b0be8e7212c8f8ae5cf758f19164fbf9bb444d487739187c0f66162c972a97d0261fcbf0a41069e43a8efe8f24af8b08705a250034c08b609b0da853c963200ed22144845e356311826d76efcafc9ff144f70f4433e62bd1f0f3f79ebff7aa4e50806c12bf471390a21d7cf968457f11a6c35cbe0a945eb18019ea8afe830808ea3610aaa7b71acc0bcf68f636dfaface7ed7d35ccdfd34ca5127786357aa2b9e9256ba9fd4d30c69827c1108f77f22c845e4bfc2bd040f78f569651bc782a4cd5f5ce6915c2eccf4bb03b6b2e50db2f545f76f848f96eaff35c628f74df5910b9b2b46323b417dd5cb4b8849bb681e7fbd0f453103c95d63ec61879e0921c39231d3213f9bed1e4e17ebdb9f5020298b116aff2f8de69ecfa70cc5947f62ef647f81ac75dfc040f19ce74bd65bb7981013272c45edd18c1f7689d582dae983e73bd73ff3a182f4168ef829e96f62c2b4f54ecc7dbb978285234e00490ccdcfbe427342d0407f067e7fff6306f8ddae633dbd4c7e788aff21e9c919f9afdd90c92b8720813059f94d5dbec02e0adeedeaa54ea27142a86cdc49e9c7a5e4d3df0117416e3d82e1687202257d0078adcfcce20a49e60929dc01f841611592b1827c732b4cbd77ade09e417b2a96d48b945d0ff96f147a2e4b218949d13e0cac18eebe16b7abc754dd29fa9a1d79ca7da6bbeba9c915d3f93921463323b68eda6dff3375c1498aebfb0e70cd43c765e4dcb3f06197a0ac78a56c42e22f89c6832264e8c4e4059c86cd6b5078743d81237695e36af165bc2f18828a53ce3dee3ec584977d37582c1a3f8244441ca43333752649b1cf661a5d8638279615e409f5bdceadec7fe8fd468d51fab2571698cc69740316fab671d8400cdfd2b8d5b075e0105ffcb79d7506dea811c2cb64e25064a67b8b9a6c99f653ba27e2fb56500bcc1ffeed8495c773b093a3b8d6776fd3e82e721b949ca0400067b18c017c8b1d82c7d3b3264e674223fde9b7d7f57d83cbfeb24f1be5f362c5e22cfa2b12c7650a47be0a93da8626eef82818ad3f28f77a87c6816375a8fc1f2e4162fd7513f61c391296499de8d062cb9d574c2b25a1a2b3e3f3387e4d9a54e077e5e91b5a1aa23c00e6f2f3cf796d5060099514877978685c4859639c87860321896fb223122f11b1399d3ca729f4d3ce02ad89a60cbe7283ecae3b21798e1be3dbe225d606d5b6f96af16b53289bae23f32566143370df29ad0bfdcf9c16246ec046d6897820d905bf8cda86b2d9ece41bb9049d5885f3378c42a56ef1164521e745a64e7647a08dab8f3bef8e1cd2b251cc5ac922c0b16ebb6b402d59f8e3d1b401e3452f922a91c4ebe51ba6be705714930a5a3980c08510319ec966740dc6f3a177d30e5cf785d2c04c4ffcb013a0fd1825f1b54fbf86607be682f30338d1efbe8202f7f891d924cef667016e2153ce737612e3b2fe336c8c42b7b4e25b0cfe7cdeecb82e15df20b0b01c3e38966b928ccda6ee77a2257ffb7d120a9af69a413791c09068368f03f410c869a1709d4ef33a3fc9de1abb7a4f7125e04b3b16f1c92c5403fbf1f8452639171c780ee93793480aa2cad618911b9de3f894de80438cfbf9369869a41da2a8749cf7669cd2fdd7fa001e1433f71548f99f455430b249974362dd2d706ee46ebf9e836a894e9b88e9c39c81524d11998965c63478c835d65076e17eaddea46886aabbf39638ca9abfaea3a5419c7b6dbd5ba38e531ffa53804a49e0bd3cadb6a5980e85c0926893d837b4c873104f5a4293b6d7f69c437831bdd53e9d1af6435a3386a6f1b8671e65fb267aad6dc16f3667791fbd653afe9395bb86b169aaf394dbb2cc02e4e3ea62a8b6e054eb16b412d220559086b54422b12635bcc94a81a40102c30f478050893b282eb7e289ad0ce797f2d39ab417204c02e0b0f518385198abd892532ceede06b7dfe530b373c37c0cefe4d252fd62bceedbbd0b94db07514904d82568046571aef4b1fd714f2ffa9018e00c8520fa1911df4dd123bc62ee631366de3bef9401d5510a1eaa05d83dba67366b64718fcf7a95fc43b864c21513fa27ae3e5a19d1461b1ba9cc73f49ccf1ac3ed0f4412e087b954de76f210873887aa0c2497ac063d716cffe21cb7cbed307d1638a70a1fd83273f24c2ee85f667939b2f70caaf27f33fa085b13ad5327685af3abac4e0825c83f9952ed15f4d7d034407f952814663096e308745a08e979cfb46cb6f8bfa03cc3253756b0c2e5d142b8bca7096260bc9638afcd84a749d4a2cdc9935881ccf15386e8e0ae7b18fbc15700c6fad34a465d3d47cffd33f3b8d70f3209a6fc2c8700a5e0dfa1fc127882619ff9dbda6f044bb878a6e5a247e3460fc728a4dda82df8a60e49b8d17b2d57e336c4fac823cd599d4259acbe297a052ffa8ff38ff3dda63047c122503c93aed9b37f145a95833707d19c6d56f3944db49a3780b23aea28ce424100fc036bedc1c4f95420f4bba06a17609155eb7939e39377fa7933ade0415e91ab3b26667f189f127aa6912a8f959bd594be83ef417f9947738c711d029e60e1ce5956cd91259e5b4af1ad7754aaf70048b9832ae02e93ffdf61f5237d4499be1c588eaa0c284844eead88135d027f89fa67aaec6d9630ee54dea10dc78c8c0a011b5e3b9d09dc3f9e7efc7a6f14f62f48279ac650fc45946ca669fba00820dcabbff0069dcae994b25dec8172275a03a1d251a2ff37b5b2ab02001bdd963a1cb7f865572ac6605063dcfc600072430b2150d45eb81bfa6700fdb8d4c261d593f24896bbdd321ec896ab6fe90e69a41b3d2f40217601c7162c0326529ecbe2e8edb66bcbc9a5b90fa92fa6ecd7aa0d724b9114f37872e2bf026600429cd4268a5ef469424775d32779dfda3dcc9a5736df65a26cd1e38a1ee1e53c8d6e37fa5deaa8a8bb8d7fc9a328c9a78cb6df12657e9d641abaa079a13bc2aaf245dbad079781412d3714b640060ce362135f514179f9990bb044df5254c6e00c15a92167d960d0e49f64a2dbe0c4129b0612a0295d3873b92f38b62a37b4372c03b2020c142ff7cf06d0817db8c2e700eeb87c8ae58529cfbb0a81e254529aafa6b97e1ad697a3a45babdecf151bce96547d63bec3f1dd1814f459b8d220ce5ff6f952f1764a4c95a5b8d2f53a5b3406121a21d2d7e5f17dcb0f3bc5c4b332708eff3946174f97d283060ba2e09b07720b1772d88b3599a1db80de6ddd514d9f92d5f3c643b6ce7ce6af37dd87362359efef3dc348887e7e7241f5c6b76dad806e145b79971c0941369562ae79877863954fd467b4ee4ce66017b74a5553a3d05b0920135181f951dc7f99cdd2208e5b6c6d3c4e6d72fa8b10ca8ca0c939bac3a371f10c8ca06008144f5749f8f5e16f91a17ec6166d40125428bc265851e1153966f46e72a3f614decd93f11be53b9bd6fac24ac5a75ad7edaad050efbde65445786698d3743f35e8034f708fec75e7a2263378727174013a8c9a33adc6198622d07774da123d6a21f123f827ceab3d64ed18ab291100ad81eb5d4faba446e40e42f6dd82d7ec8f38b4a3fe13a134b497e8f2db1868f2970a48c8a6b4f0b6e51845342ac0f08cb4784bd1323ad9b15e11e5e1251718157688e11648cb301af5cbb583200bdf445ba0811a9c722746bbea022f88a8d74d7f530dab9ea1afda173f8828b21e10ba069c29176079fc407b7a587b6bb4668561d4bf2eac23d2732b2f82e79b32d6c531f0e3f1f6709377875dfab8d0622f0d41fbae6e493f35835fa79c0f696ecf28cd921ddbd4e00feea7f44bcc730be6bea0b5586ecfc3b6d77167840259cc06c481fc93ead66dc31009a3a6c9e0927c7fff7ab755a4377fe88b80d38e1cd953561365dd587b07b0511fa8d309d4ad4dcb6ca2d81b6bac6efaaeff76e92cdb10d0077e1369160282a5259c8acddc52bc97a799ba970850be40eb7e15f3c972bc0d4e42e907edc273870b627c03f82c9e08a1b8d1f4a3630929a84774d7676f63adbb3f6bd64093ff462d0ffd985b060d4d0f6aec46df4fa497d5ab135846d830a9d0755ea09c29a911e52ea250b3e7a7c285976a96f4b1c79bd3517e2ecf2282d36c110c9cb5e2573c530a6d462013b1453783f6bab9541e23e59bb9744fec6b7043d75e4ce7c0a7a9289f7bf3c447bba588d55968213883d039a1146f2e04f5489b205f1640f0521233dea3c27fdcb691d54c7944a4102896c38b94b346810274944ed2015e9a18ef8a3cff99a48a2975ba4c21f3b0dcf8d58a76ad417c789362aa2a36d93750d80ac1a9b1b1aec425f8bdb25e7448d3f8e6faae0323a14091e27faad92b26e4c695f301b18e764af6cd47dadd2cb5a3dc09b9ebd9e0de1a5a082aa2ecca2c720e369e95601", &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)="fa69cab81f4eae3547ff6cb1b22f29c85b40ed") 23:38:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0xc0189436, &(0x7f0000000040)=""/9) 23:38:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 882.033408][ T5162] device lo entered promiscuous mode [ 882.108812][ T26] audit: type=1800 audit(1550446696.110:68): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17793 res=0 [ 882.137743][ T5200] EXT4-fs: 6 callbacks suppressed [ 882.137751][ T5200] EXT4-fs (sda1): Cannot specify journal on remount [ 882.153261][ T5206] device lo left promiscuous mode [ 882.289290][ T26] audit: type=1804 audit(1550446696.140:69): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir820306194/syzkaller.RrsNEe/1193/file0" dev="sda1" ino=17793 res=1 23:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x17, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 882.573068][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 882.579422][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000010001400000058c9ce34c4a19f32dd2b1d21e88ea70000000000000000000000000000000000000000000000000000000000628912b3e98804aaeab75bae722eb722faf0134208a4a0c998cf7f5076ba1d35ec4ff9b063ccb910ac0aaf61d1a2a4b94471ae8f1c97122a83b2335644a639e108eeb2ac3b3306c83ee9505afaa9de20d9ebb8b1b98260ca340ce6d1cb700d1c15ca855e9fee048f2c365b78da09df50c93ac1b55b271468fc581e5070c167bf4fc69d27b003ac2ce72cdcd5fc5e0cbd2879c3838adf53967ebd1c28d11a792b9a8f359293b959a786d387af37fee5b830b7105f3d3febe4c73f0f91592d72843ef41b560f83e4b6bc4babd6e5b1752aa46d416449406068d90851f46c1922062e540c00000000000000000000000000000000"], 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r2, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) [ 883.016607][ T5220] EXT4-fs (sda1): Cannot specify journal on remount [ 883.038506][ T5207] device lo entered promiscuous mode 23:38:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 883.068669][ T26] audit: type=1804 audit(1550446697.070:70): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir820306194/syzkaller.RrsNEe/1193/file0" dev="sda1" ino=17793 res=1 [ 883.093527][ T5217] device lo left promiscuous mode 23:38:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0xc020660b, &(0x7f0000000040)=""/9) 23:38:17 executing program 1: ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044943, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) sendmmsg$unix(r2, &(0x7f0000000dc0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000100)={0x3ff, 0x0, 'client0\x00', 0x0, "52754778b54d4f21", "7a09d2f72446d7f0a4122d80f2ae0771d0403d1d9a2dfa691d1a6e0caf9cbaac", 0x0, 0x4}) [ 883.396376][ T5232] EXT4-fs (sda1): Cannot specify journal on remount [ 883.477897][ T5240] syz-executor.2 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=0, oom_score_adj=1000 23:38:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 883.530644][ T5240] CPU: 1 PID: 5240 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 883.532784][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 883.539696][ T5240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.539702][ T5240] Call Trace: [ 883.539722][ T5240] dump_stack+0x172/0x1f0 [ 883.539741][ T5240] dump_header+0x10f/0xba6 [ 883.567453][ T5240] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 883.573271][ T5240] ? ___ratelimit+0x60/0x595 [ 883.577869][ T5240] ? do_raw_spin_unlock+0x57/0x270 [ 883.583017][ T5240] oom_kill_process.cold+0x10/0x15 [ 883.588132][ T5240] out_of_memory+0x79a/0x1280 [ 883.592813][ T5240] ? lock_downgrade+0x880/0x880 [ 883.597662][ T5240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.603897][ T5240] ? oom_killer_disable+0x280/0x280 [ 883.609084][ T5240] ? find_held_lock+0x35/0x130 [ 883.613961][ T5240] mem_cgroup_out_of_memory+0x1ca/0x230 [ 883.619497][ T5240] ? memcg_event_wake+0x230/0x230 [ 883.624523][ T5240] ? do_raw_spin_unlock+0x57/0x270 [ 883.629633][ T5240] ? _raw_spin_unlock+0x2d/0x50 [ 883.634482][ T5240] try_charge+0x118d/0x1790 [ 883.638987][ T5240] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 883.645736][ T5240] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 883.651282][ T5240] ? find_held_lock+0x35/0x130 [ 883.656054][ T5240] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 883.661610][ T5240] __memcg_kmem_charge_memcg+0x7c/0x130 [ 883.667154][ T5240] ? memcg_kmem_put_cache+0xb0/0xb0 [ 883.672350][ T5240] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 883.677897][ T5240] __memcg_kmem_charge+0x136/0x300 [ 883.683013][ T5240] __alloc_pages_nodemask+0x437/0x7e0 [ 883.688398][ T5240] ? kasan_kmalloc+0x9/0x10 [ 883.692909][ T5240] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 883.698649][ T5240] ? __alloc_skb+0x3cd/0x5e0 [ 883.703240][ T5240] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 883.709479][ T5240] alloc_pages_current+0x107/0x210 [ 883.714596][ T5240] alloc_skb_with_frags+0x1a5/0x580 [ 883.719795][ T5240] ? debug_smp_processor_id+0x3c/0x280 [ 883.725256][ T5240] sock_alloc_send_pskb+0x72d/0x8a0 [ 883.730466][ T5240] ? sock_wmalloc+0x120/0x120 [ 883.735146][ T5240] ? lock_downgrade+0x880/0x880 [ 883.739996][ T5240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.746266][ T5240] ? kasan_check_read+0x11/0x20 [ 883.751129][ T5240] unix_stream_sendmsg+0x5f7/0x990 [ 883.756259][ T5240] ? unix_bind+0xac0/0xac0 [ 883.760677][ T5240] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 883.766227][ T5240] ? apparmor_socket_sendmsg+0x2a/0x30 [ 883.771689][ T5240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.777936][ T5240] ? security_socket_sendmsg+0x93/0xc0 [ 883.783425][ T5240] ? unix_bind+0xac0/0xac0 [ 883.787845][ T5240] sock_sendmsg+0xdd/0x130 [ 883.792268][ T5240] sock_write_iter+0x27c/0x3e0 [ 883.797040][ T5240] ? sock_sendmsg+0x130/0x130 [ 883.801725][ T5240] ? aa_path_link+0x460/0x460 [ 883.806403][ T5240] ? find_held_lock+0x35/0x130 [ 883.811167][ T5240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 883.817409][ T5240] ? iov_iter_init+0xea/0x220 [ 883.822088][ T5240] new_sync_write+0x4c7/0x760 [ 883.826768][ T5240] ? default_llseek+0x2e0/0x2e0 [ 883.831626][ T5240] ? common_file_perm+0x238/0x720 [ 883.836641][ T5240] ? __fget+0x381/0x550 [ 883.840794][ T5240] ? apparmor_file_permission+0x25/0x30 [ 883.846530][ T5240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.852792][ T5240] ? security_file_permission+0x94/0x380 [ 883.858431][ T5240] __vfs_write+0xe4/0x110 [ 883.862784][ T5240] vfs_write+0x20c/0x580 [ 883.867038][ T5240] ksys_write+0xea/0x1f0 [ 883.871292][ T5240] ? __ia32_sys_read+0xb0/0xb0 [ 883.876051][ T5240] ? do_syscall_64+0x26/0x610 [ 883.880753][ T5240] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 883.886813][ T5240] ? do_syscall_64+0x26/0x610 [ 883.891495][ T5240] __x64_sys_write+0x73/0xb0 [ 883.896084][ T5240] do_syscall_64+0x103/0x610 [ 883.900670][ T5240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 883.906550][ T5240] RIP: 0033:0x457e29 [ 883.910445][ T5240] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 883.930057][ T5240] RSP: 002b:00007f661b965c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 883.938465][ T5240] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 883.946445][ T5240] RDX: 000000007fffffff RSI: 00000000200000c0 RDI: 0000000000000007 [ 883.954415][ T5240] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 883.962385][ T5240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f661b9666d4 [ 883.970352][ T5240] R13: 00000000004c71f6 R14: 00000000004dccd0 R15: 00000000ffffffff [ 883.979082][ T5218] device lo entered promiscuous mode 23:38:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x18\x00', 0x101}) 23:38:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x2000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x2, 0x103, 0x0, {0x8001, 0x1, 0x0, 0x8001}}) ioctl$KVM_ENABLE_CAP(r2, 0x4020ae46, &(0x7f0000000440)={0x0, 0x0, [0x20, 0x42, 0x4, 0x5]}) [ 884.005464][ T5240] memory: usage 307120kB, limit 307200kB, failcnt 2000 [ 884.012536][ T5240] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 884.020094][ T5240] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 884.027655][ T5240] Memory cgroup stats for /syz2: cache:1660KB rss:232908KB rss_huge:200704KB shmem:1660KB mapped_file:1584KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1648KB active_anon:232904KB inactive_file:0KB active_file:0KB unevictable:0KB [ 884.053721][ T5240] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=4864,uid=0 [ 884.093113][ T5245] EXT4-fs (sda1): Cannot specify journal on remount [ 884.099741][ T5244] device lo left promiscuous mode 23:38:18 executing program 1: geteuid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local={0xa901}, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) 23:38:18 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfa, 0x4140) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000180)={0x0, @ctrl={0x0, 0x0, @value64}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000003c0), &(0x7f0000000380)=0x4) r2 = geteuid() getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) chown(&(0x7f0000000240)='./file0\x00', r2, r4) r6 = socket$isdn(0x22, 0x3, 0x23) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") lseek(r6, 0x0, 0x2) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000300)) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) setgroups(0x5, &(0x7f0000000400)=[r5, r3, r4, r3, r3]) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000040)=""/9) [ 884.128028][ T5240] Memory cgroup out of memory: Killed process 4864 (syz-executor.2) total-vm:72580kB, anon-rss:2208kB, file-rss:35800kB, shmem-rss:0kB [ 884.177814][ T5251] EXT4-fs (sda1): Cannot specify journal on remount [ 884.198811][ T1044] oom_reaper: reaped process 4864 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 23:38:18 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff84) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f00000000c0)={0x0, 0xf, 0x13, "8dbd761db20bdf475266d0012c02f0c8e1f93b6b4f759d9ebdbf89134b03be6ebdbcc19a7098ba7476b0db6b8c654ba207872573ddfac1666c615c89", 0x1a, "6dcf2ad98a13f4212ba5e1007fcede6b8b0b128ce6bf1fd1c694958e4f79d11f3f3848ee5ce27e6838cafc1b465e8ddadef1b0bb9d238dc2c9438d33", 0x10}) ioctl$SG_GET_NUM_WAITING(r0, 0x2286, &(0x7f0000000000)) 23:38:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:18 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x80000000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_emit_ethernet(0x300620, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaff000000000086dd60b409000438000000000000000000000000ffffe00000020502000000000000000000000000d17edd3f3c1e0766040060b680fa0000000000000000000000000000ffffffffffac14ffbb00000000000000000000000000"], 0x0) 23:38:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x1e, 0x1, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xc400, 0x0) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f00000000c0)=0x8000) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r4, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) [ 884.403626][ T5264] EXT4-fs (sda1): Cannot specify journal on remount 23:38:18 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x3, 0x0) io_destroy(0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) add_key$user(0x0, &(0x7f00000002c0), &(0x7f0000000180)='}', 0x1, 0xfffffffffffffffb) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x11, 0x0, 0x403000}]}) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 23:38:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, 