[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.38' (ECDSA) to the list of known hosts. 2020/07/14 04:11:56 fuzzer started 2020/07/14 04:11:57 dialing manager at 10.128.0.105:45745 2020/07/14 04:11:57 syscalls: 3015 2020/07/14 04:11:57 code coverage: enabled 2020/07/14 04:11:57 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/07/14 04:11:57 extra coverage: extra coverage is not supported by the kernel 2020/07/14 04:11:57 setuid sandbox: enabled 2020/07/14 04:11:57 namespace sandbox: enabled 2020/07/14 04:11:57 Android sandbox: enabled 2020/07/14 04:11:57 fault injection: enabled 2020/07/14 04:11:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/14 04:11:57 net packet injection: enabled 2020/07/14 04:11:57 net device setup: enabled 2020/07/14 04:11:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/14 04:11:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/14 04:11:57 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 36.142882] random: crng init done [ 36.146485] random: 7 urandom warning(s) missed due to ratelimiting 04:13:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x9c0000, 0x2, 0xb5, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9909db, 0x4, [], @value64=0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x8, 0x40, 0x2e, @private1, @mcast1, 0x8, 0x7, 0xffff0001, 0x3}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@private0={0xfc, 0x0, [], 0x1}, @private2, @private1={0xfc, 0x1, [], 0x1}, 0x2, 0xf801, 0x1, 0x0, 0x10001, 0x700042, r2}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x301000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000, r1}) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000240)={{r4}, 0x9, 0xddc, 0xc881}) r5 = request_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)=')\\\'},*\x00', 0x0) keyctl$instantiate(0xc, r5, &(0x7f0000000340)=@encrypted_load={'load ', 'default', 0x20, 'user:', '/dev/ocfs2_control\x00', 0x20, 0x8, 0x20, [0x61, 0x63, 0x66]}, 0x3f, 0xfffffffffffffffa) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x242100, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r6, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x1, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c014}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f00000004c0)) r7 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) keyctl$invalidate(0x15, r5) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000640)={0xa20000, 0x3ff, 0x3, r6, 0x0, &(0x7f0000000600)={0x9a0915, 0x6, [], @string=&(0x7f00000005c0)=0x6}}) sendmsg$NFQNL_MSG_VERDICT_BATCH(r8, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x3, 0x3, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x3}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x20}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x9a}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x1}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048480}, 0x0) getsockopt$bt_hci(r8, 0x0, 0x2, &(0x7f00000007c0)=""/25, &(0x7f0000000800)=0x19) 04:13:03 executing program 1: ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)={0x0, 0x0, [0x8, 0x5, 0xb6c, 0x9e2]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x488000, 0xe875f4371d8d8e34) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)=0x1) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0xa10000, 0x7, 0x60f, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x0, 0x5, [], @value64=0xd91c}}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000180)={0x8e, ""/142}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x8001, 0x0) write$P9_RWALK(r2, &(0x7f0000000280)={0x71, 0x6f, 0x2, {0x8, [{0x40, 0x1, 0x6}, {0x29, 0x2, 0x5}, {0x2, 0x1, 0x3}, {0x8, 0x0, 0x8}, {0x10, 0x1, 0x7}, {0x20, 0x1, 0x8}, {0x40, 0x2}, {0x20, 0x2, 0x5}]}}, 0x71) r3 = dup2(r2, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x200, 0x10}, 0xc) r4 = accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x800) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000640)) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000680)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmmsg$nfc_llcp(r5, &(0x7f0000003ec0)=[{&(0x7f00000006c0)={0x27, 0x1, 0x1, 0x7, 0x4a, 0xd, "17a8f3a3d2434c3c4fb6ef3daff84a9b64171a4704f250295ac972bc3e5fefd131fc8e36102595c64df35105115c14ff091ec363191b1434cbf135c8db1a10", 0x24}, 0x60, &(0x7f00000008c0)=[{&(0x7f0000000740)="eaa0abfdfcdaa49ea7798f185f29e61a625488eb6344c4", 0x17}, {&(0x7f0000000780)="1b87fedd800c9e84e5bc2f900607bb01455be3ea7bb2fdf60c6750c53ae179b30f58cbbfa031e030d610a3cb0045855711cbbe5a39f1036ed12281c890a2ef67f1fa8bce2e4bd3fff0599d65b762457fc379a9813dde508e8f8b46840c97e86d41006275922d990d1e07b90666ba255a820be4552e0c87e7bb1a98e4e4669c23557070f0cbd9b0e01439a69301d5dff054a2614277a5487a843a5cf6ca97666b50fecdb6aa56450a8f96fd", 0xab}, {&(0x7f0000000840)="89b76df6c753dcd8203465b9f7c39bac33600428312c2ab2916891783a0891a3e6c729f50c30b04c649a68529c19c0970cf63760d81dd7cb5acaafc29c8d9b03caf153154c8cd5f0db59a61cfab13cac3409881e5e3713dc61c2dfb4806a1ea6d5bed7c4c2de21439bc6b9ee764eb9195c402c6900c3179713035867", 0x7c}], 0x3, &(0x7f0000000900)={0x38, 0x10e, 0xcc, "fed7cc13efad068611467389c4e463737f490e091e875a99a5f8fb79f4c91a33d7a2996dcf904efd"}, 0x38, 0x80}, {&(0x7f0000000940)={0x27, 0x1, 0x1, 0x4, 0x3, 0x3, "e678fc1d63fa7dff2f74752bb88ab928d9590915bce81e3de4279fa679172953231393abf3169135da02b0ec5891eb95fbfb2d8c2f74f97316e827f7a3ec15", 0x29}, 0x60, &(0x7f0000000a40)=[{&(0x7f00000009c0)="c7c22fe0c272be773b7271ccc95c195c6b9423ef0e614d5bfb4eeca908226e787d31da1b04d4e02e47160e5bb4358ea69c35a0519b42c42d8a51f0b75ec857f338fbd948b90186999f22ce", 0x4b}], 0x1, &(0x7f0000000a80)={0x100, 0x101, 0x0, "806d7c7c755b409dcbb54d60ef1d690d9452cbc20f6e2e43ffc379e4030525d87c6bbb693c1fe53b2d8eeb196d4fd7c40ec513caa3e1978279071878aed66368a8a029d1d6aae1a2bf33ee7a4ef447359f4c765b9a4a16454cb7cbecd99249e7b458ef7aad29881d6a99f0554a1f9e2b8a20ef97666fb687b805fbd84a62b3219f818363ea1850fa5407a3b2a21ef27823291e4843b14fcd23192f091a344636dab399706b32dcf81b22ce2118c3d8381eb904b5a137321fac9c229f8b741805ce9e3c0ab10ef56567b3a9c8e036aae374a089dac97cff90c65a1aeabddd13ac1730bf451392fcf42e7462f99343"}, 0x100, 0x10000000}, {&(0x7f0000000b80)={0x27, 0x0, 0x1, 0x1, 0x7, 0xff, "5e75970f170fb1b9f6a8971dbd1625baba18ef9fd28a20ffd715289fc4f25b7d1c4e09efaef922cf41e3b59bd2a267a476a4bca3df329d4db121c1fc69fd40", 0x34}, 0x60, &(0x7f0000001040)=[{&(0x7f0000000c00)="f0776186ca0ac3d48f10d415d76a15fba305f500bf6ffca62f7e54c9c969ad35a9a849300b68b101adce150c22044c8f6f12d161a35cd1ebd74930a812835c74cab40f93c95dd5b8df1cb1af35e859a0fd4ff63a2e6484e6029acb3f7bbe55374e2d79e05ac2ec4785f62bb5485c3743b2c5dbb02a251fb88bc63c73d44c3b194fa23ac6210dea26c1564777ec510d1f2d19e63db77f123b68d10b39e67d9b1ce556c37a2841ef7831e2ce609ce5253331b2b90929cbfffe89b8325c9ea9c80a1d90f7a48ef2393356c5562d1d0c6e2c363eb9f3b77656fddd1d2a247bd75e9f6c1cd7c0cba3", 0xe6}, {&(0x7f0000000d00)="a38fd0c7a882a8909181b60ef2b54818064f01008bcd1e9e3d72c53ede755a07b7360e3cc3e8acb1b387d0b40e09874e7414da3ab0e680b60d4214e6fa9d8a9249eca3a08e777348744b2bc78ee1b919267dec708aacecb840e87b42451c04d9519824f04722a9ea264f59aa0eaa8c84ccf643f81d9db18f77fc1fc34ccf1ed758e4ebdea7497626e593e996e17bf1435e408e686afcb9c616b0f401257a275c3d695a654c6f653797e6ec15ef310355ca707cbe222cc1b99e851919af9b340989eacf111e9c55209bf7fbad47ee8c9bd06e4379", 0xd4}, {&(0x7f0000000e00)="6f3b63c8fe8f32b3a751986806811d6893f75973a31fb8934d40823441ca249eeb7c524cf0aba5cb5fd7b06e6d2f2b699c241438edd216a1b0c3cea72c9ec0d7f705985ca8ab2e127f26b74ec1e73ae59810f249f99d530c691ec7e8c8336b80c96fc9ac8a6f27f92621fe34da11c50e1f7aff9d920349a77a40420e73e2712c0e1a16b3cf3d339e5cf8581a3921ac6ee9223e2825e8ff734bcb244e78492d13204cad1a636de23a9d58e1ceae0e1940b78578bb8fc0f2ff9d2b21ae548bdcf21e7015", 0xc3}, {&(0x7f0000000f00)="e228c0596b6292b4f96bcb98775350d21052708ce67bdec2c03a19462aaf4aeaa81120077aa66517c22a10b0d8b37e9e959dcfd4c9668d6756eb829a7b51bd9a8f7382c785b7a0b1", 0x48}, {&(0x7f0000000f80)="4aec8eee1e48be7ae3c56cb5419a6c0bcebe7b818d4579e995b86f854ee952b8d2b909cc02e60d9d6b1096eb094b11c0609e3c7adc4a47847f246b8c51d1f189b00ec127a7aab8cab28256f789f1577590b4803b32d0a9d2c04be5f53660a1bf83638023e16c04165045790b38b1322af73acb41c8211d4a09100ab7f58a02be8fd125a684864ca4ac", 0x89}], 0x5, &(0x7f00000010c0)={0xb0, 0x111, 