0x0, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 884.522259][ T5275] EXT4-fs (sda1): Cannot specify journal on remount 23:38:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 884.730466][ T5286] EXT4-fs (sda1): Cannot specify journal on remount [ 884.829353][ T5292] EXT4-fs (sda1): Cannot specify journal on remount [ 884.867551][ T5249] device lo entered promiscuous mode [ 884.895760][ T5244] device lo left promiscuous mode [ 885.325690][ T5249] device lo entered promiscuous mode 23:38:19 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00 \x00', 0x101}) 23:38:19 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)="095082b14020b317ad09483f270c14f729b9a4a2f987083e53540d6e42f7bf1942a57cc64ba30b1c5bd9e85a2ec42f59281663476ef8eb44b9f45bd90e67f380359b15feada886f07c58a80cce2fcfe0f053b183bfbe39fad9dd99aa0e15be515304b285d25384bdc2fac19b8ff742a20acaa7ab450bb8f3e613838878a95635ea") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000080)={0x0, 0x1f, 0xac7, &(0x7f0000000040)=0x3}) 23:38:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001240)="2e0000002a00810600000000000000cf0c00b0eba0b4d65cdbaa18b29c473da67e3d743298cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x8, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 23:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x60, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x7f, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000180)="28a277668dd8fc0fa068f12c6e7d252a6ce1e91f039e4acee94055619d230a2a5adaaf78cbcb39aa0d89de427fe81d0fdbb5c8f2a6dce3cbc716bd8a79e2848c18c6a49fe8c59d25c0513ff31b98a0dd4fd886ddc8da647475767eada8d7f4f7912c148341ab1ce72e5bf4b8dd75f0256230ea1a763df293bb8f37f3152632f1f10cd88372bad867486c27116c57b9b2f543b4f552ac4e7f711517f62f65afab2df6e5cbf1ab1358fa7a36aba2cb9596d62854eb20a48f276a74f88d1585b2322cd756a5e7ccb6651ac3003df561") ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$rds(0x15, 0x5, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000100)=0x8001, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) 23:38:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, 0x0, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 885.434990][ T5299] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 885.460344][ T5297] EXT4-fs (sda1): Cannot specify journal on remount [ 885.467357][ T5304] device lo left promiscuous mode 23:38:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ceph(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)='./file0\x00', 0x3f, 0x8, &(0x7f0000001600)=[{&(0x7f0000000240)="387a50558d8a6014b7e54dc71dab53cff810ad709b4eeea8940c9ffd6f60291a", 0x20, 0x100000000}, {&(0x7f0000000300)="53647025695cda078dbde64103efd1e9f5e28d6fc2ac5c9e6671638e9e058b61a9dec5adffde9f4a8f6f02fb70f1427d4b0e0d9f4d66005ecc651744ff7f2fa4c27e0fedc34c5ebd10423a9fa5858ed60f239bb3abf4cfc03b7b0a52026c567c5b0b12400384bc7ad100847bec418a1f28cab1e4d4c7a1f8ecd53c2c84bac6d7787b3992e432b8d467dde48f2db71873e262b135b8753572daf0ddc197b5216598d8f605cc630e5811efb277eb76474a8e3dce4acddbe53fe8ed00", 0xbb, 0x9b64}, {&(0x7f00000003c0)="39529bcebb41e364f86564ae78df9de0993a488055b2bedc6b447b417472f4a9808b9dae1ce598f4259b4574208fe7297a65357da469017f228550f580ab77ec5ac26a3734113b7d4c8dfb27943bcdeb662b8a3efe07f51b9dda3235099a84b9d61643096aeb97dc58df6f1721bd6d182044c755baa5068c4d1b65a63cd2cea78e17c214d3102f433824009b8d77e04481f9d20ef0e3269601e77e1bf2cb838ce523", 0xa2, 0x3}, {&(0x7f0000000480)="3316061928fe55d7c02d57d3d800aa0484e1c359a92777d26b9f981a47e578a0d95a01f4e3e81a1c88310bc104b2a369b25155909e8b7865f1a4ab29294adaa35c4dff5266", 0x45, 0x2}, {&(0x7f0000000500)="25229f1305e9e62cd6ccf40126e68521416454b97c22897ec871c7d14b3b0fb514cb7c686966decaca884cf2468bd597df85171d86a9e734f796835d36bd7ca34729461875dfd59ba1e015ab1bdf39a5bdc9f54229e4c1027f450bd4", 0x5c, 0xfffffffffffffff8}, {&(0x7f0000000580)="d3ec087c7ef816232e2ac89eb00cc100fa139de70b28a4f150679896f44cab", 0x1f, 0xda0}, {&(0x7f00000005c0)="f238f10994af2059bb62169dfbe9a3a38fc1e9c5c343ff8c8870c1f7d4bb4c0fb7b950f4d2f780f7c90c8bb478df2a4c", 0x30, 0x6}, {&(0x7f0000000600)="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", 0x1000, 0x3}], 0x20, &(0x7f00000016c0)='syz') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="ee0882272641a69d3441f4b83943f1a387503a6b2e12e874e7588a98047100791b52a8af11ad508d1689d258401b656cf383238eb3b531dff42a43ae244f448f2680512d82a1790428195ff4c3075e700dff9a93e85d5eba", 0x58, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000280)={0x200000000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="040000000000000034000000000000000100000000000000"]) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001700)={0x1, 0x5}, 0x8) 23:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x19b, &(0x7f0000000180)="0adc1f023c123f3188a07048c1e31a6e66f572f337da9a8dc772283b25365386cd") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000100)) r3 = fcntl$getown(r0, 0x9) ioctl$TIOCNOTTY(r2, 0x5422) write$cgroup_pid(r2, &(0x7f00000000c0)=r3, 0x12) ftruncate(r1, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ptrace$cont(0x18, r3, 0x81, 0x1) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000100)=""/9) 23:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(0xffffffffffffffff, r0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="d5dc1fee0d3f2188a060") r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) 23:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 886.031324][ T5310] device lo entered promiscuous mode [ 886.034076][ T5299] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 886.075439][ T5310] device lo left promiscuous mode 23:38:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe000000000000, 0x8000) ioctl$KVM_SET_CPUID(r1, 0x80045505, &(0x7f00000002c0)={0x0, 0x80805513}) [ 886.467287][ T5338] device lo entered promiscuous mode 23:38:20 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00?\x00', 0x101}) 23:38:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, 0x0) 23:38:20 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() fchown(r0, r1, r2) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000040)=""/9) 23:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x74, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, 0x0, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) unlink(0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000280), 0x7fc) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x802) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x1, 0x40000) fcntl$dupfd(r0, 0x406, r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000086010000000000000030"]) syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) sched_yield() dup(0xffffffffffffffff) preadv(r1, 0x0, 0x100000034, 0x10000000000000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:38:20 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x10000, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) [ 886.623511][ T5359] device lo left promiscuous mode [ 886.634255][ T5351] PKCS8: Unsupported PKCS#8 version 23:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xa041, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 886.733674][ C0] net_ratelimit: 17 callbacks suppressed [ 886.733713][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 886.745886][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 886.764319][ T5368] Dev loop0: unable to read RDB block 1 [ 886.775308][ T5368] loop0: unable to read partition table [ 886.786379][ T5368] loop0: partition table beyond EOD, truncated [ 886.796148][ T5368] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 23:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 886.884153][ T5368] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 886.936451][ T5351] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 887.016403][ T5368] Dev loop0: unable to read RDB block 1 [ 887.022933][ T5368] loop0: unable to read partition table [ 887.039237][ T5368] loop0: partition table beyond EOD, truncated [ 887.056143][ T5368] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 887.094701][ T5370] PKCS8: Unsupported PKCS#8 version 23:38:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='vboxndt1\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x200) creat(&(0x7f0000000140)='./file0\x00', 0x40100) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 887.166099][ T5370] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 887.187202][ T5384] EXT4-fs: 8 callbacks suppressed [ 887.187211][ T5384] EXT4-fs (sda1): Cannot specify journal on remount [ 887.233590][ T7491] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 23:38:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 887.289819][ T5365] device lo entered promiscuous mode [ 887.312468][ T5359] device lo left promiscuous mode 23:38:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) unlink(0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000280), 0x7fc) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x802) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x1, 0x40000) fcntl$dupfd(r0, 0x406, r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000086010000000000000030"]) syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) sched_yield() dup(0xffffffffffffffff) preadv(r1, 0x0, 0x100000034, 0x10000000000000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 887.350299][ T5387] NFS: bad mount option value specified: vboxndt1 [ 887.416207][ T5390] EXT4-fs (sda1): Cannot specify journal on remount [ 887.491059][ T5394] PKCS8: Unsupported PKCS#8 version [ 887.551161][ T5396] EXT4-fs (sda1): Cannot specify journal on remount [ 887.692762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 887.698596][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 887.704456][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 887.710205][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:21 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00@\x00', 0x101}) 23:38:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2c6c6f7765726462c7c5b477a6fac29a351c2869723d2e3a66696c6530"]) chdir(&(0x7f00000000c0)='./file0\x00') r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x23, 0x2000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000200)={0x7fffffff, 0x1, 0x5, 0x7, 0x2, 0x3}) open$dir(&(0x7f0000000540)='./file0\x00', 0x0, 0x100) 23:38:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 23:38:21 executing program 1: r0 = socket$kcm(0x10, 0x4000000003, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x10040, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)='{{\x00') sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00672de45ae087185082cf0124b0eba06ec4410b000000000000140000000000008d0051894dd65b2f", 0x2e}], 0x1}, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 23:38:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x500, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 887.786880][ T5365] device lo entered promiscuous mode [ 887.874556][ T5407] EXT4-fs (sda1): Cannot specify journal on remount [ 887.874661][ T5401] overlayfs: unrecognized mount option "lowerdbÇÅ´w¦úš5(ir=.:file0" or missing value [ 887.891823][ T5411] device lo left promiscuous mode [ 887.913775][ T5413] overlayfs: unrecognized mount option "lowerdbÇÅ´w¦úš5(ir=.:file0" or missing value 23:38:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 887.974418][ T5419] EXT4-fs (sda1): Cannot specify journal on remount 23:38:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)="05033c042d00003835d6bc78fa65da08902cf1d62c002ecfec6c7efa090cb99195ce019e30c85818a25089dabae2103f91b009b0f0ecd4b48580d5e0890b551945fac915f6f47e4bdd7ae3e0af0d9b11b8f51337e02c55de768a6102b0c0eb951a9d273608b0aeb232b263c415314fe8431f8c90323eab3b39a69f5235d13d7775e0194504dfd65183117e3feeef97fe693b4a96213bd9ed845bc18c2edf172800ae396a0b9d8e32215c27b2b5842f8ec1219d55e8c3cc0f8d3cf13f9636e57157806596a22740c972afa569c9597cc119e81ad65061165839aa0c", 0xdb, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r2, 0x3f, r3) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x3, 0x410040) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:38:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(0x0, r3, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) recvfrom$ax25(r4, &(0x7f0000000180)=""/44, 0x2c, 0x10000, &(0x7f00000001c0)={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, 0x0, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:38:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x600, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 888.092793][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 888.098683][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 888.104559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 888.110345][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 888.204018][ T5431] EXT4-fs (sda1): Cannot specify journal on remount [ 888.232952][ T5429] *** Guest State *** [ 888.242155][ T5429] CR0: actual=0x0000000000050032, shadow=0x0000000000050012, gh_mask=fffffffffffffff7 [ 888.260868][ T5429] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 888.271984][ T5429] CR3 = 0x0000000000000000 [ 888.282201][ T5429] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 888.290483][ T5429] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 888.304082][ T5429] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 888.312187][ T5429] CS: sel=0x3000, attr=0x08093, limit=0xffffffff, base=0x0000000000030000 [ 888.322890][ T5429] DS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 888.337491][ T5434] EXT4-fs (sda1): Cannot specify journal on remount [ 888.355568][ T5429] SS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 23:38:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 888.389328][ T5429] ES: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 888.406438][ T5429] FS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 888.455774][ T5429] GS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 888.480898][ T5416] device lo entered promiscuous mode [ 888.485201][ T5429] GDTR: limit=0x00000000, base=0x0000000000000000 23:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffffff, 0x200}, 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2001, 0x0) mq_timedreceive(r1, &(0x7f00000001c0)=""/4096, 0x1000, 0xef63, &(0x7f0000000080)={0x0, 0x989680}) [ 888.500148][ T5429] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 888.512030][ T5429] IDTR: limit=0x00000000, base=0x0000000000000000 [ 888.532840][ T5429] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 888.542747][ T5411] device lo left promiscuous mode [ 888.561781][ T5429] EFER = 0x0000000000006000 PAT = 0x0007040600070406 [ 888.576085][ T5437] EXT4-fs (sda1): Cannot specify journal on remount [ 888.592128][ T5429] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 888.629614][ T5429] Interruptibility = 00000008 ActivityState = 00000000 [ 888.648487][ T5429] *** Host State *** [ 888.659982][ T5429] RIP = 0xffffffff811b3af0 RSP = 0xffff88808dfcf8b8 [ 888.677231][ T5429] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 888.690721][ T5442] EXT4-fs (sda1): Cannot specify journal on remount [ 888.704672][ T5429] FSBase=00007f851c401700 GSBase=ffff8880ae800000 TRBase=fffffe0000033000 [ 888.726032][ T5429] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 888.742381][ T5429] CR0=0000000080050033 CR3=000000003f9da000 CR4=00000000001426f0 [ 888.762251][ T5429] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 888.780572][ T5429] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 888.797070][ T5429] *** Control State *** [ 888.807354][ T5429] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 888.827457][ T5429] EntryControls=0000d1ff ExitControls=002fefff [ 888.842983][ T5429] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 888.861435][ T5429] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 888.880685][ T5429] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 888.905942][ T5429] reason=80000021 qualification=0000000000000000 [ 888.921310][ T5429] IDTVectoring: info=00000000 errcode=00000000 [ 888.946296][ T5429] TSC Offset = 0xfffffe225102d2f9 [ 888.960717][ T5429] EPT pointer = 0x000000007eec601e [ 889.026085][ T5445] *** Guest State *** [ 889.030094][ T5445] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 889.045212][ T5416] device lo entered promiscuous mode [ 889.050562][ T5445] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 889.060427][ T5445] CR3 = 0x0000000000000000 [ 889.065169][ T5445] RSP = 0x0000000000000000 RIP = 0x0000000000008000 23:38:23 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00H\x00', 0x101}) 23:38:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x10c24, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000180)={0x0, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @multicast1}}}, 0x108) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/9) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x28, "a90e10c2c9fb140303ef670004ade1bc6707777c28d14a5cbe73dba657ae77f12ce09136c1e7008f"}, &(0x7f0000000300)=0x30) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000340)={r3, 0xaf, 0x86, "03e17410ec32bea01f84392aba05544e94db89514cea0b3b4f33e9523afacd7ff58143be8440dd4c79bc0d91d4f06c83d17adb2d9ebf81d069aaa20c4f19b9f3cb27ef9a1831b2b43fbba7e8fd347d12584833efd6ef3c3e6b4f8b5adb4140179a0587127c3011f53436459b173bdb52c8c12dbfa885ec1c0149403b08e4a9fc7744d446db0d"}, 0x8e) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x100) sendto$llc(r4, &(0x7f0000000040)="b3233c2b1dd28803f764f95ca631c6ca891f7ae63725feb1978fe424cd704260ca3d381a3eae119b3deed8085edaa0cf0223232133a76d", 0x37, 0x4, 0x0, 0x0) 23:38:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x900, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 889.072285][ T5445] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 889.089547][ T5445] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 