0x5, "42072b82da611161f6dfc6a71c62296df431aeb1331b7f948ecf4df99a5fb62c4a854989cfc13cccfe25666a9bdd2d3302fc4e3d45dbed3fa1b2abb313ba996dd6eaa409b1d6c2006cab6069a0d4bdf4772cdd164a72c302c952a10ccf9c004ebd6cf6b3bfa70dd6dd7dd115831233388cd3d2c255ed219c6aac7c3a3eedb36845a4fbe33e2bb824a7d204f1bad46ab3919b445a117692b20fa3f0"}, 0xb0}, {&(0x7f0000001180)={0x27, 0x0, 0x2, 0x1, 0x4, 0x4, "412ced790d505a5b5109631b88d715f2854fce0358a0f3c61dea55f58daf19d54c1e11d0532cc8acccdcc7bfb2a937a14d563f30289d576ad2e119b03ca977", 0x3}, 0x60, &(0x7f0000001280)=[{&(0x7f0000001200)="5cfbbc40dfebd95b9ea5e0195aa8ac25f36ba3957de2c04e8f54a7d150661b52ade50d2c45a3ae4a4d972c63ffd3c4c58c9842a3adf80d407d1e6b1a61d15ff5a6577ffd9aae8ad4eadb39a299e122b6c9572a20f0148cf70e840442a02f1485bee5f880dc4380d81ac85f5cf24d5a981761", 0x72}], 0x1, &(0x7f00000012c0)={0x38, 0x108, 0x6cdb, "e8a11b083544f38d8fbfc4bbb530e25f1cee795ec1182ea004bf12c4b1a2be00778e54dc20"}, 0x38, 0x20004000}, {&(0x7f0000001300)={0x27, 0x1, 0x0, 0x5, 0x4, 0x4f, "d0ca7282fd530d4a85e6e56db0b3a2c47bdc996b8e1fd81a9d5513d54937ec5eaabcf54861adf57cab05e79fef5105843d8e7b685732161814217b8c61b9f5", 0xd}, 0x60, &(0x7f00000038c0)=[{&(0x7f0000001380)="7a6d71d8", 0x4}, {&(0x7f00000013c0)="1ea144b11077883d557d6c9727f145de77cda68518d8f5841d1eced5974f382eafb79d11a2c4f0a1ad760bf0fffd853de55ae7bb66e2d4e5a00da5902b698b17cfda341470ad7137d1ddc6b8d9648d0fac917a727a7e8ba67796e467d99de0310f306789c4e2075e12af897219132742cdb4e958ae26fc96ae5fbfe1b8221d5a25bf2ab9035df9363fa1c8ed31c37957a77e2c2364f1b92fbbfcb98307fb9f668845f6893a3d5272e7afae038acb00b9a022d9c9062ed0703d14b974fa89f5714486ee0ee2b4397781b20ac519562dec3c5ccb0babd3058d036dd0720d13331a61f519094100146ecdb6e214a3927da3bc9544ac2469", 0xf6}, {&(0x7f00000014c0)="96c4d47e8a0838b786306d68bfd5d907eecf62ff887aaf423db315053d3f340a31452b4ad028e72bcd0dd7adb5305f57fe377f1240c605b0b70e898b739987a720d307ac3fdd711741f98d9c803c7c92c6001033c0e66ed71e6a89bb41fdd852238babc506a930bef6de119fdd7d5f6b3d237daa7c4bd93f4fad85f5df44d9bd0856e0f116add5cda19ec49150c0ddb96429160cd91231e71ccdaebd45fe294bc55fade5b1a0bdd87f99f482c1e4068953131b973ae56862762dab5d9653b3be14edd4eb2ce708eee4156659c6", 0xcd}, {&(0x7f00000015c0)="6ef61891e90253325db58e13a1c7fd2923700a3ca7ab0a0c9024bd761d220b93c7cdbe3b961ea8fb671d23232815f15a7b548d77f286234248aebf1350028653026694a549fd8b350a937af34ea5428aba9194dddb21e63d6115ceb25a50157e411da3d606c57148d9c38982b29dcf4ea904bbbca1bc2f5de3ce269dadef26e9611685faf27114d38051196eaf6a40f7ff38d9710db605101bd07b00447f5256bebbb29c0be420fe647cf6ea94629a7e3913bacde3abfb90dc614f4ae680f250c9f855de77549330b55d05a7663660eb5ff5547f97f0e10c1c313e5c2f7ccf06117e391273c14c4e53f213730e675c9d6ebbecb9776cf498cafff18e65f46663488606e7136fb4bdd83dc38d555da1ebe550ae3aaf4327135d16b9ec0dd8069ff210a2ceb6ff538838b389ae304cdd074d4bd5b9dafda7edf1f05860769afca1087ede5977ab26451c11b5eee4c13f9b0c77611d9aba41122419762e2cc626f4947faaeb0bc75e42096dc0a1b8e753824fb42bb60a21276762e3048a97216a8631bda74e3a4479c4a18ff38f0b2abcbdad359410022b289a03edbad84389722ec7623761ecbdf942c330d5b83f7989849bea0582c5f210ee0b3c29ac1bf4b999b5b826fb94e95cb39e65ecc3e46d281323d0a595bbe96bd42942fa86e3e2c826eb6f28156506c70076a5ec7f5907cff391bd4440bba37f432d6591f0f06dd399c1eb66690450ab44464ff5d0d23fb26eb929771d95e93d565c9cce144d33160614fc5c874de12a44e10cd4ffea3623cbffa0f6546f73d8d2212d354a9336d6301a68e3109f43601d1a9d4eeeb42a59118fdc690b40809a0b5b826b7ce170e8ae9125084a20eeed9fc7b22c17f529f04a659fbc529615d3ee67c7e4dec3c37b1b4f0df0c2d5b21c8e8486062c9f897be6dabf359ad45d87c17361a34392927dbe2442dadd0d8e60332e7de0087e86142cc05b401283d3fb5b5791e3300854f7cba13ec00c48373beab195bfdc49eb43629d7175c7b7c3463f81c4039ab20b568929a9ca9706d0bcec2642b1aaf023dac85ec4e136cb6a16e3d0f2a530ffac5d8eaf43594f25dca2e4bf235025538beb0dad7bb9491400e188a5969adb51c5907b670f07ef722919f2b46143344aae1e76fb697cf4772eed47751f68037cba3d354938b26915bbc22bc435a043b2efd445ec07225a7c93dc2a1d0c2bb4e31a8da19795c47d7af53d72481f10c0d9835bcefe4060b78e48014bb6819f3aeffcc9e25a076e7251ea9e0ca1f176142ba1cbc86625c7cabf7c9f0e7fdce77dc79c2b8364b918ad45faa3a3d329508804d12d8a35856074984ea0854ca4ac0dcfa57ba9ac6b474bd9e11504c818339b185cd6467fcdf4ca2d6f9e9ecdb61f57fdb371742044bfaf0c3188e7cf74540fc46ec904bfbeb9cdc32f6bbfdae01bf5336352a12a9626cdf3c5add914a5aae5aa8830f878b4c61f4236cbad20e9cf6b190c24a1c6d3764d3270b37fed92597f487ad8b34c0da4c3d8ddfd4335aee7271713d40ae6247ee1fa3f2e64ec629fc20a4baecff28d796e0d94ffef90562691b186899531527027ab28d7227a12ddfef4958946ca0fb35a66b84b990f16335ef4f08970ca5ac7ad98b98ce3578a808a7013c8c883515cdde62abcc039d73c094b02d1e6314a35660e1f9abaabcdcb9ba720adba60cec5582de005fe263ea531f8ec80bfb03ecf806286ee683779bca236bfefe04869bddd61add07dccadf6f75e937726546f8fca7c4afe2324d4e3bfe078994c3356de930d93f2fb4973b8e6a1422ded46999bc65b2362993cbbe99a7b489012fd6ba8a9a1ee20046bf7d6b339a153d23738c10f567d207c43dfc518565c6fc1123b9a2e1079b03544f02c0c8a9f04025c16a5ab9394ca2386e658d84af2db33cfc75a4a4c1122ff5692939e6f68d95d134cdd9e4baf79bf13e17b791c9d933611ea9b85278db07cb814ed2ec48411f156d2ff25837faafffb534b7e0c136685da464e3fdc86000202c08dfc44ad49110036bb7199a95581f5da1beef82047bded54a4b2faea49b7c7d781aeb634c14550254b404d6b534e1d37ff7eb454bb7eff10f65ec864d1a4e9d7b4ab9effa24ae8b6dc0fc8ffb9726e42c121982a5cde4c1c3a4e471c587dff0b51aa5b0cfcfe064c04248eb037c62499fbbdb8cfcc6372a70e3415fba8af3ee9c8b83ff6f13d7e44b6828bb6f3e91c9e92ee0f10e8d39f2c02ef7ff51bee336236c3ccc8d19005d1eba660986080aa9900f17b53a4c3c016e468dafe53a403a2db8c3c9d9305caf6954d0ff9ea36a500773d27a0615112d96c1fd4165d99a8e24c9585403e59098837cef6db0d9e0f129336a99c385efefa95d70380c3dfade37a6291e11d4ca95828497f0bebed65a2839848f37c3c9f7aa4c8069898e6d81b6bcc7582b678105e7b50dad10dc3caa4d67644407b8c55037fb1f8990562655195f36f3ec485d9c7be8f175547292e696124bf66c8259b4494c33a85bff349aa4b0d2369108e288183496de1d6044acaa7f9ca09c65dcdcba5320594af5e05cacbf3a9388f7ca2422771ba0363e029fa8bff782ed739a63c22182f5c34bf961395f18187373d432ef67f397d1840c31621173c661405e7e465f83a5394aaf4627fa233a840eb5d5cdc3f8b3d98905fed3c57d4ccb0917072a0363c2ffe562e7bb4b0df7b72988ad3e9c29df593a0796efba2f1f5015195a4b74847a610518f3b1e1ed6ad9f9575a3a5286bcda449c605bcc5556c15ed1403a2755aa10b417ff841f20022508f887d18f0787f58abc75394876a09b8c763abe3a2dd8a4ec6d8b7d39afa5632d15e54280231a39800b6b0cfa206d6c39ecc27069b1517584ae9bb66a6d20878c95b56b62d6c8f06b5cd6599442d6b27fde2cd347d34b7999ddccc795d2d8c4f1682180bf29d58e2cd9504497f4765b68e8d98a0f0d68ca74cb8dea62aff1a78c0f0824cea18e8cea30158352e1bde6683597e7c3d9b92fa184b15c07d2339651a51eb08f3a97119b943ef203872ff0cb3926c90f13b34edd77927a57c4ec5092ed627f52bed2f181bf5c069c3c1c74e12c58dc268b8b9e4c603b032c86ac3860723804b17e1a827bbeb8f2c99717a705fab590c8027bf71a8eba291f862e872dfe3aa51b26f45d8b042f636689262736369f49ded07d619008e14e91ac8a962c24f9a7ad97eea285ed86ced7c3732b431ccf32c2b83f48346e43113618324236cf7f57185a70004bded6c54ae994f441843001fbcc60476ded039320fc6e3e4385b5e1e0e4f417a6342b243bd9ea919a41901c9048ca2bb471e2bf8b8be0cea90554b27b7451db5d6b619026590c740140585458670d8dc184e4d6559982c6d8e05ddc8ea1f729645e2f20e8b87ea9632e6f61d0e8758cf1e830ee3ca70017caef5b9dd4bf59e1517d205261eaa25ffaf6af940248822efaf2f8bb2eb4af8059240bb0cfce5d0f9a8dc25c86e2e7fc86deb8878856a75521b1e6b315f42b165cebc879898bdc04fd09528f966c4127ae35283e18ee26d9b062bf6a715e305fbfd3752b73ae39a76936f8ab6da0fc9faf76706e3c1808e3cb899f68ac329d6c729d5711c97f9273d494ca0f668ce981137709a6acb27b24283b62e5f54d1eadecd965bf1983c1eb03e3265c09c187fab47e43f00fc999e07521a154c3d13d07b77f94204fba725a371f8eecdff8e81abb7b75ce73dcf9d689e911dc0d56e09909b6bbbb2b116768da97de79193c4c0294f5c395afca1b81072125c503c18d600184af1e9bb666a266522cc8e2b2f278f094795a9b3d79cebcdf5782f263823e6f032b6e4580d56c5f10764b9cec9b07c5f11bdf9a78ee0e945bd9da2eba7949a1a59f47c22f6832e960b3ea3a35f4e65f83a4c79d3ccaa97c9f83aa4472bcd41510b47aecfbdfb8991c795ba68dd3217c08af9ba70f3c7617943a152219e96d11d78b21ec46aa84a2747c690fb3e9a357283e1f244566acf29ebde9859514078f4e2c24cd9100062857aec96f2b7444d48c23349f86e551f3e521b7f89457a41fae25e187ee6c2fce0be08918370c801476b256e87ef2a6b87a30b505023b1eea3ac29e28e3ed35b550be6cc5924b322d39c8b7879b68c555ee2aff75876a8f885ad7b48aa3e1c1c5225551aeee6317b1a1a14f5755e21b145901b844c3819b7e5556e4defd18c72a2e7f7dec0ed7838eb75773d5431e96f133e6dbd51fa373f813cd9a7181a2425cc38cc2829d53ec680107602047ac6a2b2a4ef0814a4dbfc5ab117986e72e2c169cf1f594f6c2a7dab4b4b6c36f1acaab81c7a800561e3c4587c97f6a041ed6f3e9e0b1081a06703bca6f0378839bcc368937826d2ada368f2fa1b79af04a63b6451e4445d6ccc24ca77c3502e47ac078e7c21027af7b242849b7a6d2c93e5e88fc809f68f524072a801c51f990d237a96d649ccbb5a37f2d6b988bd67ae2d74b8289a731ee935e95f3d16f40a40815711846b3a9d430380b82f8d23b49766cb88c3a34c0fd722f0dcc4ae77e248466f366871922dbf61a9745c1e0f9d9b0193a9335d1a13cee3d06f413cac1c8d3a2b04bfa7cd4cca7d14a3a7272953cbbe93ecfbd000821124869cbb96d649d12b97382888094000d6571072fa31696ea12cc57e331a373c34e543f05bcb6f0a5eb0b7e2fe459172531aaf622fa4798db69eb21dd5494ab5dd42d615753f84802a322ddb41f7b8153a815cb122132e0c6853cfa7361b8521129ca23e73ef465a9c70349ff62c6f2aad1d2f1226920e2ad13dcf233689e0ac0f73cd7e55ea61f3f45e2c301a2a9525235deb5b1f898a41584bc15c67440a5590aa75b7abcc14d27e566097c0f3c55f622acb218af0050aa206d1fd1a5df2e2914b43eb7885920ab7a41da4432c918a191cd23add2d5ea445262e3ff9f503f6c0a9149acba6ffc8078936b583ae3ec5bc877c9823caebf0e89037ea8b01f1ffec50b02e1fa1e0e0211d769cf228772b09a9341704401465ed7dbc8d4277ef727bf0712568708f8a20e6bce003805251f4193ab23e4b9dfc7d0098aec0bf320aaa3e8f279f84d663fcc9dc1fdb264481f55f7eafbd8e59a9a6f66afa046bcdf6dbbb92d3b4268df5ae1af7beaf4bc0611d6d4ebad7e162281c053f53f845999aa759687b7e5d83bbd4895a49a33beac37167ef6574f52b4e6333fd38419ccbfc29e003db92a8c34604c0de3a8239f2aebe82a491305bd1bb0de3a845dc1d6091832ca18f72b937b2113083f2009454a52415e6bd59a41877f2466d269ad27fd1fdc21e975a763b821fdbfd770bb54f3ae897629c5732552c3cbfb1d029a29873af1bc4938d2d0b6c48f914a2252845f480a4803e51d43846abaae019e80100991be56ee38fe6895ad424e62e207036511bf04d9035050b911dca191afa174e3622635b775f5ad9d82782c03f7c0d89b01f4ee6b751f24f95f6e9c5ac205d386808921b1585075f8441de1ef303456ba44dec2d8c051d952f2174992bd9e787f546615daa8646ecc0d9d3e83e988ab8ecb456bc9820f8eb3a5987a72f92edf1c705477c64a4f9765581900f3e2ff9b1067d859226eec0b42c99d4681556085a044a60c1178177b66d2b41839e714b480eafb33ec82180e309f0e054b97ce0416418f2933ca8bb980dd51e77875130f8a32fe81d3e21e4b793cde13764bb160ae0e55d4f0e696c04d4829c5772c4ee01fa9d7b3d4e839238ae7319f72fff180ad640c390f8c3e3def0ebc94e23467a8c19b6ed20", 0x1000}, {&(0x7f00000025c0)="8bce810364df242366f7fa2f8b193734cd121a54809dc938dd0abd9ffc7e424b4bc1685e6d4b416d0d7501cf7c065831d271b26c85b7d5988941123da91f569a6c4d02fd6b616af3b7e794bf1296fc94a8b615de549dab2b397c0e81149bf5234369c17182a8fdcb95632b447e5b1cf65be70335a68256d76fe72783f73af3fda21c4ceb8a13aafdf08dc10f59474d7cb663479192186017697871981b98f9e39fd3736b957ce40ae6f067172ebd25a53cb8934a2af7f566a3b2cb07570832d309fb40d356b8231d2c218432c4afe6e42bbc54ac1bba9eaec4c86289ee80693a2712b72be23390248084273f0a", 0xed}, {&(0x7f00000026c0)="454adff70cf7c454bd2feb2781e99cdc5bd13658f0e9f6c64b89dbd5857ac14c6faaaa7e7a6f94745e4f8e5dcce34b8c600ad2cc24a94061ac8c2682328aac4db893bb7d00927486628e1a810dcedb91787e1b93866db9d531a42780203805dff54172e82c8cd1a144d3d8e250479b0826c6812ff94fb4fa625be069f974f6cefb6aec81b1feb6877bb4b111fccf4e6c8b52d0c9e2c7e08e3f777942997c415382e4fa6ade8e5915a13e7aef9c5e65e2acd7d7e0bd6bffe80cb0da", 0xbb}, {&(0x7f0000002780)="dfe5a479a65ba92e069cf79b4724b04fb510df953f3a7abde5e62ea8fa486cfb01a8298b8c501286b2d523a9a71658b3709b11c590bcc172c2f9b20e2923a16ff720a852543bca537fd8332f3766072c30ebc4352a33b088d705b8d5227f6429a434e930f0ade04119ee697b71f913a65f78df3d8be1e336859f5443adde6b364f5060e3a7293ee998415c490863d1b61ce5fb2cadb2ac00aa7f5ca352aa79d1b2", 0xa1}, {&(0x7f0000002840)="476ab7cde745eee89247cc312691ae7645d6c850b038983f0364fb877c691a411a01ccc288920520fadce83bbf419064c959cdf26cc4fc7c832e18550021dd3ebf5681b85f6ad052b42361ef17aea185e266cc498111fd36fe8c8599f30d99c1b62c7e", 0x63}, {&(0x7f00000028c0)="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", 0x1000}], 0x9, &(0x7f0000003980)={0x100, 0x119, 0x3f, "66025f0d7b1d0ee6087c72f7d7fe77031439602118784856459e975ab8a2738e3274a0cb05ea4c941f014359039cd43beabae49a7f12c03969effe6dae35b99a0174328209592d827bb388b3b9115a9ca3d47bd5bd0a9fcd674240e6799dc72b094c018dcbabf3a4b33b229dfafc72dcf0050cb24f46c36f028f2dd3e6734c72368a5f532987fe747ede5f33b8e4c874ab944d8f667c3fcee0bc978dfd16fb67c9f29bffaa76e94b643e74c7216445c49d8d31ab4c988b1907f303119384c722b73983d371703a0d8bcdd2ae45cf1f89ef47099945c6f87e862a95229d8329776b1ce061327a481eaf6343"}, 0x100, 0x4000005}, {&(0x7f0000003a80)={0x27, 0x1, 0x2, 0x4, 0x0, 0x2, "d9d7ad5d1a3d3e9b862041f4547fb55a1fbcaebea6c1783b4c06cb3b2fd116369bbd657599c92190ebb3e98f56144e48db9b4585fd0b31ecabcc6449894e81", 0x34}, 0x60, &(0x7f0000003d80)=[{&(0x7f0000003b00)="482965d3cb8a85b5cbe0072317ef0d3131a2f7b8dde52958bda22ae3ae1fc866ec6e04405f4004815a6438a75c4abee6cfb85e853f2dea3c305c16f2f92d12f91de34ef01bf9e84f2fe7e6c801f9e89ecdefbc12ca27652a0a53eaeda0565cd6e70227e4ad4d3b6f3d599a447ab285b1dafafba1e9bec1e364b60c8bb03872f48a74c1371590beaee0560f58d39a714d27", 0x91}, {&(0x7f0000003bc0)="de3f281d0522818972b007405eefc46f7cd8bdbc604ff15ba9cd2ecc6bbb1250553606851aacedddc871713302e26d39310386a701848ccaf2e9b9ef434bf3c4cf5032273ca2766653830876b068bc41e25790660a9c09f5b1a27554345a5b67fced870c0b31ebff6a3f68c9da4b5105c07831c0950f225d2e2cf2bfd99e6f036b2543282859127cc3e3f4f87dc5c2f8fb37e8c52df88de4c7489eda2625d8f43ecdef393bf565add9de5318135133110ef3e6fc96cc00ea6eceeb", 0xbb}, {&(0x7f0000003c80)="4a9130017385175bf132c98fc4939272a3f7346721619de744effa52a5a3995604b6118034afbcb09025a4cedb0daf4f78da001d77a6acd862a1d93f9fef3459557dcfa28dd4a9482001f3d344e7377360aa30a6608c63cabf0fba1efc9fcc77f6b7728d6b428483072adf7c3f9f067947e023037bd6a4a49b34e662b6382c806997cf54a00ad079f0a9ab531c333761fa56078ad39f5e7117d7036dbab80f90107faac4f1e67bee7794039b0b682d2e0457e8984e13d1af62e7b6c42312d1ef9642c59a50df1eb04d60f8b54d34b32e1e245e8ae2f1e6ce1b8bb70feabf34ad97d82e97f44e3bc6c1ae75", 0xeb}], 0x3, &(0x7f0000003dc0)={0xd0, 0x110, 0x4, "3900969a84abb8629ca0b56cd011f20abb9b0bc4b55f3346febf151bb6b73e661e7e0921d7c0f536892a80dd5ebfde03c7caf20fc2b892119e9764f615028f13f557ec6f62b4aac50ed5b807eb5aa702c2cb5bceeb38bdd2824a7077b7f2bdbc8f1022fadc7212d7f3852ad195d06be04db85f6517f4e3a2f35ba305aefda89c1ec782dc642d1a99021b319fe4e7e08db12f4b6d585641acedb87e288d028160dfd1c3431ca1442fa41dd9952fa8d8c1e0fb8a870aae18a7d3ff8c57688051"}, 0xd0, 0x20008080}], 0x6, 0x4008044) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000004040)='/dev/cachefiles\x00', 0xa40, 0x0) ioctl$PIO_FONTX(r6, 0x4b6c, &(0x7f0000004480)={0x10, 0x11, &(0x7f0000004080)="03b3a2612d9e91a7022c18ca38b77439d1b5012a3a5fdfe098799a42ec15cf3ebbf88225b7c623ecd791ac913bae9cdfb7ea92d531e64f3d8578a330cbc27bc7fcf91fe3abede8f17403ad3a29ba08d1a81c147a72ea3c0918adc1dab1bf7004847beab992f3f66d52243cb2b10bbb8e3aa6a96d24395eba582c446b50b872dd6a12dc1c4f168b94b9f053098b0c488b9b026b8821b561acc980e1c5978704d8b78f4e4d80f6bc0ba380efb6a884aa7a909e8a721ac3ab05d43d96299da1d16df06b21a25d09c6c20e5bf3728c0e6024a65ed6f81de65611ca5453259266e5dcf27afdfa7848301090ab3439dcc978952a3970993d21a679ee61d8bf0e5c52345fe61ccccf62d7f723c892ef2ff91520759af668fb7d7eaf584f8c117f85eb2767efda60b51c51c6afb3045252d6d503ec52d0b1bdac145eb3993f21443636065bf210cfef9a1b0e76850f3db5767bdd649dae8cb4bddff2ac0f0e72ef89ed4fcf673130312929a22897b7e3b172b4a68daefcc81852d2fa351d164c756a9dcd2dd10ba08226c971b0b019b3ce046337eb3fcbe407a9bd8e57844b21f4c4ca1a0ee572e23f14731e3cd9a3dca2099adccb3cba20e250619c595be055cd9d674c6deb419021186c47249cc0738ecabc6b6f0b9cc08744e954733da760cbe3500d125fdcfe862067b6f19c18974234aa15801054932a2020f1f18c35bc438ae120692ac5c801be73dce538823af176d37675df40aabceccc97b6aff2ea18281f095f9e633bb43ccfe259d28ed6c324166bce5add4ef0673be523e4221312d871fdf3dbcc0070bbacfea36f0d900b4b6718cc3f292494160f81baaff0e54004fb7e9007fedb2b4564e11ec4d9462963c3bf05d1926c8f1009c11cc3d9a4f881b0709e10d4b48e3c3ea98be1af52fa114955b7c0a73c86d2644eea53e0e47649cc60300b2376d1ef9a319104be75dbfd9672372260e4cc7c1d8bccfeb4549b120d1e57b6f64d14d9beb4c0950e9260892ca2f3165866c97fd2c4746808102c00a7267d4c27ecd613d8a244c647326d146fec0f7de7feb4e8cd3037d362af1f470c61a4cf5dd489e62cc472e042dd40ed0472bef49de08bacc3481a7c611fdcc3e3c4e296829db382aedaf2a9227ff9784dc568359680220a4d9a36adf8213ca90009e5cb5555962078cc90581dfedc8a6e9c366374092216349a607b2e1ced5e80c6ffe90cf8876c0d32494c9f20df562470188770f959a9f5bc31abd559cc148a2aafdf314789e0d6b87520152b7ace849dc36fc19160a29bf243cb02f3883018a547c79097d7a2e1dad3fa91965bf12730fdde97d734b1e24641a076aeffc94d65da6952910df61f462283e165c650b89bcd547f0e9fe6d4f3d1d7e183fcfe565974feb7db8c93f183748d1bd7149037936548302f9594a130278fe83cf7372e7d"}) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000044c0)='/dev/full\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f0000004500)={{0x2, 