889.106661][ T5445] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 23:38:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1040008912, &(0x7f00000001c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070000000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x2, 0x0, &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb0, 0xb0, 0xe8, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1f0) [ 889.153138][ T5445] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.161880][ T5445] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.174692][ T5449] EXT4-fs (sda1): Cannot specify journal on remount [ 889.199062][ T5456] device lo left promiscuous mode [ 889.207326][ T5457] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 889.217248][ T5445] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.246172][ T5445] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.278599][ T5457] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 889.290818][ T5445] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.305069][ T5466] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 889.313868][ T5445] GDTR: limit=0x00000000, base=0x0000000000000000 23:38:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf21, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 889.347029][ T5467] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 889.356571][ T5445] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.356586][ T5445] IDTR: limit=0x00000000, base=0x0000000000000000 [ 889.356604][ T5445] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 889.356619][ T5445] EFER = 0x0000000000006500 PAT = 0x0007040600070406 23:38:23 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x12800, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0xfffffffffffff001) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="5967279d868d3c1a80884030334d2f9c", 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000080)={0x9, 0x0, 0x2c39ec37, 0x2, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x3}) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x5, 0x8000) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/55) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0x81785501, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000001c0)={0x0, @aes128, 0x0, "a6fd836dea3d6301"}) fcntl$notify(r2, 0x402, 0x7) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)="f0e402244b9ff40bfc31679e8ab51d2fdc04aef2efe48d5c82a2c89b65d4eb057cdf89c473768a627056b4d800dcfce41f25b53a168ef5240ff229aa5091a9d7c85cbcb25bdc1f5b5f694a0e86c66f57d29e00736ba96bc3004d7a4584a011f6d8621e303c850046d2103d14fe487e3fe6389539b3a822ee439f645c866f5fb19e538d117122661407b0c1097dc203ca12734d863b78b7445d5ffe39b26854e7130da0d8b43cf67d43dd00eac2efb591a57cd4dedf847a3e73257a58af4fb918f390156b9b484497f30d2fc1b259fcd61bec882532b7", 0xd6}, {&(0x7f0000000300)="3f1d5191fb056a6cafb34b68ce39c2448f22f635cbb3ecc70f437ded21ed8959ba34d62b74a8e6e1075018dc899c93184287ac24a4cf8d7640237fc1b7993237d9ae110e510a59ae5994cb6119c46e75eeaf9bc577fa18b1c57de0feca43ce0a79fcefe5c1955ba241dd2001b57468cf94e35ba65bb0fc2f1a959f28d59b91b89b0d4f", 0x83}, {&(0x7f00000003c0)="12b4f72b240417a957ba71a8b006f0cebcf31b9e15242b33b02c500290dbeea22c7700584602c02f0dc5d9efd3608127166c308d79c752ead186661ec51c3b1c2c2fc150e03863e23fb217d5e42041c24f84a5d9d7fee4129e41670ce43c9918575e48f000c3971145e8ec82a39f538feae91d08ea132b7c94d7caeae7b93bd8b35d8e236de5fd055d98d99b74524e51ecc3d3d651d2f50b5442ccd0522982fb507bbc8ab4a782699821bc1e9c43bb42ecf8591da8e5bc1631d072f29c20e6c906b049e3987ea582e22c8d8487a461d6", 0xd0}, {&(0x7f00000004c0)="0209703afa6e22f0b1a53da09ea7be533f1662196ab21ab0777f5ccffff85cc36746fe7ae16fd7ee75fc03b432a0e0313ee03e1ce098c320399804afe9ad1762e91b0892742bf9820d0d85f2f64b9c7cdf118caf8da307e028026cd8d2c2512c3b6fd5f8e53effee8440640a58f07229e2e956e7ae4a3ad075a48c8b92eeca2f34bb8aa326e38c2c5c598432389bb2a2d5165dff2be5ae7f7b0b2dbbd8ff8ff482a4a9e68554e44c480912ff052e3e772e790c7a40834499d467aabc06eb27ab145ee59d4163bc97134ddca73665fa64ac8b8ec9734f3143b79242de", 0xdc}, {&(0x7f00000005c0)="509b6a3922c1ddbe9b14ceecfdd4367d0dc5b9f02954093e0033a5f51dbde5f2386e1550d15d062249de1582a9cb426cb3286ad8a9fc3efe44e6e671f18d66b601d12c384fa2c46d4f87a3f305b5e000addc43cf9b0dfab25f9b9aa0d342a9e004b0ff98d74f1872723148e90f089806ab2e4b34cd00ea19a91ed2857f0aa711195cdddbcf7d981d03d00dc3023475032e4d3c254960b4d3e34a2a9c1406870a08c80bbef17866e54820065f5d9d47e6f55439d333fae15535dd624a53ee2bb650b8fa4190b05735b01057f9", 0xcc}], 0x5) [ 889.520515][ T5445] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 889.588108][ T5445] Interruptibility = 00000008 ActivityState = 00000000 [ 889.621694][ T5445] *** Host State *** [ 889.636318][ T5445] RIP = 0xffffffff811b3af0 RSP = 0xffff8880887b78b8 [ 889.659678][ T5445] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 889.672829][ T5445] FSBase=00007f851c3bf700 GSBase=ffff8880ae800000 TRBase=fffffe0000033000 [ 889.688169][ T5445] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 889.710685][ T5445] CR0=0000000080050033 CR3=000000003f9da000 CR4=00000000001426f0 [ 889.740245][ T5445] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 889.769160][ T5445] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 889.778056][ T5461] device lo entered promiscuous mode [ 889.795032][ T5445] *** Control State *** [ 889.802181][ T5456] device lo left promiscuous mode [ 889.807760][ T5445] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 889.822964][ T5445] EntryControls=0000d3ff ExitControls=002fefff [ 889.829247][ T5445] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 889.847084][ T5445] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 889.864120][ T5445] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 889.879771][ T5445] reason=80000021 qualification=0000000000000000 [ 889.895172][ T5445] IDTVectoring: info=00000000 errcode=00000000 [ 889.908365][ T5445] TSC Offset = 0xfffffe225102d2f9 [ 889.919370][ T5445] EPT pointer = 0x000000007eec601e 23:38:23 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000004, 0x0, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0xa0000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x5, 0x80000000}, &(0x7f0000000100)=0x8) 23:38:23 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32]]], 0x8) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000002c0)={0x0, &(0x7f0000000100)}) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000340)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x608a4e2d, 0x9, 0x6, 0x5b41, 0xab, 0x2}}, 0x8) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000640)={r0, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400000, 0x0) 23:38:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1700, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:24 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000590000002700000000080000950000003af7891b"], &(0x7f0000000240)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000440)=""/153, 0x0, 0x2, [], r0, 0x2}, 0x48) [ 890.332513][ T5461] device lo entered promiscuous mode 23:38:24 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00L\x00', 0x101}) 23:38:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pread64(r0, &(0x7f0000000100)=""/196, 0xc4, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1, 0x6}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) 23:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1f00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:24 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000480)='T\x16\f\xf8\x9a7>\xe4', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) bind$bt_hci(r0, &(0x7f0000000200)={0x1f, r2, 0x3}, 0xc) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x13, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x8, 0x4) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) open$dir(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xdd) 23:38:24 executing program 5: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="c04a573c581b541bc59eb6cfacdc96e50b76f76ca36d6ba35fbffbb47e", 0x1d, 0xcfcf}, {&(0x7f0000000180)="1a5ac97c18400d79fd1391363edcddec5bc6390f9b7e2f772b613b55fa4ca5fc037f602d755b6e53575f3ce852c862d53b74d517ca95f75a61d9a78e59ff6a9134df93835fd010aec3a3289c4b219488ddf607c91cc865428bf49ad85322f6ac291d59ba5758cfb87dc8ff71a2aed6b823155c17f746d99b17e1e6a543a10c02e94921935546a5f095da26d9014f54333d37f39ff2b6723757484aa51c44db574f005b188d34d8461ca0df974f1feeffe30df69de4e15e107bbb0d48466d138670cc9b8fad7f", 0xc6, 0x3}, {&(0x7f0000000280)="34309bd850a3410ff2389229365c1983253e97d1ab09a445c6eb2227166e1b24ff0c064aef65a2075f00d31029487f6f9bd2650005f0c17f08b4ce16ebbd08b64a1851eae7cb0bdce27e45943cc1a2d27ccab6f5baa0dadf9da153985e09a9f6e35ee0eebdfaeddb174859ba91c4ff18bc80827dba212cf38569751f62ad59aa9c07461bc2083d927093d9a9d8a72b8cb3219836bfb26fd194458e13d551584b2ec94d5ba10f869be98e91a07d58fbc4eaad584ea5a90d9dfa274dab0313a5466226462da34f76e1ea212f41e2c4311551833e867832c01ee837b5f6db8828f19601e8e923f0c89c5eafb374ba606068b8c9900b3327af90af094dab94edc0fc8629bb6e6e0018a106c7808777ccbc78cc83bbf5b392e459a9f7bfa5a5666d0fb85c8433e8e6e5f70e8719e1d09c5b3725484c4253d30e9f7ea4d419eb3607db2618b7353c362cde63d6ce121219d785b3bf211aef644ae84e65b291e65a9c094d3143f000c83b6544ba629df09b61c54aff247fa48ca7ca71fc54cfb1fe686d845fdf41796f9fc046b51d0d2a6760e3176221a0e53e217e9fe990ec3a0fe508699f7d5f70ce4dee010b70f04f2a4ca5f12bcccdbbcf84e1093ce6f0dc66aac327bfe8cd23bd74a29555892752926ca4b0f45a26c127af47f198e5d3697e1053a9d960348d414f89842ac2aa91b3db4ae7432b0642de47206b172c7c742c030f3e71eda6684a1ef5694b202e923a3061098812059001565f47f75d5bae50ce0ccdffc1f3e953859acbe14f07ef4b83b1eb0fab848e01731acf55a4bac167eb7a25252c5a38f0b7f0fe8f209027347d75efad8984d0cce4ac2afa77ab934c7a0bb64f9772be31733c21e18ee9ed00dec148e402eefaa50e025066e1780c0bbf61d1514913e5479407cb440d7d18316e043fe960e5313beea77415cb08cb331eabfb694d096cf01b04fde57eccaddde162d31f9437004aaeea9054a4cffaf9202f04d11989c7a9aa9c2a63f677b5db7e6643aa3da3ee4fb0f90c0b74ecd4ac3c08abf60f1d2efeba1fdaca42be7a950bc374421020e6fd12e3ce133e97fce9ff0913359ecd15c87930aefcb7aad46ff1edbc97bf934f75e8181db7f62441378092884fb5b65406e2418177393f1fdf651f900b853926aa716dd181d82a90183c19b3d3f8ce75569dd2c983c95f1a22d0a344b6305f81e78167f94b3bb57ee730039eab1bf785e96eea73ab82ef7750c5478f71454b05a28a1d34e186344f5a10961ecc18ebd5e09c1d8a6948b2146843e5aa1e939ce6f3e612aca05df9b4200c951df71e9d1b5e19517e4327de21a2b8d26b1d833d6db6d9696aaf7765274ae62e94161094003cb0f2a5f2f1946a5cbe6b2f2851bd166f741c997f33a8761e4902c623ebb6128e10f7ae29189f54358f536bcd97f55b507d5a096bb67ccd609e7462f2a180ef34eb13ef3f038dc2488ff035e002599c9aaa836d94ed94117f3219aca564e250c3187d6da7de49b7aedb3087e37576de034ed4da674ba3be30320ff9f13f137b7634f697932b69de6b63245cdeda3badbc7709eaf6ff3d8b1d310e14325c98a99fddebb21a7acdefae49398bb1b0abf9dc49b6e2d1063040465c924750652e9e8b3d56ff83e8767fd30cfba5c951a7ed48fa6c722e240919ffe2690ad679cc8d9de3e4a2cc31852d3196fc42a67bef69ff0b444cf6eebb2a9cae6e220390416ee1f3fa4bf9986566060c2e1397050b390f3e0059876bfea02abd90bc783b3605aa764060a7fc4cd9e42289ec26081df10035840c7a31e3d273e18bbdb9d703e576547a3f8738645aaec37194f629a2cb9d1f7b67930efd86e27893c24e69ca034736d5e6630ca3708fe676c3e948523201bd2488e293b3f6f3b687269600a4759823289e1c25c538c9f4a751091126118d590209d52b2853de757759faabef0426ed2506a1a1d4ad7d0beda5d3c5ac0d91b8faa2a83fbc056f41d189416805b2dc1dcb2d1b102610a565ed9dcd8a8cd910f80ed7d7ae798fbcecbfcf9e98c6fe8b1bc4f03c8d3e2beaa327203a35fbb30f04dd30dd81af6c5e3535a85d9e01d9d7ea7eefcee5660bf0e33de0674e96e4f9fe28dbd22de8c0769c2afb2b82daebd62cc86aa1397f66e40f67af4f15212aebbc23e1bea0b16ce6793f800bc4247c0b51b4c8345853868a454ca941f644babee0be2ab7ed60ae41dd5788a48b2ade7b90c46e59287859454ea7bb140c7f397863d0541a0b82c1b992ac99afa05be042f96b4da181e7e885472255bd8b5bf4f2f22c945599f226d63d579af38a005afca149410d63ed70e2ceaa575c544789aeaa5abaf436b253df96b7920ab61670260f25a181f2f66ae0a0c8b4feb8470900b0f73378becf5743b55fdedde105020d0690a203408de4f2e0499ea9d94582759405bbf079195c5cf8b85a7cd3df9a90fab6f8aaab715eb597c0e7580998dd238dcc4ff6ff25ad68822a8d4696ed21214ffeacc449adbbcd7142f34cd27023e6429ef78eab537f494d1a3e281ba3bf0ecf5fef1243cde303e3bbe5fcfa2d23874f9eaab7f083ef34f9685039826526adb92bb7c31c5366ba6ff0ee8dafc5391c7be94bd958c9a217d60a20f74a1129b0b8c4775166e566e3427fd3a1cd915b16c706e67f85535aca1104db2cc171d2486d32b4ccb9f3a1e948d24ec395559d797809dc4f0aead0e97591f9c026578fbf8491bec697a64239555aa1da5de8182d4a98083434e8e92168c65fb5a22ddf2c284f13583ef7984beb0668ef04f2925c101066ce2b936b59693a444998dd6c709a9aa75cc4269667499e8c2029e171538b9c5f3767b0e19f8720024f5ebb74faefbbe7601d0fcb125520f718d26ffe1a3026d55a3dd869a88c41e08b12d1fb3faa32da84cdd73d22716d557323cfb2c4ebff3c71c2b02c18388b1984fdd4050e063f6c901efc74d272d9cf9fcf675e25d594fee5abdcc902e46a1c71689b9b65e5e68b8558beadb27e855a351974fde6d399831703d3cbdf22c38a97c54a9cadcb903b3fd20cdea017ba45d2717c30b30797e9a12c68347e41d077d9ee73d02d3ee66305c8642f1e9031a5064060cff38fd9abca48585fd5e6ef0a41363e2b12999839891c1d6e3144bd84eb119720d259bca4ac4b65ced6a385faf3f05eef34a5511dc9bc9c753a04c1969891218c16cb558ede0e17062d1fdca94236990780782c1d512dd29181683c1fba9667bb25f22234a52f7453807134fdd81dd47d04aad32a15e822cb4af12beabad095468f456522549d2a3336dbcbea2853be60ac7be3aae8e32065c3d91fe4221cdbf793da56356cb5cb64f6fd0020658cf189ae238159479267aa3b45d7b7efe18b81de04dc7537d8d807faccbcad76d9d882cc45c3acc7e5e6d6ae9b08c084c5e9d2ec4b75472bc3c140d80867f4c8379729e9dfbf5a06f49222a46f2f5d279f27904c178abfbbce6b7b0629b029f0176a1188b7072a12afaf3ca254ba90d7d39154f3187f17bfdd77e77f3620e9465de4e08d050d895ea0ed4e16a8f1498f498ed8673d82a128b48c86ebcbfd81bcf020e110a88a1b268451515c87c1b7062b4fc651188161523a17f4f947c7f1c2e77694e475067a729dc8c03e87da2301cbb0308d1510a256a8537c3484357482973d06e12aedc2e77b33927dd567eb130ac411eb49da1a1298c4c0ece4db6f42de91d5e64ec2b7527b81ddba16f518f2d58a0bb9d4f8dc961ffc0f367c2563c9c0dccb2c11df61430e16fa78672130d1468b9c6ecc82356e7711fe0f39b48cbd58caf7d82bb80665283794b2b2d806c43096bcff7edda405e3be95070f8ca0c6c23a8d7533a30f18797b1dfa8b84e642641450e5213a1e2de57a8e5e65de525622703f208354bfe9cbbc18ff3a7bf35ac28d97e724eeaeb5c6d56c8fe620cb37031abc164ea0876a8ce4ab161d7104c21cc01371e95454647ee426384b9202ed4457615fe9520a7d6fa84838b6ccb302590849eda119b2c6d76b9e63c381ce1360bae4d6df32da5ef21e8e80f51ace05a42354d136b8cbd1ff8261b15a7eaa21ad11458a17672c48e429452828049606aa9ab6c8088368e7c7ce024fee14cd35c6528fb68dff0ec4b8ea47016267e0335f076b10923434fe6d414cd644524a8490a6381852766a188fddd5d82e1dd7a999505dd22f6124bb308c2e92b2d23e93b5b944df81d724376d8dfadadec67c825244199252a9dae8f08176e9b739fbbf1be7e196a8ce010414bb2929672563173ff45c8b96ca8082ab0c9421662e442af2eb7776a77ef5a348e979dbbf44476a5f9366d3a10e5b55d508ead5c746611b2c2e48cb7814660413ba867af2dc69d67f994a7adf0112e8f557287e59a01210e63a954efa2b7853b3268147550c1117a239222258805a8eeb7809597e77d7be268534fc5b51de4f2250dee9721184d57173635e0b78b9665fd9228df01ac67e7d3e7f2bce83f505af870c8a2a121699e5f7dfa4c62f55b618341fcb36d6e9777165e896fd541baf32ffbf213d2f655449a29282f26c8903dd50cabab49e60b53a6f37ac94e6b3a03d0e474587cac4131ec17319d85e6e44347cc4770042903d5e1d702a71b3ece8feebfade0be80b414bb856ad19de3d791513cb62ddf4e3bbe237cd87449c30a8b940bf47f96df275c1afebf5544b84d862ddf08968600a0aa5ec099a76b026d5d0f202755aad89c6307d136a0696424b7fa119eb5844338c46bfb9cece9eebdda40e5662fa4cfbd49d7e22b93da9e03e281fb66867204314315e4f70c3dfebe772968f27cb8239f47f3af71e50b0b65d3348882a7b75fec82dd2d34db016f6290fa712d959a41c2086c62b2045814acd704eebd00bf8267653c9cebfd7a18e48d5a6b515e505dc8e9bc5361e4fc8251a3193b1199fe75112658e2da9ea1fb56d2c2278f3be4aa50a4ff1373f2ffdcd7a6f405e365955008b66ae770118e623262f7b7d26dee076ef44ca2d025ea5b25a2a4bc13e30556c9be884d0a82484f7cc56ebebf980b49d7c0c4009fce869586135e8d271193701a82e058e6dcd7983f2665cb8ce50e5e25d4ebe7e5c435099175647dcb9ae556da4ae1213bb39089b5607a8cb8011bb5c7280a34a4f994f2097ea392fbd913e77eec015f4c938324d2928a2fb76adaf8aa2a79831f17f1f35c0ef5c6c566d2c9e6622c8056f33b7b4c918b9c27b07e54c7d61784db24ec3feec8038266b7a6cb4035b1b15264bbed4fef4f29540dc1c10c8af76ec2640322f79c1de00338dbcc30314d0c192702d18476b107c242b23bdc286c9ec3922a38614474faf690d85c82248ce1d05c325027c027cca884870eee58346533e316e9d3b5b4f46b4fdc858e7542c602b577955e45ae96cff6d96a9b53d7a06c315ad87d41c20a59f98e06ad8eb43ed9ee39c09956f7d2d5a3cdd4b1f69a21e67cb3bbdb76e2ad4b811e022417abfe8f00f303897035125e8a1b997b95c04bf2d9a7681b069d20ba975f4773faa4d2b8febcaf7dad7a980292a84b4389dac0b4815bd0bb006182b64d6b8b92f8fb032a8a1a5f406b3f1d2c604f6f2cfe335320b067502336b31a51bc03a71923c1a461b5039a0a3fad79b20b7764052817dd552d02cfcfd1daa5afd6020314226ffe6af062b19a2105106cbb6c7b0433d0bee1243268b4b90f43bf79a29ecea9559169d4f19cd95bc5929090d29a64ee974ef63860df373cbed4cd6816fe742af51052adfbfb672e210652cb9d956f3ac8b4baff47c9487780b030ce7be", 0x1000, 0x4}, {&(0x7f0000001280)="ca1bb4f7951364e93deab9ca23831d9bb01779d5cdb387af3c69b2cee1a3374dee62ed32ec50b29987d0670ca8c14796c28a62e2c48f553d0e557f3d2cade4b29142d89c54cc8b5e13718480b44914f8432b2dc2aa1b99602b2ce23d2c19d8c298af710dbee77b49b91507ee0e0c76f93bbd4b4d90ab811c729ba0e1f7f16c14a1cc0adc36b2b6d71dadf135876ae06b71d08adc2a942c5f2e64006776460e851e55249f192008adebc3d8da58f065cf3bec08fe7ca773f8542dd30b437a21c9f7f0a305526f42dce6a74d63e20c65604e064ecde2c4a375c22d0169fe9b3b215b0b", 0xe2, 0x6}, {&(0x7f0000001380)="3797b89b78455c0f387851e344f2e97ddd6ac36d1dbcdd0cc4ff97f5302e2fa4812fd930a4479468df6204a7ff20e9b15f3388e72946429e2d1af5a056fcf79d22edf8211fd4a5eb2abd3d79a14d7af16e24946cd319c1eba7e44c4fc4fcebe7c493fa44efc29139665ff841f4656cc8eb5dc76d522db002d99aaaf0055777ac4b95845c93e5147f501e9be177f85c6cfb8f", 0x92, 0x40}, {&(0x7f0000001440)="72784d3bb32cf7a5a1258be2955235dde7df27ab4e5c573e611656aa624ca8335c53beb0136601ac73be5ccb90ce5c3dcb7df7c0661b52890d01920bc4419ff9d043ac6aea2311083e4f8197cc2b5bd4aa6e2f7d4d78e468aafe5c9f01f1002568027b1ab614ae7e3f516b671e582992c05e8e4924d45e979f4b7e7176b148c957aefab99ac01a76b28060e3695754f3d3edca571b8f1689efcef46062", 