0x4e21, @empty}, {0x306, @dev={[], 0xb}}, 0x40, {0x2, 0x4e20, @rand_addr=0x64010102}, 'netdevsim0\x00'}) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000004580)=@routing={0xc, 0x6, 0x0, 0x3, 0x0, [@private2={0xfc, 0x2, [], 0x1}, @private2={0xfc, 0x2, [], 0x8}, @local]}, 0x38) ioctl$sock_ax25_SIOCADDRT(r5, 0x890b, &(0x7f00000045c0)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000004640)=""/153) 04:13:03 executing program 5: r0 = getpid() write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x3, {{0x8001, 0x4, 0x2, r0}}}, 0x28) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000080)={0x6, "70ae728f6e11a84c7335c4eefda2a71b202601bb9ade7a61bae7bbb215a85c0c", 0x0, 0x800, 0x1ed5, 0x3f, 0x8, 0x2, 0xfbd, 0x1}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @local}, {0x306, @dev={[], 0x39}}, 0x20, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'vlan1\x00'}) ioctl$SNDRV_PCM_IOCTL_STATUS64(r2, 0x80984120, &(0x7f00000001c0)) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f0000000280)=""/138, &(0x7f0000000340)=0x8a) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x42c0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f00000003c0)={0x2, "e06e57106dd06caad4bcaf1929161992eda14cc667c676484d8b35a80c03d30a", 0x3, 0x1}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r5, r6) r7 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r7) get_thread_area(&(0x7f00000005c0)={0xce4, 0x20000800, 0x1000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}) r8 = getgid() keyctl$chown(0x4, r7, r4, r8) r9 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x8, 0x600000) getsockopt$TIPC_NODE_RECVQ_DEPTH(r9, 0x10f, 0x83, &(0x7f0000000640), &(0x7f0000000680)=0x4) 04:13:03 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x60) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x82000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x100, r1, 0x400, 0xfffffff8, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x6c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x28}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000054}, 0x24000000) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000280)=""/41, &(0x7f00000002c0)=0x29) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f00000003c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvme-fabrics\x00', 0x10541, 0x0) readlinkat(r4, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/192, 0xc0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/snd/timer\x00', 0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000580)={{0x4a, 0x3}, 'port1\x00', 0x4f, 0x10000, 0xd9, 0x7, 0xbc000000, 0x5, 0xd66}) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000640)={0x7, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000680)=r5, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000740)={0x9, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000880)={r6, &(0x7f0000000780)=""/232}) getpeername(0xffffffffffffffff, &(0x7f0000000a40)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000ac0)=0x80) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ubi_ctrl\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1c, 0x5, &(0x7f00000008c0)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @alu={0x7, 0x0, 0x1, 0xb, 0x1, 0xd, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdaf9, 0x0, 0x0, 0x0, 0x200}, @ldst={0x1, 0x1, 0x2, 0x7, 0x0, 0xfffffffffffffffc}], &(0x7f0000000900)='GPL\x00', 0x6, 0x30, &(0x7f0000000940)=""/48, 0x41100, 0x1, [], r7, 0x0, r8, 0x8, &(0x7f0000000b40)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x3, 0x6, 0xdc8}, 0x10, 0x0, r0}, 0x78) 04:13:03 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x81, 0x40000) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000040)={0x0, "2c581066ef7c154c29bcb79827bef0721011882835cbc020451d4a09f76982325c01ff55cdcbb892a604c78b994d438b56238ee9fa26d146b232079aa0514f88", {0xffffffff, 0xffffffffffffffac}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1b0, 0x1a, 0x200, 0x70bd29, 0x25dfdbfb, {0x9}, [@nested={0x87, 0x45, 0x0, 0x1, [@typed={0x8, 0x5c, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @generic="cb657120d2c309249951c669cd9251b9c8ef6a56b97b9234dfc9a4b5e5391c6821fb11e94a7e2458ef6bc0b366d7404effeda44bf3a0ad9aa1006ae2cb310a81669112f859fa34b510ee9dbce23a1f8ee7f768c54c596e3fcd24f44120b5aa7403ae5c3ea396a33bfccafff5e9f5b466bc63159466029464e21d99"]}, @typed={0x8, 0x21, 0x0, 0x0, @pid=r2}, @typed={0xc, 0x8e, 0x0, 0x0, @u64=0x9}, @generic="ad1b60f4e54337cf030e99666d1c798bdb4709de3ddd5030ea5c957b624a9db4c892544704c4e8b8b9419215e71011bf2f390a3ecbf560f818400b081da263241a8be04959e970b1f7ed5b19d81099228159f936c3d3ce2d76147e3fee5719d870ccb38ea5f4104dfec1a014205c2f5d30844fe226bda3dd47de05b913fdd044cdf2d0197c6f6dc1c3bf673c1a3c4af00b407eae484621a94d023c43f437439d9d831563b38e63", @generic="ff5087e511c94e8c54aed50547da51bf13a686bd0c1b54efb5d774fe17367511f40e9d724d159b15c6626f0090e5c515414bb460429317ea0c920132b9d4650d8493bafbbbb7ceec2e3eb892c6e0", @typed={0x8, 0x35, 0x0, 0x0, @fd=r3}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x8094}, 0x40) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x300, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x2008851) r5 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x7d, 0x250401) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={0x0, 0xff}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000580)={0x7, 0x67d5, 0x6, 0x9, 0x4, 0x5db2, 0xffffff61, 0x4, r6}, &(0x7f00000005c0)=0x20) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ttyS3\x00', 0x10000, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getpid() sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x20, 0x3fa, 0x0, 0x70bd25, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000740)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r5, 0x40086424, &(0x7f0000000780)={r7, 0x1}) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r8, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x118, r9, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x54, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x538}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff90a1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc731}]}, @TIPC_NLA_BEARER={0xa4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x432000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) 04:13:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x140000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000040)={0xffffffffffffffff, 0x80000001, 0x7ff, "c999f798ece3ace0b362e7532ca392739dbd6fc422897fb7bbdcc1b3e17a4d8c1274864fb3d0951f4f68900db26ea5ac47cbf10669dd50b814735381312652a9312b2061bbf5b20f5d131e0c69aed3b2040c163a37b021d3da189aacc18f7446629c397867d83638cb2cfe799642b57ae5e31f73986bb606df588a1acd5820c5d51097130eeca82a84e2334142c5303a75d7579def02431db276cf54b2"}) r1 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x8, 0x32001) dup3(r1, r0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000200)={{0x9, 0x1, 0x9, 0x6d4224ed, 'syz0\x00', 0x6}, 0x2, 0x1, 0x9, 0x0, 0x9, 0x5, 'syz0\x00', &(0x7f0000000180)=['&\x95-.-$\x00', '/dev/snd/controlC#\x00', '+{{(*^:\x00', '/dev/null\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '\x00', '%-}:!