0x9d, 0x2}], 0x40, &(0x7f00000015c0)='!securitymime_typecgroup\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:38:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e24, 0x1}, 0x1c) recvmmsg(r1, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/36, 0x24}, {&(0x7f0000000100)=""/251, 0xfb}, {&(0x7f0000000200)=""/190, 0xbe}], 0x3, &(0x7f0000000300)=""/152, 0x98}, 0x61cee9c4}, {{&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, &(0x7f00000004c0)=""/78, 0x4e}, 0x2}, {{&(0x7f0000000540)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/31, 0x1f}, 0x9}, {{&(0x7f0000000640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/98, 0x62}, {&(0x7f0000001740)=""/84, 0x54}, {&(0x7f00000017c0)=""/138, 0x8a}, {&(0x7f0000001880)=""/98, 0x62}, {&(0x7f0000001900)=""/207, 0xcf}, {&(0x7f0000001a00)=""/55, 0x37}], 0x7}, 0x8}], 0x4, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 890.517440][ T5514] device lo left promiscuous mode 23:38:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x5, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000180)=0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x80000001, 0x100007) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x181080, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000100)={0x1, 0x8, 0x1, r4}) 23:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000f) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) 23:38:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x9, [@dev={0xac, 0x14, 0x14, 0x14}, @broadcast, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x11}, @multicast2, @rand_addr=0xf4, @multicast2, @multicast2]}, 0x34) symlink(0x0, &(0x7f0000000140)='./bus\x00') r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYBLOB="01001c00f444862c71304447ae01bfa14ae29abe704bbd9b178ef8d1f20b6100"], 0x1) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000300)=0xe4c) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) fchdir(r2) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98f23c4fc62d") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = gettid() getpgid(r3) getsockopt$inet_dccp_int(r2, 0x21, 0x1b, &(0x7f0000000380), &(0x7f0000000700)=0x4) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) sendfile(r4, r5, 0x0, 0x10000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 23:38:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x210f, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 891.108965][ T26] audit: type=1800 audit(1550446705.110:71): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=116 res=0 [ 891.138017][ T26] audit: type=1804 audit(1550446705.110:72): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir051366469/syzkaller.jMxcd0/1351/file0/file0" dev="loop0" ino=116 res=1 [ 891.164014][ T26] audit: type=1800 audit(1550446705.110:73): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=116 res=0 [ 891.203093][ T5521] device lo entered promiscuous mode [ 891.251718][ T26] audit: type=1804 audit(1550446705.250:74): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir051366469/syzkaller.jMxcd0/1351/file0/file0" dev="loop0" ino=116 res=1 [ 891.294291][ T5514] device lo left promiscuous mode [ 891.336628][ T26] audit: type=1804 audit(1550446705.290:75): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir051366469/syzkaller.jMxcd0/1351/file0/file0" dev="loop0" ino=116 res=1 23:38:25 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00`\x00', 0x101}) 23:38:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x9, [@dev={0xac, 0x14, 0x14, 0x14}, @broadcast, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x11}, @multicast2, @rand_addr=0xf4, @multicast2, @multicast2]}, 0x34) symlink(0x0, &(0x7f0000000140)='./bus\x00') r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYBLOB="01001c00f444862c71304447ae01bfa14ae29abe704bbd9b178ef8d1f20b6100"], 0x1) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000300)=0xe4c) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) fchdir(r2) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98f23c4fc62d") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = gettid() getpgid(r3) getsockopt$inet_dccp_int(r2, 0x21, 0x1b, &(0x7f0000000380), &(0x7f0000000700)=0x4) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) sendfile(r4, r5, 0x0, 0x10000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 23:38:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000340)=""/9) 23:38:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:25 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e24, 0x1}, 0x1c) recvmmsg(r1, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/36, 0x24}, {&(0x7f0000000100)=""/251, 0xfb}, {&(0x7f0000000200)=""/190, 0xbe}], 0x3, &(0x7f0000000300)=""/152, 0x98}, 0x61cee9c4}, {{&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, &(0x7f00000004c0)=""/78, 0x4e}, 0x2}, {{&(0x7f0000000540)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/31, 0x1f}, 0x9}, {{&(0x7f0000000640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/98, 0x62}, {&(0x7f0000001740)=""/84, 0x54}, {&(0x7f00000017c0)=""/138, 0x8a}, {&(0x7f0000001880)=""/98, 0x62}, {&(0x7f0000001900)=""/207, 0xcf}, {&(0x7f0000001a00)=""/55, 0x37}], 0x7}, 0x8}], 0x4, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 891.790804][ T5562] device lo entered promiscuous mode [ 891.817705][ T5562] device lo left promiscuous mode [ 891.826036][ T26] audit: type=1800 audit(1550446705.830:76): pid=5551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=117 res=0 [ 891.852992][ C0] net_ratelimit: 12 callbacks suppressed [ 891.853019][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 891.864914][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 891.871305][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 891.877420][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x9, [@dev={0xac, 0x14, 0x14, 0x14}, @broadcast, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x11}, @multicast2, @rand_addr=0xf4, @multicast2, @multicast2]}, 0x34) symlink(0x0, &(0x7f0000000140)='./bus\x00') r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYBLOB="01001c00f444862c71304447ae01bfa14ae29abe704bbd9b178ef8d1f20b6100"], 0x1) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000300)=0xe4c) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) fchdir(r2) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98f23c4fc62d") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = gettid() getpgid(r3) getsockopt$inet_dccp_int(r2, 0x21, 0x1b, &(0x7f0000000380), &(0x7f0000000700)=0x4) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) sendfile(r4, r5, 0x0, 0x10000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 23:38:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x0, 0x3) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000100)={0x3, 0x7, 0x10001}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) [ 891.955120][ T26] audit: type=1804 audit(1550446705.900:77): pid=5551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir051366469/syzkaller.jMxcd0/1352/file0/file0" dev="loop0" ino=117 res=1 23:38:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 892.002985][ T26] audit: type=1800 audit(1550446705.900:78): pid=5551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=117 res=0 [ 892.214120][ T5585] EXT4-fs: 13 callbacks suppressed [ 892.214203][ T5585] EXT4-fs (sda1): Cannot specify journal on remount [ 892.226091][ T26] audit: type=1800 audit(1550446706.220:79): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16838 res=0 [ 892.252787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.258731][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 892.264583][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.270341][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 892.291535][ T5571] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 892.327111][ T26] audit: type=1804 audit(1550446706.230:80): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir051366469/syzkaller.jMxcd0/1353/file0/file0" dev="sda1" ino=16838 res=1 [ 892.334100][ T5571] CPU: 0 PID: 5571 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 892.352522][ T5564] device lo entered promiscuous mode [ 892.361194][ T5571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.361200][ T5571] Call Trace: [ 892.361219][ T5571] dump_stack+0x172/0x1f0 [ 892.361242][ T5571] dump_header+0x10f/0xba6 [ 892.388524][ T5571] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 892.394343][ T5571] ? ___ratelimit+0x60/0x595 [ 892.398936][ T5571] ? do_raw_spin_unlock+0x57/0x270 [ 892.404046][ T5571] oom_kill_process.cold+0x10/0x15 [ 892.406245][ T26] audit: type=1800 audit(1550446706.230:81): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16838 res=0 [ 892.409150][ T5571] out_of_memory+0x79a/0x1280 [ 892.409168][ T5571] ? lock_downgrade+0x880/0x880 [ 892.409182][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.409198][ T5571] ? oom_killer_disable+0x280/0x280 [ 892.409209][ T5571] ? find_held_lock+0x35/0x130 [ 892.409229][ T5571] mem_cgroup_out_of_memory+0x1ca/0x230 [ 892.460632][ T5571] ? memcg_event_wake+0x230/0x230 [ 892.465659][ T5571] ? do_raw_spin_unlock+0x57/0x270 [ 892.470772][ T5571] ? _raw_spin_unlock+0x2d/0x50 [ 892.475626][ T5571] try_charge+0x118d/0x1790 [ 892.480135][ T5571] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 892.485677][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.491915][ T5571] ? kasan_check_read+0x11/0x20 [ 892.496772][ T5571] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 892.502336][ T5571] mem_cgroup_try_charge+0x24d/0x5e0 [ 892.507632][ T5571] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 892.513270][ T5571] shmem_getpage_gfp+0x69e/0x2500 [ 892.518333][ T5571] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 892.524491][ T5571] ? lock_downgrade+0x880/0x880 [ 892.529344][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.535594][ T5571] shmem_fault+0x22d/0x760 [ 892.540011][ T5571] ? __handle_mm_fault+0x344a/0x3ec0 [ 892.545298][ T5571] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 892.551295][ T5571] ? lock_downgrade+0x880/0x880 [ 892.556162][ T5571] __do_fault+0x116/0x4e0 [ 892.560496][ T5571] __handle_mm_fault+0x2c6c/0x3ec0 [ 892.565609][ T5571] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 892.571151][ T5571] ? find_held_lock+0x35/0x130 [ 892.575912][ T5571] ? handle_mm_fault+0x322/0xb30 [ 892.580859][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.587105][ T5571] ? kasan_check_read+0x11/0x20 [ 892.591969][ T5571] handle_mm_fault+0x43f/0xb30 [ 892.596733][ T5571] __do_page_fault+0x5ef/0xda0 [ 892.601512][ T5571] do_page_fault+0x71/0x581 [ 892.606020][ T5571] page_fault+0x1e/0x30 [ 892.610174][ T5571] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 892.616756][ T5571] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 892.636349][ T5571] RSP: 0018:ffff8880884d7878 EFLAGS: 00010202 [ 892.642409][ T5571] RAX: 0000000000000000 RBX: 0000000000000ec0 RCX: 0000000000000bc0 [ 892.650375][ T5571] RDX: 0000000000000ec0 RSI: 000000002001b000 RDI: ffff88804879b040 [ 892.658336][ T5571] RBP: ffff8880884d78b0 R08: ffffed10090f3780 R09: 0000000000000000 [ 892.666307][ T5571] R10: ffffed10090f377f R11: ffff88804879bbff R12: 000000002001ad00 [ 892.674270][ T5571] R13: ffff88804879ad40 R14: 000000002001bbc0 R15: 00007ffffffff000 [ 892.682258][ T5571] ? copyin+0xe2/0x100 [ 892.686335][ T5571] _copy_from_iter+0x211/0xba0 [ 892.691092][ T5571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.697331][ T5571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.703571][ T5571] ? __phys_addr_symbol+0x30/0x70 [ 892.708597][ T5571] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.714325][ T5571] skb_copy_datagram_from_iter+0x107/0x660 [ 892.720127][ T5571] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 892.725850][ T5571] unix_stream_sendmsg+0x3db/0x990 [ 892.730968][ T5571] ? unix_bind+0xac0/0xac0 [ 892.735380][ T5571] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 892.740922][ T5571] ? apparmor_socket_sendmsg+0x2a/0x30 [ 892.746372][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.752609][ T5571] ? security_socket_sendmsg+0x93/0xc0 [ 892.758066][ T5571] ? unix_bind+0xac0/0xac0 [ 892.762480][ T5571] sock_sendmsg+0xdd/0x130 [ 892.766892][ T5571] sock_write_iter+0x27c/0x3e0 [ 892.771654][ T5571] ? sock_sendmsg+0x130/0x130 [ 892.776344][ T5571] ? aa_path_link+0x460/0x460 [ 892.781021][ T5571] ? find_held_lock+0x35/0x130 [ 892.785779][ T5571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.792058][ T5571] ? iov_iter_init+0xea/0x220 [ 892.796735][ T5571] new_sync_write+0x4c7/0x760 [ 892.801413][ T5571] ? default_llseek+0x2e0/0x2e0 [ 892.806262][ T5571] ? common_file_perm+0x238/0x720 [ 892.811295][ T5571] ? __fget+0x381/0x550 [ 892.815456][ T5571] ? apparmor_file_permission+0x25/0x30 [ 892.821000][ T5571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.827237][ T5571] ? security_file_permission+0x94/0x380 [ 892.832873][ T5571] __vfs_write+0xe4/0x110 [ 892.837316][ T5571] vfs_write+0x20c/0x580 [ 892.841583][ T5571] ksys_write+0xea/0x1f0 [ 892.845824][ T5571] ? __ia32_sys_read+0xb0/0xb0 [ 892.850585][ T5571] ? do_syscall_64+0x26/0x610 [ 892.855261][ T5571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.861330][ T5571] ? do_syscall_64+0x26/0x610 [ 892.866013][ T5571] __x64_sys_write+0x73/0xb0 [ 892.870615][ T5571] do_syscall_64+0x103/0x610 [ 892.875206][ T5571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.881087][ T5571] RIP: 0033:0x457e29 [ 892.884976][ T5571] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 892.904573][ T5571] RSP: 002b:00007f661b986c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 892.912975][ T5571] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 892.920935][ T5571] RDX: 000000007fffffff RSI: 00000000200000c0 RDI: 0000000000000007 23:38:26 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10640, 0x0) bind$alg(r0, 0x0, 0xffffffffffffff8f) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x104, 0x70bd29, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x71d7f6aa78ac978) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}}) 23:38:26 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00h\x00', 0x101}) [ 892.928895][ T5571] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 892.936857][ T5571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f661b9876d4 [ 892.944829][ T5571] R13: 00000000004c71f6 R14: 00000000004dccd0 R15: 00000000ffffffff 23:38:27 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f8, &(0x7f0000000000)={'sit0\x00', @ifru_map={0x709000}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xd2140, 0x0) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f00000000c0)={'bond0\x00', 0x5}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8aa96dfcbf654c7e, 0x0) bind$rose(r3, &(0x7f00000001c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, 0x1c) fremovexattr(r0, &(0x7f0000000200)=@random={'btrfs.', '$-\x00'}) ioctl$KVM_SMI(r3, 0xaeb7) 23:38:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 892.972203][ T5571] memory: usage 307200kB, limit 307200kB, failcnt 2027 [ 892.972744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 892.984844][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 893.004371][ T5594] device lo left promiscuous mode [ 893.011403][ T5571] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 893.057059][ T5596] 9pnet: Insufficient options for proto=fd [ 893.065032][ T5571] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 893.078314][ T5571] Memory cgroup stats for /syz2: cache:1676KB rss:230972KB rss_huge:198656KB shmem:1676KB mapped_file:1584KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1660KB active_anon:231080KB inactive_file:0KB active_file:0KB unevictable:0KB 23:38:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80200) finit_module(r2, &(0x7f0000000200)='$\x00', 0x1) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000180)=""/5, &(0x7f00000001c0)=0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x9, 0x8000) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 893.110951][ T5571] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=3024,uid=0 [ 893.141635][ T5571] Memory cgroup out of memory: Killed process 3024 (syz-executor.2) total-vm:72580kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 893.223759][ T5603] EXT4-fs (sda1): Cannot specify journal on remount [ 893.302188][ T5611] EXT4-fs (sda1): Cannot specify journal on remount 23:38:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4800, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:27 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f00000000c0)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 893.553771][ T5616] EXT4-fs (sda1): Cannot specify journal on remount [ 893.642531][ T5598] device lo entered promiscuous mode [ 893.688805][ T5620] EXT4-fs (sda1): Cannot specify journal on remount [ 893.696022][ T5594] device lo left promiscuous mode 23:38:28 executing program 0: socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) write$P9_RWALK(r2, 0x0, 0x0) 23:38:28 executing program 1: ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, 0x0) socketpair(0x0, 0x7, 0x10000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) socketpair(0x9, 0xa, 0xffff, &(0x7f0000000000)) uname(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) 23:38:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40440, 0x0) getpeername$netlink(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) [ 893.989962][ T5598] device lo entered promiscuous mode 23:38:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:28 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00l\x00', 0x101}) 23:38:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000080)={'ip6gre0\x00', {0x2, 