\x00', '/dev/null\x00'], 0x63, [], [0x3, 0xfffc, 0x3, 0x9]}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x11) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000003c0)={&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000380)=""/43, 0x2b}) getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0x4) syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x20, 0x64600) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x78, 0x2, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x20000000}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x1}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x63}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_CIDR={0x5, 0x3, 0xc1}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x8000}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x20}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8080}, 0x4008004) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000600)=0x7) connect$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0x4e24, 0x8001, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x5}, 0x1c) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000680)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000700)={{0xa, 0x4, 0x5, 0x1243, 'syz1\x00', 0x3e3a}, 0x1, 0x4, 0x4, 0x0, 0x8, 0x2, 'syz1\x00', &(0x7f00000006c0)=['syz0\x00', '%\x00', '+{{(*^:\x00', '\x00', 'syz0\x00', '/dev/snd/controlC#\x00', ',\x00', '\x00'], 0x2b, [], [0x7, 0x401, 0x99]}) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000840)=""/169, &(0x7f0000000900)=0xa9) rt_sigprocmask(0x0, &(0x7f0000000940)={[0x10001]}, &(0x7f0000000980), 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in6={{0xa, 0x4e20, 0x8, @private1={0xfc, 0x1, [], 0x1}, 0xfff}}, 0x9, 0x4, 0x6a, 0x8, 0x8, 0x4, 0xff}, &(0x7f0000000a80)=0x9c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000ac0)={r4, 0x1f}, &(0x7f0000000b00)=0x8) [ 101.628661] audit: type=1400 audit(1594699983.556:8): avc: denied { execmem } for pid=6342 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 101.849812] IPVS: ftp: loaded support on port[0] = 21 [ 102.134710] IPVS: ftp: loaded support on port[0] = 21 [ 102.231287] chnl_net:caif_netlink_parms(): no params data found [ 102.261862] IPVS: ftp: loaded support on port[0] = 21 [ 102.343702] chnl_net:caif_netlink_parms(): no params data found [ 102.429453] IPVS: ftp: loaded support on port[0] = 21 [ 102.459001] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.466708] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.474183] device bridge_slave_0 entered promiscuous mode [ 102.502492] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.508879] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.517488] device bridge_slave_1 entered promiscuous mode [ 102.585159] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.592514] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.599434] device bridge_slave_0 entered promiscuous mode [ 102.622383] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.628765] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.636510] device bridge_slave_1 entered promiscuous mode [ 102.647824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.659798] chnl_net:caif_netlink_parms(): no params data found [ 102.684523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.726243] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.735836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.752880] IPVS: ftp: loaded support on port[0] = 21 [ 102.796350] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.803963] team0: Port device team_slave_0 added [ 102.812922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.821521] team0: Port device team_slave_0 added [ 102.827372] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.837587] team0: Port device team_slave_1 added [ 102.852737] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.861801] team0: Port device team_slave_1 added [ 102.907205] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.913775] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.940111] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.958176] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.965277] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.991624] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 103.004105] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 103.011243] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 103.037068] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 103.052184] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 103.058471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 103.084393] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 103.100479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.119332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.133250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.152298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.170388] IPVS: ftp: loaded support on port[0] = 21 [ 103.177232] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.184938] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.193017] device bridge_slave_0 entered promiscuous mode [ 103.273969] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.282510] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.289464] device bridge_slave_1 entered promiscuous mode [ 103.354176] device hsr_slave_0 entered promiscuous mode [ 103.400333] device hsr_slave_1 entered promiscuous mode [ 103.498286] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 103.523789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.542488] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 103.592650] device hsr_slave_0 entered promiscuous mode [ 103.640134] device hsr_slave_1 entered promiscuous mode [ 103.681240] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.689170] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 103.696085] chnl_net:caif_netlink_parms(): no params data found [ 103.733621] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 103.857704] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.864988] team0: Port device team_slave_0 added [ 103.879919] chnl_net:caif_netlink_parms(): no params data found [ 103.904482] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.911978] team0: Port device team_slave_1 added [ 103.988629] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 103.996057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.022300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.039764] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.046063] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.071683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.112667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.143759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.214758] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.223131] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.231823] device bridge_slave_0 entered promiscuous mode [ 104.302979] device hsr_slave_0 entered promiscuous mode [ 104.340071] device hsr_slave_1 entered promiscuous mode [ 104.389995] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.396392] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.405941] device bridge_slave_1 entered promiscuous mode [ 104.457540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 104.490019] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.516069] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 104.543643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.559425] chnl_net:caif_netlink_parms(): no params data found [ 104.640490] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 104.647749] team0: Port device team_slave_0 added [ 104.681578] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 104.688940] team0: Port device team_slave_1 added [ 104.706309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 104.749065] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 104.768904] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.782913] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.791946] device bridge_slave_0 entered promiscuous mode [ 104.807095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.814408] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.839889] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.850363] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.856735] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.864896] device bridge_slave_1 entered promiscuous mode [ 104.886606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.893236] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.919263] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.957476] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.968691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.978241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.992597] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.046329] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 105.053711] team0: Port device team_slave_0 added [ 105.075195] device hsr_slave_0 entered promiscuous mode [ 105.119955] device hsr_slave_1 entered promiscuous mode [ 105.170955] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 105.181052] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 105.197648] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 105.205412] team0: Port device team_slave_1 added [ 105.212871] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.219290] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.227092] device bridge_slave_0 entered promiscuous mode [ 105.235118] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.241838] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.248848] device bridge_slave_1 entered promiscuous mode [ 105.277994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.305280] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.311652] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.338259] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.350377] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.356628] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.382487] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.394896] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.428487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.437307] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 105.473135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 105.522536] device hsr_slave_0 entered promiscuous mode [ 105.559968] device hsr_slave_1 entered promiscuous mode [ 105.600207] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 105.607538] team0: Port device team_slave_0 added [ 105.629771] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 105.638338] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 105.645693] team0: Port device team_slave_1 added [ 105.662272] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 105.710565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.754191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 105.763929] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 105.783689] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.790671] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.816523] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.826975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.835926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.850724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.858250] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 105.866489] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.894772] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.901512] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.928227] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.947068] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 105.954162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.964456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.979055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.991166] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 105.997645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 106.005063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.013195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.021317] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.027804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.035384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.042879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.060722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.072644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 106.084856] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 106.091254] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.107542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.115345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.124137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.132133] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.138542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.158688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 106.167167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.189321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.198948] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 106.212456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 106.264566] device hsr_slave_0 entered promiscuous mode [ 106.309958] device hsr_slave_1 entered promiscuous mode [ 106.349924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.356935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.364410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.373281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.383609] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 106.390378] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.403593] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 106.411587] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 106.419113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.427433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.435935] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.442384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.452900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.462160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 106.471446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.479965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.498635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.512195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.521066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.528820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.536949] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.543376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.550922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.558744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.566573] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.573004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.583682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 106.595341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 106.613017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.622569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.637136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.645449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.653331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.664630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.673176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.683460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 106.695596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 106.709968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 106.716886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.725318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.733723] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.740149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.747020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.756532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.764487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.772174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.783058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 106.794262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 106.808411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.816539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.824525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.833175] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.859967] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 106.875164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 106.886773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.896252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.904234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.912249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.920470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.933334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 106.947529] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 106.954648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.964210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.972763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.984878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 107.011493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.019174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.031333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 