0x4e24, @multicast2}}) r3 = getpid() syz_emit_ethernet(0x56, &(0x7f00000002c0)={@dev={[], 0xf}, @remote, [], {@canfd={0xd, {{0x4, 0x9, 0x8, 0x3}, 0x12, 0x1, 0x0, 0x0, "a103c0c03867d220ad9c80a1dab277da506ee1659162032003c8efd376b28371bd9497994b0d0c91db931041a00bde86bb0a42ed871628c7f160f515a9723945"}}}}, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r3, 0xf, 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x3225d43a, 0x2, 0x20a, 0x3a, 0xfffffffffffffff8, 0x3f, 0x2, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r5, 0xfffffffffffffffa}, 0x8) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x77) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$TCSETS(r4, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) [ 894.074071][ T5630] device lo left promiscuous mode [ 894.080203][ T5626] EXT4-fs (sda1): Cannot specify journal on remount [ 894.208053][ T5644] EXT4-fs (sda1): Cannot specify journal on remount 23:38:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000000c0)={0x3, 0x2a7c}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:38:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 894.433314][ T5653] EXT4-fs (sda1): Cannot specify journal on remount [ 894.553862][ T5655] EXT4-fs (sda1): Cannot specify journal on remount 23:38:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 894.727928][ T5638] device lo entered promiscuous mode [ 894.759902][ T5658] EXT4-fs (sda1): Cannot specify journal on remount [ 894.771553][ T5630] device lo left promiscuous mode 23:38:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) connect$netlink(r1, &(0x7f0000000080), 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) shutdown(r0, 0x0) 23:38:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0xffffffffffffffff) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:38:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:29 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000000)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2109) r2 = dup2(r0, r1) execve(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) 23:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)={0x0, 0xff47}) [ 895.500479][ T5638] device lo entered promiscuous mode 23:38:29 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00t\x00', 0x101}) 23:38:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 23:38:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 23:38:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 895.688054][ T5714] device lo left promiscuous mode 23:38:29 executing program 1: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x7e) inotify_init1(0x80800) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x8) r0 = socket$netlink(0x10, 0x3, 0x3) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'trusted.overlay.opaque\x00'}, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCCBRK(r1, 0x5428) umount2(0x0, 0x4) mount$9p_xen(&(0x7f0000000540)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x4000, &(0x7f0000000600)={'trans=xen,', {[{@version_L='version=9p2000.L'}]}}) write$P9_RREADLINK(r1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000680)='./file0\x00', r3, r4) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)='9p\x00', 0x80, 0x0) ioctl$TCSETA(r1, 0x5406, 0x0) 23:38:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x3ff, 0x200000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000340)={@mcast1, 0x0}, &(0x7f0000000380)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000880)={0x0, @initdev, @remote}, &(0x7f00000008c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'ip6gre0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000b80)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000b40)={&(0x7f0000000940)={0x1d0, r2, 0x70c, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x11}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xe8, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf58}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x20000000000}}}]}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r9, 0x80404519, &(0x7f0000000040)=""/9) r10 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000000100)={r11, 0x1, 0x6, @local}, 0x10) 23:38:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x8f\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\xa2\xda\xee,\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7\xd3\xa3\x98SVz\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1000, 0xffff, 0x5, 0xfffffffffffffff9, 0x8}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={r4, 0x3, 0x20, 0x401, 0x4}, &(0x7f0000000240)=0x14) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000440)='/dev/video#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000480)={0x5, 0x0, 0x0, 0x244}) ioctl$DRM_IOCTL_AGP_BIND(r5, 0x40106436, &(0x7f00000004c0)={r6, 0x7}) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000040)=""/9) 23:38:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 897.010849][ T5767] device lo left promiscuous mode 23:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000080)=""/107) [ 897.132785][ C0] net_ratelimit: 18 callbacks suppressed [ 897.132792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 897.144328][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 897.288380][ T5781] EXT4-fs: 11 callbacks suppressed [ 897.288388][ T5781] EXT4-fs (sda1): Cannot specify journal on remount [ 897.403276][ T5785] EXT4-fs (sda1): Cannot specify journal on remount 23:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 897.559908][ T5772] device lo entered promiscuous mode [ 897.580645][ T5767] device lo left promiscuous mode 23:38:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) [ 897.608294][ T5790] EXT4-fs (sda1): Cannot specify journal on remount [ 897.709726][ T5796] EXT4-fs (sda1): Cannot specify journal on remount 23:38:32 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\xfe\x80\x00', 0x101}) 23:38:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80, 0x0) connect$rds(r0, &(0x7f0000000240)={0x2, 0x4e23, @broadcast}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) write$cgroup_pid(r1, &(0x7f0000000180)=r2, 0xd7) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) pipe(&(0x7f0000000040)) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000080)={0x0, 0xa1b6, 0x6, 0x1, 0x1, 0xfffffffffffffff7}) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0xa, 0x0, [], [{0x8, 0x80000000, 0x1, 0x2, 0x3f, 0x8}, {0xffe00000000, 0x9, 0x4, 0x9, 0x7fffffff, 0xcea1a8c}], [[], [], [], [], [], [], [], [], [], []]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000001c0)={'team_slave_0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 23:38:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) 23:38:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 898.038147][ T5772] device lo entered promiscuous mode [ 898.092751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 898.098551][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 898.104433][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 898.110192][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 898.128529][ T5804] EXT4-fs (sda1): Cannot specify journal on remount [ 898.136825][ T5813] device lo left promiscuous mode 23:38:32 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 23:38:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/44) 23:38:32 executing program 1: [ 898.246497][ T5818] EXT4-fs (sda1): Cannot specify journal on remount 23:38:32 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 23:38:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:32 executing program 1: [ 898.452126][ T5831] EXT4-fs (sda1): Cannot specify journal on remount [ 898.492731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 898.498665][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 898.504507][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 898.510245][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 898.573523][ T5834] EXT4-fs (sda1): Cannot specify journal on remount [ 898.751244][ T5816] device lo entered promiscuous mode [ 898.762015][ T5813] device lo left promiscuous mode 23:38:33 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\xfe\xc0\x00', 0x101}) 23:38:33 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 23:38:33 executing program 1: 23:38:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x220440, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) 23:38:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 899.074421][ T5816] device lo entered promiscuous mode 23:38:33 executing program 1: 23:38:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 899.155835][ T5839] EXT4-fs (sda1): Cannot specify journal on remount [ 899.166987][ T5848] device lo left promiscuous mode 23:38:33 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) syncfs(r0) 23:38:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x2000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7fffffff, 0x9, 0x0, 0x9, 0x20}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x8, 0x4, 0x8693}, &(0x7f0000000180)=0x10) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 23:38:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 899.263703][ T5855] EXT4-fs (sda1): Cannot specify journal on remount 23:38:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 899.684939][ T5852] device lo entered promiscuous mode [ 899.709857][ T5852] device lo left promiscuous mode 23:38:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000777000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 23:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/9) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x2, 0x112) 23:38:34 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\xfc\x00', 0x101}) 23:38:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 900.089431][ T5871] device lo entered promiscuous mode 23:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 900.199931][ T5885] device lo left promiscuous mode 23:38:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000180)="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") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x3, 0x0, 0x6, 0x6, r1}) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) 23:38:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) accept4$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x800) [ 900.798270][ T5891] device lo entered promiscuous mode [ 900.901533][ T5885] device lo left promiscuous mode [ 901.409673][ T5891] device lo entered promiscuous mode 23:38:35 executing program 1: 23:38:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x17000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$kcm(0x29, 0x15, 0x0) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/72, 0x48}, {&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000280)=""/69, 0x45}], 0x3}, 0x10101) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) 23:38:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x903, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:35 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\xfd\x00', 0x101}) 23:38:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 901.926154][ T5920] device lo left promiscuous mode 23:38:35 executing program 1: 23:38:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:36 executing program 1: 23:38:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:36 executing program 1: 23:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:36 executing program 1: [ 902.252734][ C0] net_ratelimit: 12 callbacks suppressed [ 902.252741][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 902.264190][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 902.270023][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 902.275805][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 902.321842][ T5943] EXT4-fs: 8 callbacks suppressed [ 902.321850][ T5943] EXT4-fs (sda1): Cannot specify journal on remount 23:38:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/9) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000080)={{0x1, 0x10000}, 0x8}, 0x10) [ 902.478243][ T5929] device lo entered promiscuous mode [ 902.488255][ T5946] EXT4-fs (sda1): Cannot specify journal on remount [ 902.507820][ T5920] device lo left promiscuous mode [ 902.652751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 902.658598][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 902.664446][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 902.670212][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:38:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x0, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 902.862056][ T5929] device lo entered promiscuous mode 23:38:36 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x80\xfe\x00', 0x101}) 23:38:36 executing program 1: 23:38:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:36 executing program 1: 23:38:37 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa0080, 0x0) recvfrom$inet(r0, &(0x7f0000000600)=""/219, 0xdb, 0x2000, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000200)="0af51f023c123f3188a070") syz_emit_ethernet(0x6, &(0x7f0000000740)=ANY=[@ANYRES16=r0, @ANYRESHEX=r1, @ANYRES64=r1, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r2, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYPTR64, @ANYBLOB, @ANYRESOCT=r0, @ANYPTR64], @ANYRESOCT=r1, @ANYRESDEC=0x0, @ANYRES32=r1], @ANYRESDEC=r2, @ANYRESHEX=0x0], 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xad, 0xa6, &(0x7f0000000240)="9b0236a10e010335e48ec03ad37ea3c11429d53b885d7392c5f5a4c9e141a5190165bb7fd075c47706a11575a959d199e6a5b3ed8fc1db6f7daaa8ad477c53cab4d84063cf3bd0a9fe2146bbdc4d0eb2baed316c0e57972f45136c87346fa482364b4cce9a74f41515a5febbc924256438aea2888721231189b8d72a477c404d02efd3c2f2c5c931e9f7b571b2405f5ab551f0a32d6bb22dc78101ddcf9b7716e62b572c4c2a943116b02fb3d1", &(0x7f0000000300)=""/166, 0x80}, 0x28) setsockopt$inet6_int(r3, 0x29, 0x3e, &(0x7f00000004c0)=0x4, 0x4) r4 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000003c0)=""/248, &(0x7f0000000180)=0xf8) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000040)=""/9) 23:38:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) [ 902.982253][ T5959] EXT4-fs (sda1): Cannot specify journal on remount [ 903.032241][ T5963] device lo left promiscuous mode 23:38:37 executing program 1: 23:38:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) [ 903.114963][ T5971] EXT4-fs (sda1): Cannot specify journal on remount 23:38:37 executing program 1: 23:38:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x210f0000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 903.315544][ T5979] EXT4-fs (sda1): Cannot specify journal on remount [ 903.372833][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 903.378708][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 903.419516][ T5981] EXT4-fs (sda1): Cannot specify journal on remount [ 903.590428][ T5969] device lo entered promiscuous mode 23:38:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x0, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 903.618323][ T5963] device lo left promiscuous mode 23:38:38 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\xc0\xfe\x00', 0x101}) 23:38:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 23:38:38 executing program 1: 23:38:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 903.984626][ T5969] device lo entered promiscuous mode 23:38:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000000c0)={0x2, 0x6}, 0x2) 23:38:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 23:38:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='uid_map\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 904.049891][ T5991] EXT4-fs (sda1): Cannot specify journal on remount [ 904.082986][ T5995] device lo left promiscuous mode [ 904.151041][ T5999] EXT4-fs (sda1): Cannot specify journal on remount 23:38:38 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 23:38:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2c}, 0x2c) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000300)='0\x00') [ 904.362538][ T6013] EXT4-fs (sda1): Cannot specify journal on remount 23:38:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x0, 0x4, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 904.470054][ T6018] EXT4-fs (sda1): Cannot specify journal on remount 23:38:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 904.751999][ T5998] device lo entered promiscuous mode [ 904.784715][ T5998] device lo left promiscuous mode [ 905.218971][ T6028] device lo entered promiscuous mode 23:38:39 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\xff\x00', 0x101}) 23:38:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40100, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={0x0, @bcast, @bpq0='bpq0\x00', 0x7fff, 'syz0\x00', @null, 0xb2, 0x4, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 23:38:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:39 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000777000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f000014b000/0x400000)=nil, 0x400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 905.322151][ T6043] device lo left promiscuous mode 23:38:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 905.939297][ T6044] device lo entered promiscuous mode [ 905.967535][ T6043] device lo left promiscuous mode [ 906.400859][ T5] Bluetooth: hci8: command 0x1003 tx timeout [ 906.407573][ T6044] device lo entered promiscuous mode [ 906.415387][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 907.532824][ C0] net_ratelimit: 18 callbacks suppressed [ 907.532832][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 907.544291][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 908.493563][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 