107.041146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 107.078623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.090577] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 107.096636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.104212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.112615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.121862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.129476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.142884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.157297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 107.166761] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 107.192826] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 107.205346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.211868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.219491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.231439] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 107.238805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 107.248420] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 107.261808] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 107.274192] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 107.280803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.287520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.295205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.303025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.310788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.318075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.327913] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 107.336996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.349504] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 107.355942] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.366121] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 107.375821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.399706] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 107.406923] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 107.417389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.427716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.435201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.442100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.451376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 107.466293] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 107.472787] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.486128] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 107.496766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.506686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.514802] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.521254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.528209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.536593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 107.548448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 107.562085] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 107.572315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.579767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.587725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.605415] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.611839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.620387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.628523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.636477] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.642902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.650210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.656980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.665785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.675887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.688854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.705324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.717113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.727577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.740711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 107.754157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.766819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.777512] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.783941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.802863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 107.812985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.821451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.829282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.837952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.852475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 107.862365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.876276] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.884184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.899169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.907094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.925300] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 107.941688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 107.958951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.968341] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 107.981370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 107.988219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.998109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.007071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.016105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.024270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.032632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.042672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 108.049432] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.056676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.064718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.074507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 108.084212] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 108.094570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 108.115661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.124068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.132683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.140630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.147668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.157761] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 108.170714] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 108.176763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.192464] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 108.206314] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 108.213058] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.219186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.228432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.237981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 108.250338] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 108.257625] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 108.265310] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 108.278539] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 108.293472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 108.302007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.314366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.322195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.330799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.338735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.346940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.354887] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.361310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.368391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.383107] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 108.394764] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 108.406438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 108.417517] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 108.427106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 