908.499347][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 908.505206][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 908.510941][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 908.516759][ T5] Bluetooth: hci8: command 0x1001 tx timeout [ 908.522892][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 908.892834][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 908.898639][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 908.904473][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 908.910207][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 910.573447][ T5] Bluetooth: hci8: command 0x1009 tx timeout [ 912.652791][ C0] net_ratelimit: 12 callbacks suppressed [ 912.652799][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 912.664262][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 912.670118][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 912.675900][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 913.052782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.058547][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 913.064374][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.070115][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 913.772877][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 913.778681][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 23:38:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000340)=0xe8) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0xb8, 0xb8, 0xb8, 0xb8, 0xb8, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, &(0x7f0000000100), {[{{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, 0x0, 0xff, 'bridge0\x00', 'bond0\x00', {}, {}, 0x7f, 0x1, 0x4}, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xf8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}, @common=@unspec=@owner={0x38, 'owner\x00', 0x0, {r1, r2, r3, r4, 0x3, 0x7}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000040)=""/9) r6 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x3, 0x1}, 0x10) 23:38:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b703000000001f006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 23:38:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:38:48 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x01\x00', 0x101}) [ 914.488992][ T6058] device lo left promiscuous mode 23:38:48 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000080)=0x4, 0x1ffbfffffe, 0x2, 0x0, 0x0, 0x1) r0 = gettid() openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x40500, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 914.520717][ T6063] EXT4-fs: 4 callbacks suppressed [ 914.520727][ T6063] EXT4-fs (sda1): Cannot specify journal on remount 23:38:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={{r1, r2/1000+30000}}) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000240)={0x1, r4}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x516465e2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000040)=""/9) [ 914.631332][ T6075] EXT4-fs (sda1): Cannot specify journal on remount 23:38:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x60000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 914.870908][ T6083] EXT4-fs (sda1): Cannot specify journal on remount [ 914.976839][ T6068] device lo entered promiscuous mode [ 914.990852][ T6085] EXT4-fs (sda1): Cannot specify journal on remount [ 915.000115][ T6068] device lo left promiscuous mode 23:38:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:38:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 915.245915][ T6091] EXT4-fs (sda1): Cannot specify journal on remount [ 915.331499][ T6097] EXT4-fs (sda1): Cannot specify journal on remount [ 915.509149][ T6087] device lo entered promiscuous mode [ 916.652741][ T7505] Bluetooth: hci8: command 0x1003 tx timeout [ 916.658936][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 917.932814][ C0] net_ratelimit: 18 callbacks suppressed [ 917.932822][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 917.944308][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 918.732735][ T7505] Bluetooth: hci8: command 0x1001 tx timeout [ 918.738819][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 918.892772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.898650][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 918.904549][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.910404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 919.292802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.298608][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 919.304463][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.310217][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 920.812880][ T7505] Bluetooth: hci8: command 0x1009 tx timeout [ 923.052737][ C0] net_ratelimit: 12 callbacks suppressed [ 923.052742][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 923.064167][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 923.069946][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 923.075728][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 923.452791][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 923.458640][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 923.464450][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 923.470183][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 924.172766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 924.178539][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:38:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 23:38:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000200)=""/44, &(0x7f0000000240)=0x2c) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5f07, 0x400001) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000500), 0x4) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000000), &(0x7f0000000040)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:38:58 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x02\x00', 0x101}) 23:38:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000180)=""/9) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='/dev/input/event#\x00') 23:38:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 924.730208][ T6114] device lo left promiscuous mode [ 924.749134][ T6114] device lo entered promiscuous mode [ 924.756637][ T6119] EXT4-fs (sda1): Cannot specify journal on remount [ 924.779661][ T2247] Bluetooth: hci8: Frame reassembly failed (-84) [ 924.794285][ T6114] device lo left promiscuous mode [ 924.802296][ T6124] device lo entered promiscuous mode 23:38:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x43) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000300)=0x2, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x2) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x8002, 0x0) fallocate(r0, 0x20, 0x800, 0xd033) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000440)=0x1) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f0000000080)={0x3ff}) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 23:38:58 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x03\x00', 0x101}) [ 924.914027][ T6129] EXT4-fs (sda1): Cannot specify journal on remount 23:38:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x74000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 925.070902][ T6135] device lo left promiscuous mode [ 925.087609][ T6135] device lo entered promiscuous mode 23:38:59 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x02\x00', 0x101}) [ 925.146172][ T6135] device lo left promiscuous mode [ 925.162157][ T6138] device lo entered promiscuous mode [ 925.178331][ T6139] EXT4-fs (sda1): Cannot specify journal on remount 23:38:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f00000000c0)) ioctl(r0, 0x1000048912, &(0x7f00000006c0)="0adc1f023c123f3188a070a4bbccc93a1f8ffb06000000e857e779c4df3ad470c5932090abb0c464c28c77515d9f578ac3df1a5e55761b7cf582a27d1be1583662f5bc07e59f9875fc6ada3b53c4f0663888dce9503dafad9b61eae5b2a110592efcc5e94ecd4a2a7f07c8a4387292e17162c00d435cd39a3557c06b772ded4bb5ef68927fbd57f336e77cab942c82dbd4c194a76c3169a8e26a25ce74624b1eea13827d46e5ef4676de700763f82b9d8f1e0196785fa0a318ece3bc3a12b978327eb503049e755cb03d5b406f276e6aec63bd1bd5b730c68b74cf8aedc2abbb146864826429003bb4b60531b9d84079b973345a93a5c349168f57b35842832fb31adac3480b22a8d853090993af17bcd609056300000006000000000000000000000000000000000000df90c27016f320651df722fa23397fc792d38d34e8fa5c5fbc9ee62f9cdd7bcc01f976d7fd78d6728625dca34c3dd3362cf3ee2504fba1b1e5a42670392857000000000085368b8bf46ac6ea726a73a3a4cf014a2a0b495d67a23b2af62bd390a49443e62b2d51d9ac21466616a4126ca0bbfda043816dc81a1b3a9885a8fb78e05b955380122b1a5798f2f95f1119457520d252ea251971296d207ad5208120a3c6be627701cae9fe347ad310f8f4ae13d262befe252e6239d3e8ec19b2a156f9a796d8d20e544e8647906e0c") r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x6, 0x100000000200000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) 23:38:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x04\x00', 0x101}) [ 925.292336][ T6145] EXT4-fs (sda1): Cannot specify journal on remount [ 925.482061][ T6143] device lo entered promiscuous mode [ 925.646526][ T6147] device lo left promiscuous mode [ 925.671203][ T6151] device lo entered promiscuous mode [ 925.683333][ T6147] device lo left promiscuous mode [ 925.701093][ T6151] device lo entered promiscuous mode [ 926.812722][T10380] Bluetooth: hci8: command 0x1003 tx timeout [ 926.818932][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 928.332756][ C0] net_ratelimit: 18 callbacks suppressed [ 928.332764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 928.344230][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 928.892797][T10380] Bluetooth: hci8: command 0x1001 tx timeout [ 928.898879][ T1174] Bluetooth: hci8: sending frame failed (-49) [ 929.292718][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 929.298604][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 929.304472][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 929.310222][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 929.692812][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 929.698722][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 929.704567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 929.710333][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 930.972752][T10380] Bluetooth: hci8: command 0x1009 tx timeout [ 933.452782][ C0] net_ratelimit: 12 callbacks suppressed [ 933.452790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.464262][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 933.470122][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.475916][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 933.852816][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 933.858584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 933.864410][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 933.870149][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.572803][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 934.578620][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:39:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:39:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:39:08 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:39:08 executing program 1: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00006c4f60)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r2, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x2a}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x401}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) timer_create(0x5, &(0x7f0000000540)={0x0, 0x3a, 0x2, @thr={&(0x7f0000000480)="1676a17566ef0c43ebdea7ec0927e300d4c46a8396bfb0e53d35", &(0x7f00000004c0)="f47affdd152f851116a232b5d2bb804ea2247c796b7413c4936845b0db1db053cf266cba17e64ea8de2e63e1608e76f2df9b865c5a84fb5c122b1a7ac2b90fb6d1d29607b16d11ea2b0b8135996fb7b450344aa86e57463d26823b6d10166910468248a468c51fff366a0b67098d61747ab2254fc918daba42"}}, &(0x7f0000000580)) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x18, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40010) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'veth1_to_hsr\x00', {0x2, 0x4e20, @loopback}}) 23:39:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="69ce6c0721dbe6bab1d47ae32aa9d430de7df7ee26a1ff3b5a"], 0xc, 0x3) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x8c600) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video2\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r3, 0x3}}, 0x18) 23:39:08 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x05\x00', 0x101}) [ 934.938984][ T6158] EXT4-fs (sda1): Cannot specify journal on remount [ 934.948239][ T6156] device lo left promiscuous mode [ 934.965232][ T6156] device lo entered promiscuous mode [ 934.974566][ T6165] FAULT_INJECTION: forcing a failure. [ 934.974566][ T6165] name failslab, interval 1, probability 0, space 0, times 0 [ 934.994684][ T6165] CPU: 1 PID: 6165 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 935.003802][ T6165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.014342][ T6165] Call Trace: [ 935.017687][ T6165] dump_stack+0x172/0x1f0 [ 935.022047][ T6165] should_fail.cold+0xa/0x15 [ 935.026652][ T6165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.032464][ T6165] ? ___might_sleep+0x163/0x280 [ 935.037349][ T6165] __should_failslab+0x121/0x190 [ 935.042312][ T6165] should_failslab+0x9/0x14 [ 935.046825][ T6165] kmem_cache_alloc_trace+0x2d1/0x760 [ 935.052295][ T6165] ? __ldsem_down_write_nested+0x900/0x900 [ 935.058113][ T6165] ? mark_held_locks+0xf0/0xf0 [ 935.062940][ T6165] h5_open+0x4e4/0x5f0 [ 935.067017][ T6165] ? h5_rx_crc+0x20/0x20 [ 935.071268][ T6165] ? ___might_sleep+0x163/0x280 [ 935.076136][ T6165] hci_uart_tty_ioctl+0x2d4/0xa70 [ 935.081172][ T6165] tty_ioctl+0xac9/0x14d0 [ 935.085522][ T6165] ? debug_smp_processor_id+0x3c/0x280 [ 935.090985][ T6165] ? hci_uart_init_work+0x150/0x150 [ 935.096197][ T6165] ? tty_register_device+0x40/0x40 [ 935.101312][ T6165] ? mark_held_locks+0xf0/0xf0 [ 935.106072][ T6165] ? debug_smp_processor_id+0x3c/0x280 [ 935.111527][ T6165] ? perf_trace_lock_acquire+0xf5/0x580 [ 935.117080][ T6165] ? __f_unlock_pos+0x19/0x20 [ 935.121769][ T6165] ? __fget+0x35a/0x550 [ 935.125945][ T6165] ? find_held_lock+0x35/0x130 [ 935.130715][ T6165] ? __fget+0x35a/0x550 [ 935.134877][ T6165] ? tty_register_device+0x40/0x40 [ 935.139991][ T6165] do_vfs_ioctl+0xd6e/0x1390 [ 935.144599][ T6165] ? kasan_check_read+0x11/0x20 [ 935.149452][ T6165] ? ioctl_preallocate+0x210/0x210 [ 935.154564][ T6165] ? __fget+0x381/0x550 [ 935.158731][ T6165] ? ksys_dup3+0x3e0/0x3e0 [ 935.163160][ T6165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 935.169396][ T6165] ? fput_many+0x12c/0x1a0 [ 935.173807][ T6165] ? fput+0x1b/0x20 [ 935.177662][ T6165] ? security_file_ioctl+0x93/0xc0 [ 935.182775][ T6165] ksys_ioctl+0xab/0xd0 [ 935.186937][ T6165] __x64_sys_ioctl+0x73/0xb0 [ 935.191539][ T6165] do_syscall_64+0x103/0x610 [ 935.196141][ T6165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.202135][ T6165] RIP: 0033:0x457e29 [ 935.206038][ T6165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.225637][ T6165] RSP: 002b:00007f851c400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 935.234047][ T6165] RAX: ffffffffffffffda RBX: 00007f851c400c90 RCX: 0000000000457e29 23:39:09 executing program 1: r0 = socket(0x0, 0x5, 0x8) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r1, &(0x7f0000000040), 0x563cdd19) fchdir(r0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x2000) write$FUSE_LSEEK(r2, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x8, {0x9}}, 0x18) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000140)={0x4, 0xfffffffffffffffd, 0x7}) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000180)=""/255) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000280)={{0x0, 0x4}, 'port0\x00', 0x80, 0x440, 0xfffffffffffffffd, 0x8, 0x3ff, 0x3, 0x5, 0x0, 0x4, 0x2}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000340)=0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000440), 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000480)=0x2) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) getresuid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000840)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x2, &(0x7f0000000940)={[{@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}], [{@uid_eq={'uid', 0x3d, r4}}, {@fowner_lt={'fowner<', r5}}, {@subj_user={'subj_user', 0x3d, '\x7f%user)em0vmnet0[#-procGPLGPLvboxnet1eth1ppp0$'}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '!\\proc)bdev&nodev'}}, {@euid_lt={'euid<', r6}}, {@fowner_lt={'fowner<', r7}}, {@uid_eq={'uid', 0x3d, r8}}, {@smackfsroot={'smackfsroot'}}]}) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000ac0)) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xffff) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000b00)={0x0, @in={{0x2, 0x4e24, @loopback}}}, &(0x7f0000000bc0)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000c00)={r9, 0x80, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000c40)={0x8}, 0x4) ptrace$peek(0xffffffffffffffff, r1, &(0x7f0000000c80)) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d00)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r10, 0x100, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) [ 935.242015][ T6165] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 935.249987][ T6165] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 935.257951][ T6165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f851c4016d4 [ 935.265947][ T6165] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 [ 935.280426][ T6156] device lo left promiscuous mode 23:39:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 23:39:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x80, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:39:09 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) [ 935.319692][ T6173] EXT4-fs (sda1): Cannot specify journal on remount [ 935.380413][ T7496] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 935.407001][ T7496] CPU: 1 PID: 7496 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 935.409167][ T6181] device lo entered promiscuous mode [ 935.416055][ T7496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.416062][ T7496] Call Trace: [ 935.416080][ T7496] dump_stack+0x172/0x1f0 [ 935.416100][ T7496] dump_header+0x10f/0xba6 [ 935.416123][ T7496] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 935.449198][ T7496] ? ___ratelimit+0x60/0x595 [ 935.453823][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 935.458938][ T7496] oom_kill_process.cold+0x10/0x15 [ 935.464052][ T7496] out_of_memory+0x79a/0x1280 [ 935.468732][ T7496] ? lock_downgrade+0x880/0x880 [ 935.473587][ T7496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 935.479835][ T7496] ? oom_killer_disable+0x280/0x280 [ 935.485033][ T7496] ? find_held_lock+0x35/0x130 [ 935.489811][ T7496] mem_cgroup_out_of_memory+0x1ca/0x230 [ 935.495357][ T7496] ? memcg_event_wake+0x230/0x230 [ 935.500386][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 935.505499][ T7496] ? _raw_spin_unlock+0x2d/0x50 [ 935.510355][ T7496] try_charge+0x118d/0x1790 [ 935.514865][ T7496] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 935.520404][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 935.525949][ T7496] ? find_held_lock+0x35/0x130 [ 935.530714][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 935.536270][ T7496] __memcg_kmem_charge_memcg+0x7c/0x130 [ 935.541822][ T7496] ? memcg_kmem_put_cache+0xb0/0xb0 [ 935.547021][ T7496] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 935.552572][ T7496] __memcg_kmem_charge+0x136/0x300 [ 935.557685][ T7496] __alloc_pages_nodemask+0x437/0x7e0 [ 935.563051][ T7496] ? find_held_lock+0x35/0x130 [ 935.567825][ T7496] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 935.573628][ T7496] ? kasan_check_write+0x14/0x20 [ 935.578571][ T7496] ? lock_downgrade+0x880/0x880 [ 935.583433][ T7496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 935.589669][ T7496] alloc_pages_current+0x107/0x210 [ 935.594782][ T7496] pte_alloc_one+0x1b/0x1a0 [ 935.599287][ T7496] __pte_alloc+0x20/0x310 [ 935.603616][ T7496] copy_page_range+0x1529/0x1f90 [ 935.608570][ T7496] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 935.614288][ T7496] ? pmd_alloc+0x180/0x180 [ 935.618703][ T7496] ? validate_mm_rb+0xa3/0xc0 [ 935.623380][ T7496] ? __vma_link_rb+0x279/0x370 [ 935.628175][ T7496] copy_process.part.0+0x5acb/0x79e0 [ 935.633486][ T7496] ? __cleanup_sighand+0x60/0x60 [ 935.638441][ T7496] _do_fork+0x257/0xfd0 [ 935.642599][ T7496] ? fork_idle+0x1d0/0x1d0 [ 935.647021][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.652480][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.657936][ T7496] ? do_syscall_64+0x26/0x610 [ 935.662607][ T7496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.668666][ T7496] ? do_syscall_64+0x26/0x610 [ 935.673451][ T7496] __x64_sys_clone+0xbf/0x150 [ 935.678131][ T7496] do_syscall_64+0x103/0x610 [ 935.682719][ T7496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.688610][ T7496] RIP: 0033:0x4563fa [ 935.692505][ T7496] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 935.712104][ T7496] RSP: 002b:00007ffd44e54f20 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 935.720507][ T7496] RAX: ffffffffffffffda RBX: 00007ffd44e54f20 RCX: 00000000004563fa 23:39:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) 23:39:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xfff, 0x9}, 0xa) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x44, 0x2, 0x8, "16a0bd972ed346b570df1e27875279a6", "fd915ff297d479cc9d0f3481b8e66ae0ef40182aec8688da9551feb8bf9813b77a5c1b39573c06cea527e688a0add1"}, 0x44, 0x1) syz_open_dev$vivid(&(0x7f0000000340)='/dev/video#\x00', 0x3, 0x2) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video37\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x400, 0x0) syz_open_dev$usb(&(0x7f0000000680)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x48002) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x90180, 0x0) syz_open_dev$video4linux(&(0x7f00000007c0)='/dev/v4l-subdev#\x00', 0x0, 0x800) r2 = openat(r0, &(0x7f0000000840)='./file0//ile0\x00', 0x0, 0x1) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f00000008c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @mcast1}, 0x4, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000480)='./file0//ile0\x00') lstat(&(0x7f0000000600)='./file0//ile0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x7) r3 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000540), 0x0) r4 = dup3(r3, r1, 0x80000) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f0000000400)) [ 935.728472][ T7496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 935.736442][ T7496] RBP: 00007ffd44e54f60 R08: 0000000000000001 R09: 0000000001ce2940 [ 935.744406][ T7496] R10: 0000000001ce2c10 R11: 0000000000000246 R12: 0000000000000001 [ 935.752368][ T7496] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 935.761289][ T6181] device lo left promiscuous mode 23:39:09 executing program 0 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 935.788869][ T7496] memory: usage 307200kB, limit 307200kB, failcnt 2075 [ 935.793467][ T6183] device lo entered promiscuous mode [ 935.796882][ T7496] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 935.808886][ T7496] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 935.816040][ T7496] Memory cgroup stats for /syz2: cache:1804KB rss:228820KB rss_huge:196608KB shmem:1804KB mapped_file:1848KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1768KB active_anon:228952KB inactive_file:0KB active_file:0KB unevictable:0KB 23:39:09 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\a\x00', 0x101}) 23:39:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) syslog(0x2, 0xfffffffffffffffe, 0x248) fcntl$setstatus(r0, 0x4, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) [ 935.878882][ T6189] FAULT_INJECTION: forcing a failure. [ 935.878882][ T6189] name failslab, interval 1, probability 0, space 0, times 0 [ 935.925138][ T6192] EXT4-fs (sda1): Cannot specify journal on remount [ 935.939884][ T7496] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=10205,uid=0 [ 935.955386][ T6195] device lo left promiscuous mode [ 935.958011][ T6189] CPU: 1 PID: 6189 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 935.969434][ T6189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.979499][ T6189] Call Trace: [ 935.982807][ T6189] dump_stack+0x172/0x1f0 [ 935.985503][ T6195] device lo entered promiscuous mode [ 935.987237][ T6189] should_fail.cold+0xa/0x15 [ 935.987260][ T6189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.987277][ T6189] ? mark_held_locks+0xa4/0xf0 [ 935.987300][ T6189] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 936.013465][ T6189] ? __debug_object_init+0x4aa/0xe00 [ 936.018739][ T6189] __should_failslab+0x121/0x190 [ 936.023667][ T6189] should_failslab+0x9/0x14 [ 936.028154][ T6189] kmem_cache_alloc_node+0x56/0x710 [ 936.033337][ T6189] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 936.039214][ T6189] ? __debug_object_init+0x4aa/0xe00 [ 936.044504][ T6189] __alloc_skb+0xd5/0x5e0 [ 936.048823][ T6189] ? skb_trim+0x190/0x190 [ 936.053135][ T6189] ? lockdep_init_map+0x10c/0x5b0 [ 936.058233][ T6189] h5_link_control.isra.0+0x2f/0xa0 [ 936.063415][ T6189] h5_open+0x438/0x5f0 [ 936.067468][ T6189] ? h5_rx_crc+0x20/0x20 [ 936.071696][ T6189] ? ___might_sleep+0x163/0x280 [ 936.076542][ T6189] hci_uart_tty_ioctl+0x2d4/0xa70 [ 936.081550][ T6189] tty_ioctl+0xac9/0x14d0 [ 936.085860][ T6189] ? debug_smp_processor_id+0x3c/0x280 [ 936.091299][ T6189] ? hci_uart_init_work+0x150/0x150 [ 936.096480][ T6189] ? tty_register_device+0x40/0x40 [ 936.101578][ T6189] ? mark_held_locks+0xf0/0xf0 [ 936.106327][ T6189] ? debug_smp_processor_id+0x3c/0x280 [ 936.111775][ T6189] ? perf_trace_lock_acquire+0xf5/0x580 [ 936.117303][ T6189] ? __f_unlock_pos+0x19/0x20 [ 936.121961][ T6189] ? __fget+0x35a/0x550 [ 936.126097][ T6189] ? find_held_lock+0x35/0x130 [ 936.130845][ T6189] ? __fget+0x35a/0x550 [ 936.134987][ T6189] ? tty_register_device+0x40/0x40 [ 936.140088][ T6189] do_vfs_ioctl+0xd6e/0x1390 [ 936.144674][ T6189] ? kasan_check_read+0x11/0x20 [ 936.149515][ T6189] ? ioctl_preallocate+0x210/0x210 [ 936.154621][ T6189] ? __fget+0x381/0x550 [ 936.158769][ T6189] ? ksys_dup3+0x3e0/0x3e0 [ 936.163168][ T6189] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 936.169389][ T6189] ? fput_many+0x12c/0x1a0 [ 936.173787][ T6189] ? fput+0x1b/0x20 [ 936.177585][ T6189] ? security_file_ioctl+0x93/0xc0 [ 936.182682][ T6189] ksys_ioctl+0xab/0xd0 [ 936.186822][ T6189] __x64_sys_ioctl+0x73/0xb0 [ 936.191396][ T6189] do_syscall_64+0x103/0x610 [ 936.195987][ T6189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.201876][ T6189] RIP: 0033:0x457e29 [ 936.205768][ T6189] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 936.225351][ T6189] RSP: 002b:00007f851c400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 936.233745][ T6189] RAX: ffffffffffffffda RBX: 00007f851c400c90 RCX: 0000000000457e29 [ 936.241695][ T6189] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 936.249645][ T6189] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 936.257608][ T6189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f851c4016d4 [ 936.265559][ T6189] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 [ 936.276251][ T6195] device lo left promiscuous mode [ 936.278095][ T7496] Memory cgroup out of memory: Killed process 10205 (syz-executor.2) total-vm:72580kB, anon-rss:2200kB, file-rss:35800kB, shmem-rss:0kB [ 936.299409][ T6201] device lo entered promiscuous mode 23:39:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xfff, 0x9}, 0xa) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x44, 0x2, 0x8, "16a0bd972ed346b570df1e27875279a6", "fd915ff297d479cc9d0f3481b8e66ae0ef40182aec8688da9551feb8bf9813b77a5c1b39573c06cea527e688a0add1"}, 0x44, 0x1) syz_open_dev$vivid(&(0x7f0000000340)='/dev/video#\x00', 0x3, 0x2) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video37\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x400, 0x0) syz_open_dev$usb(&(0x7f0000000680)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x48002) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x90180, 0x0) syz_open_dev$video4linux(&(0x7f00000007c0)='/dev/v4l-subdev#\x00', 0x0, 0x800) r2 = openat(r0, &(0x7f0000000840)='./file0//ile0\x00', 0x0, 0x1) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f00000008c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @mcast1}, 0x4, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000480)='./file0//ile0\x00') lstat(&(0x7f0000000600)='./file0//ile0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x7) r3 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000540), 0x0) r4 = dup3(r3, r1, 0x80000) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f0000000400)) 23:39:10 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\b\x00', 0x101}) 23:39:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 936.369081][ T6205] EXT4-fs (sda1): Cannot specify journal on remount [ 936.408802][ T6212] device lo left promiscuous mode 23:39:10 executing program 0 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:39:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 936.460870][ T6214] device lo entered promiscuous mode [ 936.500637][ T6212] device lo left promiscuous mode 23:39:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x250803, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000000c0)=0x800, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000100)=0x18, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/9) [ 936.521149][ T6216] FAULT_INJECTION: forcing a failure. [ 936.521149][ T6216] name failslab, interval 1, probability 0, space 0, times 0 [ 936.523531][ T7496] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 936.541168][ T6216] CPU: 0 PID: 6216 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 936.554619][ T6216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.564673][ T6216] Call Trace: [ 936.567976][ T6216] dump_stack+0x172/0x1f0 [ 936.572315][ T6216] should_fail.cold+0xa/0x15 [ 936.576913][ T6216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 936.582731][ T6216] ? __debug_object_init+0x4aa/0xe00 [ 936.588020][ T6216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.594256][ T6216] ? should_fail+0x1de/0x852 [ 936.598850][ T6216] __should_failslab+0x121/0x190 [ 936.603787][ T6216] should_failslab+0x9/0x14 [ 936.608298][ T6216] kmem_cache_alloc_node_trace+0x5a/0x720 [ 936.614022][ T6216] __kmalloc_node_track_caller+0x3d/0x70 [ 936.619650][ T6216] __kmalloc_reserve.isra.0+0x40/0xf0 [ 936.625038][ T6216] __alloc_skb+0x10b/0x5e0 [ 936.629451][ T6216] ? skb_trim+0x190/0x190 [ 936.633777][ T6216] ? lockdep_init_map+0x10c/0x5b0 [ 936.638801][ T6216] h5_link_control.isra.0+0x2f/0xa0 [ 936.644003][ T6216] h5_open+0x438/0x5f0 [ 936.648069][ T6216] ? h5_rx_crc+0x20/0x20 [ 936.652306][ T6216] ? ___might_sleep+0x163/0x280 [ 936.657157][ T6216] hci_uart_tty_ioctl+0x2d4/0xa70 [ 936.662179][ T6216] tty_ioctl+0xac9/0x14d0 [ 936.666504][ T6216] ? debug_smp_processor_id+0x3c/0x280 [ 936.671960][ T6216] ? hci_uart_init_work+0x150/0x150 [ 936.677165][ T6216] ? tty_register_device+0x40/0x40 [ 936.682285][ T6216] ? mark_held_locks+0xf0/0xf0 [ 936.687052][ T6216] ? debug_smp_processor_id+0x3c/0x280 [ 936.692511][ T6216] ? perf_trace_lock_acquire+0xf5/0x580 [ 936.698054][ T6216] ? __f_unlock_pos+0x19/0x20 [ 936.702740][ T6216] ? __fget+0x35a/0x550 [ 936.706895][ T6216] ? find_held_lock+0x35/0x130 [ 936.711687][ T6216] ? __fget+0x35a/0x550 [ 936.715866][ T6216] ? tty_register_device+0x40/0x40 [ 936.720976][ T6216] do_vfs_ioctl+0xd6e/0x1390 [ 936.725563][ T6216] ? kasan_check_read+0x11/0x20 [ 936.730410][ T6216] ? ioctl_preallocate+0x210/0x210 [ 936.735513][ T6216] ? __fget+0x381/0x550 [ 936.739667][ T6216] ? ksys_dup3+0x3e0/0x3e0 [ 936.744084][ T6216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 936.750314][ T6216] ? fput_many+0x12c/0x1a0 [ 936.754748][ T6216] ? fput+0x1b/0x20 [ 936.758558][ T6216] ? security_file_ioctl+0x93/0xc0 [ 936.763671][ T6216] ksys_ioctl+0xab/0xd0 [ 936.767835][ T6216] __x64_sys_ioctl+0x73/0xb0 [ 936.772424][ T6216] do_syscall_64+0x103/0x610 [ 936.777017][ T6216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.782901][ T6216] RIP: 0033:0x457e29 [ 936.786792][ T6216] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 936.806388][ T6216] RSP: 002b:00007f851c400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 936.814805][ T6216] RAX: ffffffffffffffda RBX: 00007f851c400c90 RCX: 0000000000457e29 23:39:10 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0605345, &(0x7f00000001c0)) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8000, 0x100) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x9, 0x80000001, 0x7}) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) [ 936.822765][ T6216] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 936.822774][ T6216] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 936.822782][ T6216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f851c4016d4 [ 936.822790][ T6216] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 [ 936.845573][ T7496] CPU: 1 PID: 7496 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 936.855090][ T7496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.855096][ T7496] Call Trace: [ 936.855114][ T7496] dump_stack+0x172/0x1f0 [ 936.855134][ T7496] dump_header+0x10f/0xba6 [ 936.855150][ T7496] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 936.855171][ T7496] ? ___ratelimit+0x60/0x595 [ 936.896548][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 936.901659][ T7496] oom_kill_process.cold+0x10/0x15 [ 936.906776][ T7496] out_of_memory+0x79a/0x1280 [ 936.911466][ T7496] ? lock_downgrade+0x880/0x880 [ 936.916313][ T7496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.922549][ T7496] ? oom_killer_disable+0x280/0x280 [ 936.927741][ T7496] ? find_held_lock+0x35/0x130 [ 936.932513][ T7496] mem_cgroup_out_of_memory+0x1ca/0x230 [ 936.938059][ T7496] ? memcg_event_wake+0x230/0x230 [ 936.943081][ T7496] ? do_raw_spin_unlock+0x57/0x270 [ 936.948191][ T7496] ? _raw_spin_unlock+0x2d/0x50 [ 936.953046][ T7496] try_charge+0x118d/0x1790 [ 936.957551][ T7496] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 936.963119][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 936.968659][ T7496] ? find_held_lock+0x35/0x130 [ 936.973418][ T7496] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 936.978973][ T7496] __memcg_kmem_charge_memcg+0x7c/0x130 [ 936.984514][ T7496] ? memcg_kmem_put_cache+0xb0/0xb0 [ 936.989716][ T7496] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 936.995259][ T7496] __memcg_kmem_charge+0x136/0x300 [ 937.000371][ T7496] __alloc_pages_nodemask+0x437/0x7e0 [ 937.006207][ T7496] ? debug_smp_processor_id+0x3c/0x280 [ 937.011666][ T7496] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 937.017391][ T7496] ? lock_downgrade+0x880/0x880 [ 937.022246][ T7496] ? find_held_lock+0x35/0x130 [ 937.027008][ T7496] ? percpu_ref_put_many+0x94/0x190 [ 937.032204][ T7496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 937.038451][ T7496] alloc_pages_current+0x107/0x210 [ 937.043561][ T7496] __get_free_pages+0xc/0x40 [ 937.048144][ T7496] pgd_alloc+0x8b/0x3f0 [ 937.052294][ T7496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.058530][ T7496] ? pgd_page_get_mm+0x40/0x40 [ 937.063290][ T7496] ? lockdep_init_map+0x10c/0x5b0 [ 937.068312][ T7496] ? lockdep_init_map+0x10c/0x5b0 [ 937.073349][ T7496] mm_init+0x590/0x9b0 [ 937.077429][ T7496] copy_process.part.0+0x2b92/0x79e0 [ 937.082722][ T7496] ? debug_smp_processor_id+0x3c/0x280 [ 937.088177][ T7496] ? perf_trace_lock_acquire+0xf5/0x580 [ 937.093737][ T7496] ? __cleanup_sighand+0x60/0x60 [ 937.098684][ T7496] ? lock_downgrade+0x880/0x880 [ 937.103550][ T7496] _do_fork+0x257/0xfd0 [ 937.107709][ T7496] ? fork_idle+0x1d0/0x1d0 [ 937.112138][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.117594][ T7496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.123048][ T7496] ? do_syscall_64+0x26/0x610 [ 937.127721][ T7496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.133782][ T7496] ? do_syscall_64+0x26/0x610 [ 937.138462][ T7496] __x64_sys_clone+0xbf/0x150 [ 937.143142][ T7496] do_syscall_64+0x103/0x610 [ 937.147733][ T7496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.153621][ T7496] RIP: 0033:0x4563fa [ 937.157529][ T7496] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 937.177127][ T7496] RSP: 002b:00007ffd44e54f20 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 937.185531][ T7496] RAX: ffffffffffffffda RBX: 00007ffd44e54f20 RCX: 00000000004563fa [ 937.193510][ T7496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 937.203463][ T7496] RBP: 00007ffd44e54f60 R08: 0000000000000001 R09: 0000000001ce2940 [ 937.212385][ T7496] R10: 0000000001ce2c10 R11: 0000000000000246 R12: 0000000000000001 23:39:11 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\n\x00', 0x101}) [ 937.220352][ T7496] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 937.233853][ T6218] EXT4-fs (sda1): Cannot specify journal on remount [ 937.239990][ T7496] memory: usage 307200kB, limit 307200kB, failcnt 2115 [ 937.278294][ T6226] device lo entered promiscuous mode [ 937.287768][ T7496] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 937.312372][ T6229] EXT4-fs (sda1): Cannot specify journal on remount [ 937.319272][ T6226] device lo left promiscuous mode [ 937.324519][ T7496] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 937.329951][ T6231] device lo entered promiscuous mode [ 937.341117][ T7496] Memory cgroup stats for /syz2: cache:1804KB rss:228808KB rss_huge:196608KB shmem:1804KB mapped_file:1848KB dirty:132KB writeback:0KB swap:0KB inactive_anon:1768KB active_anon:228960KB inactive_file:0KB active_file:0KB unevictable:0KB 23:39:11 executing program 1: r0 = epoll_create1(0x7fffe) fcntl$lock(r0, 0x25, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x800000000000000}) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x1}) r1 = socket$caif_seqpacket(0x25, 0x5, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 23:39:11 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\f\x00', 0x101}) [ 937.372190][ T7496] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=6210,uid=0 [ 937.401478][ T7496] Memory cgroup out of memory: Killed process 6210 (syz-executor.2) total-vm:72580kB, anon-rss:2208kB, file-rss:35804kB, shmem-rss:0kB 23:39:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)=0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000100)=0xe) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x3}, 0x8) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/9) 23:39:11 executing program 0 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 937.433702][ T1044] oom_reaper: reaped process 6210 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 937.484785][ T6233] device lo left promiscuous mode 23:39:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 937.508397][ T6237] device lo entered promiscuous mode [ 937.512137][ T6242] FAULT_INJECTION: forcing a failure. [ 937.512137][ T6242] name failslab, interval 1, probability 0, space 0, times 0 [ 937.533637][ T6242] CPU: 1 PID: 6242 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 937.542764][ T6242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.552814][ T6242] Call Trace: [ 937.556112][ T6242] dump_stack+0x172/0x1f0 [ 937.560462][ T6242] should_fail.cold+0xa/0x15 [ 937.565058][ T6242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.570873][ T6242] ? ___might_sleep+0x163/0x280 [ 937.575730][ T6242] __should_failslab+0x121/0x190 [ 937.580674][ T6242] should_failslab+0x9/0x14 [ 937.585181][ T6242] kmem_cache_alloc_trace+0x2d1/0x760 [ 937.590554][ T6242] ? h5_open+0x472/0x5f0 [ 937.594802][ T6242] ? h5_rx_crc+0x20/0x20 [ 937.599052][ T6242] ? ___might_sleep+0x163/0x280 [ 937.603937][ T6242] hci_alloc_dev+0x43/0x1d00 [ 937.608534][ T6242] hci_uart_tty_ioctl+0x321/0xa70 [ 937.613566][ T6242] tty_ioctl+0xac9/0x14d0 [ 937.617902][ T6242] ? debug_smp_processor_id+0x3c/0x280 [ 937.623367][ T6242] ? hci_uart_init_work+0x150/0x150 [ 937.628581][ T6242] ? tty_register_device+0x40/0x40 [ 937.633713][ T6242] ? mark_held_locks+0xf0/0xf0 [ 937.638483][ T6242] ? debug_smp_processor_id+0x3c/0x280 [ 937.643948][ T6242] ? perf_trace_lock_acquire+0xf5/0x580 [ 937.649496][ T6242] ? __f_unlock_pos+0x19/0x20 [ 937.654178][ T6242] ? __fget+0x35a/0x550 [ 937.658333][ T6242] ? find_held_lock+0x35/0x130 [ 937.663100][ T6242] ? __fget+0x35a/0x550 [ 937.667259][ T6242] ? tty_register_device+0x40/0x40 [ 937.672380][ T6242] do_vfs_ioctl+0xd6e/0x1390 [ 937.676975][ T6242] ? kasan_check_read+0x11/0x20 [ 937.681836][ T6242] ? ioctl_preallocate+0x210/0x210 [ 937.686948][ T6242] ? __fget+0x381/0x550 [ 937.691115][ T6242] ? ksys_dup3+0x3e0/0x3e0 [ 937.695535][ T6242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 937.701778][ T6242] ? fput_many+0x12c/0x1a0 [ 937.706194][ T6242] ? fput+0x1b/0x20 [ 937.710026][ T6242] ? security_file_ioctl+0x93/0xc0 [ 937.715144][ T6242] ksys_ioctl+0xab/0xd0 [ 937.719322][ T6242] __x64_sys_ioctl+0x73/0xb0 [ 937.723933][ T6242] do_syscall_64+0x103/0x610 [ 937.728528][ T6242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.734416][ T6242] RIP: 0033:0x457e29 [ 937.738312][ T6242] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 937.758014][ T6242] RSP: 002b:00007f851c400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 937.766421][ T6242] RAX: ffffffffffffffda RBX: 00007f851c400c90 RCX: 0000000000457e29 [ 937.774408][ T6242] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 937.782384][ T6242] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 937.790356][ T6242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f851c4016d4 [ 937.798333][ T6242] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 [ 937.809597][ T17] kasan: CONFIG_KASAN_INLINE enabled [ 937.813387][ T6242] Bluetooth: Can't allocate HCI device [ 937.817737][ T880] Bluetooth: Invalid header checksum [ 937.842956][ T17] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 937.862125][ T880] ================================================================== [ 937.870577][ T880] BUG: KASAN: use-after-free in h5_reset_rx+0xe0/0x100 [ 937.870594][ T880] Read of size 8 at addr ffff88809117be18 by task kworker/u4:4/880 [ 937.870605][ T880] [ 937.870620][ T880] CPU: 1 PID: 880 Comm: kworker/u4:4 Not tainted 5.0.0-rc6-next-20190215 #36 [ 937.870628][ T880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.870644][ T880] Workqueue: events_unbound flush_to_ldisc [ 937.870652][ T880] Call Trace: [ 937.870667][ T880] dump_stack+0x172/0x1f0 [ 937.870681][ T880] ? h5_reset_rx+0xe0/0x100 [ 937.870697][ T880] print_address_description.cold+0x7c/0x20d [ 937.870712][ T880] ? h5_reset_rx+0xe0/0x100 [ 937.885407][ T880] ? h5_reset_rx+0xe0/0x100 [ 937.885425][ T880] kasan_report.cold+0x1b/0x40 [ 937.885442][ T880] ? h5_reset_rx+0xe0/0x100 [ 937.885460][ T880] __asan_report_load8_noabort+0x14/0x20 [ 937.885472][ T880] h5_reset_rx+0xe0/0x100 [ 937.885487][ T880] h5_rx_3wire_hdr+0x2f5/0x3c0 [ 937.885507][ T880] h5_recv+0x30a/0x4c0 [ 937.896562][ T880] ? h5_slip_one_byte+0x1d0/0x1d0 [ 937.896590][ T880] hci_uart_tty_receive+0x22b/0x530 [ 937.896613][ T880] ? hci_uart_write_work+0x710/0x710 [ 937.896631][ T880] tty_ldisc_receive_buf+0x164/0x1c0 [ 937.896646][ T880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.896662][ T880] tty_port_default_receive_buf+0x7d/0xb0 [ 937.896680][ T880] flush_to_ldisc+0x228/0x390 [ 937.925659][ T6250] EXT4-fs (sda1): Cannot specify journal on remount [ 937.930588][ T880] process_one_work+0x98e/0x1790 [ 937.930619][ T880] ? pwq_dec_nr_in_flight+0x320/0x320 [ 938.021663][ T880] ? lock_acquire+0x16f/0x3f0 [ 938.026361][ T880] worker_thread+0x98/0xe40 [ 938.030879][ T880] kthread+0x357/0x430 [ 938.034946][ T880] ? process_one_work+0x1790/0x1790 [ 938.040141][ T880] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 938.046395][ T880] ret_from_fork+0x3a/0x50 [ 938.050817][ T880] [ 938.053139][ T880] Allocated by task 6242: [ 938.057463][ T880] save_stack+0x45/0xd0 [ 938.061624][ T880] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 938.067262][ T880] kasan_kmalloc+0x9/0x10 [ 938.071597][ T880] kmem_cache_alloc_trace+0x151/0x760 [ 938.076964][ T880] h5_open+0x4e4/0x5f0 [ 938.081025][ T880] hci_uart_tty_ioctl+0x2d4/0xa70 [ 938.086044][ T880] tty_ioctl+0xac9/0x14d0 [ 938.090377][ T880] do_vfs_ioctl+0xd6e/0x1390 [ 938.094963][ T880] ksys_ioctl+0xab/0xd0 [ 938.099116][ T880] __x64_sys_ioctl+0x73/0xb0 [ 938.103703][ T880] do_syscall_64+0x103/0x610 [ 938.108302][ T880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.114183][ T880] [ 938.116500][ T880] Freed by task 6242: [ 938.120484][ T880] save_stack+0x45/0xd0 [ 938.124634][ T880] __kasan_slab_free+0x102/0x150 [ 938.129568][ T880] kasan_slab_free+0xe/0x10 [ 938.134072][ T880] kfree+0xcf/0x230 [ 938.137877][ T880] h5_close+0x11a/0x150 [ 938.142032][ T880] hci_uart_tty_ioctl+0x839/0xa70 [ 938.147055][ T880] tty_ioctl+0xac9/0x14d0 [ 938.151381][ T880] do_vfs_ioctl+0xd6e/0x1390 [ 938.155981][ T880] ksys_ioctl+0xab/0xd0 [ 938.160146][ T880] __x64_sys_ioctl+0x73/0xb0 [ 938.164734][ T880] do_syscall_64+0x103/0x610 [ 938.169317][ T880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.175207][ T880] [ 938.177535][ T880] The buggy address belongs to the object at ffff88809117bb40 [ 938.177535][ T880] which belongs to the cache kmalloc-1k of size 1024 [ 938.191594][ T880] The buggy address is located 728 bytes inside of [ 938.191594][ T880] 1024-byte region [ffff88809117bb40, ffff88809117bf40) [ 938.204938][ T880] The buggy address belongs to the page: [ 938.210564][ T880] page:ffffea0002445e80 count:1 mapcount:0 mapping:ffff88812c3f0ac0 index:0x0 compound_mapcount: 0 [ 938.221233][ T880] flags: 0x1fffc0000010200(slab|head) [ 938.226614][ T880] raw: 01fffc0000010200 ffffea000226a888 ffffea000097a788 ffff88812c3f0ac0 [ 938.235195][ T880] raw: 0000000000000000 ffff88809117a040 0000000100000007 0000000000000000 [ 938.243768][ T880] page dumped because: kasan: bad access detected [ 938.250169][ T880] [ 938.252486][ T880] Memory state around the buggy address: [ 938.258117][ T880] ffff88809117bd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 938.266173][ T880] ffff88809117bd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 938.274232][ T880] >ffff88809117be00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 938.282297][ T880] ^ [ 938.287148][ T880] ffff88809117be80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 938.295207][ T880] ffff88809117bf00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 938.303258][ T880] ================================================================== 23:39:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x214000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x7) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0xfffffffffffffd62) r2 = syz_open_procfs(0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x100000001, @mcast2, 0x3}, 0x1c) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000480)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x903, 0x4, 0x25dfdbfe}, 0x1c}}, 0x40) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) [ 938.311314][ T880] Disabling lock debugging due to kernel taint [ 938.326149][ T17] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 938.333102][ T17] CPU: 1 PID: 17 Comm: kworker/1:0 Tainted: G B 5.0.0-rc6-next-20190215 #36 [ 938.341938][ T3874] kobject: 'loop2' (000000009a2eaf14): kobject_uevent_env [ 938.343060][ T17] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.343078][ T17] Workqueue: events hci_uart_write_work [ 938.343095][ T17] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 938.343107][ T17] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 9e 2a 4f 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 938.343119][ T17] RSP: 0018:ffff8880a96d7cb0 EFLAGS: 00010203 [ 938.351355][ T3874] kobject: 'loop2' (000000009a2eaf14): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 938.360248][ T17] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 938.360256][ T17] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 938.360264][ T17] RBP: ffff8880a96d7d30 R08: ffff8880a96c8480 R09: ffff8880a96c8d48 [ 938.360271][ T17] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88808ec21800 [ 938.360278][ T17] R13: ffff888018481500 R14: ffff88801f29eaa8 R15: ffff88808ec21870 [ 938.360288][ T17] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 938.360295][ T17] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 938.360306][ T17] CR2: 000055e42cb8daa8 CR3: 00000000aa3db000 CR4: 00000000001406e0 [ 938.470645][ T17] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 938.478606][ T17] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 938.486569][ T17] Call Trace: [ 938.489864][ T17] process_one_work+0x98e/0x1790 [ 938.494803][ T17] ? pwq_dec_nr_in_flight+0x320/0x320 [ 938.500171][ T17] ? lock_acquire+0x16f/0x3f0 [ 938.504849][ T17] worker_thread+0x98/0xe40 [ 938.509353][ T17] kthread+0x357/0x430 23:39:12 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40801, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe127a9ad) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)={0x3, [0x9, 0x5, 0x678b]}, 0xa) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x81, 0x3f, 0x2, 0x80, 0x0, 0x0, 0x2502, 0x8, 0x2, 0x8001, 0x8, 0x401, 0xffffffffffff972f, 0x8, 0x8, 0x0, 0x0, 0x2, 0x40, 0x7f, 0xff, 0x0, 0x2, 0x2, 0x3, 0x7, 0x4, 0x8, 0xc7, 0x1, 0x8001, 0x0, 0x80, 0x5, 0x80000001, 0x9, 0x0, 0x400, 0x0, @perf_config_ext={0x8, 0x41d}, 0x80, 0x3, 0xce14, 0x7, 0xd1, 0x1, 0x9}, r2, 0xe, r0, 0x1) sendto$packet(r0, &(0x7f0000000080)="3933b6f24ef5", 0x6, 0x24000000, &(0x7f0000000240)={0x11, 0x18, r1, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000002c0)) [ 938.513420][ T17] ? process_one_work+0x1790/0x1790 [ 938.518613][ T17] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 938.524848][ T17] ret_from_fork+0x3a/0x50 [ 938.529260][ T17] Modules linked in: [ 938.547929][ T17] ---[ end trace 648ed945e1071fc4 ]--- [ 938.555029][ T3874] kobject: 'loop1' (0000000043d05178): kobject_uevent_env [ 938.557009][ T17] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 938.567687][ T3874] kobject: 'loop1' (0000000043d05178): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 938.581364][ T17] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 9e 2a 4f 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 938.602785][ T6250] kobject: 'loop3' (000000004e7fc329): kobject_uevent_env 23:39:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$void(r0, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x30ce4901, 0x20000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000000c0)=0x3f, 0x8) r3 = accept$alg(r0, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000200), 0x7cecda53) recvmmsg(r4, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1}}], 0x34, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) setsockopt(r2, 0xe0d, 0xd873, &(0x7f0000001740)="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", 0x1000) [ 938.612688][ T6250] kobject: 'loop3' (000000004e7fc329): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 938.621696][ T17] RSP: 0018:ffff8880a96d7cb0 EFLAGS: 00010203 [ 938.632150][ T17] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 938.641327][ T17] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 938.642531][ T3874] kobject: 'loop1' (0000000043d05178): kobject_uevent_env [ 938.651867][ T17] RBP: ffff8880a96d7d30 R08: ffff8880a96c8480 R09: ffff8880a96c8d48 [ 938.662547][ T3874] kobject: 'loop1' (0000000043d05178): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 938.669691][ T6260] kobject: 'loop3' (000000004e7fc329): kobject_uevent_env [ 938.676974][ T3874] kobject: 'loop3' (000000004e7fc329): kobject_uevent_env [ 938.682565][ T6260] kobject: 'loop3' (000000004e7fc329): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 938.697950][ T3874] kobject: 'loop3' (000000004e7fc329): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 938.699934][ T17] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88808ec21800 [ 938.718049][ T17] R13: ffff888018481500 R14: ffff88801f29eaa8 R15: ffff88808ec21870 [ 938.726705][ T17] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 938.727077][ T3874] kobject: 'loop3' (000000004e7fc329): kobject_uevent_env [ 938.736100][ T17] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 938.749796][ T17] CR2: 0000000000940004 CR3: 0000000083928000 CR4: 00000000001406e0 23:39:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x100020, &(0x7f0000000240)={[{@journal_dev={'journal_dev'}}]}) [ 938.752327][ T3874] kobject: 'loop3' (000000004e7fc329): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 938.768499][ T17] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 938.781377][ T17] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 938.790256][ T17] Kernel panic - not syncing: Fatal exception [ 938.797541][ T17] Kernel Offset: disabled [ 938.801859][ T17] Rebooting in 86400 seconds..