108.435402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.444824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.457420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.465928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.474601] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.481027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.488123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 108.494987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.501807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.509289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.518883] device veth0_vlan entered promiscuous mode [ 108.531827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.538867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.548264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 108.558885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.578318] device veth1_vlan entered promiscuous mode [ 108.585217] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 108.593155] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 108.602867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.614150] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 108.622871] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 108.628908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.640412] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 108.647619] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 108.654927] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 108.663185] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 108.670732] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 108.677311] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 108.686754] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 108.694689] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 108.704658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.715949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 108.731009] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 108.739514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.751338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.759166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.767976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.778503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 108.787431] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 108.802132] device veth0_vlan entered promiscuous mode [ 108.810581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.817644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.828197] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.835694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.843961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.852210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.859588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.867167] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.874284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.889163] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 108.898056] device veth0_vlan entered promiscuous mode [ 108.910658] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 108.919329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.932033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.941371] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 108.949244] device veth1_vlan entered promiscuous mode [ 108.960970] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 108.972153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 108.984242] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 109.001415] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 109.015839] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 109.023077] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 109.034647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 109.042292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.050059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.057621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.065761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.073641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 109.080508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 109.089025] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 109.096706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.107070] device veth0_macvtap entered promiscuous mode [ 109.114379] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 109.125846] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.135468] device veth1_vlan entered promiscuous mode [ 109.142484] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 109.150353] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 109.212491] device veth1_macvtap entered promiscuous mode [ 109.219044] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 109.228652] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 109.244598] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 109.264408] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 109.272527] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 109.282121] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 109.289277] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 109.298317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.308063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.316620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.328584] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 109.341626] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 109.350520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 109.357311] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 109.370394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 109.387042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 109.403105] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 109.418917] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.427956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.436965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.447678] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 109.460042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 109.467061] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.476171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.484653] device veth0_macvtap entered promiscuous mode [ 109.492187] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 109.503100] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 109.515428] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 109.524041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 109.537541] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 109.547819] device veth1_macvtap entered promiscuous mode [ 109.555295] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 109.569019] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 109.577497] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 109.584796] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 109.591692] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 109.598954] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.606476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.614700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.633213] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 109.642173] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 109.652500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 109.662608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.671432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.681093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.688830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.700652] device veth0_macvtap entered promiscuous mode [ 109.707074] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 109.717720] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 109.728577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 109.738740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 109.747330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.755752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.764885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.772802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.782870] device veth1_macvtap entered promiscuous mode [ 109.793016] device veth0_vlan entered promiscuous mode [ 109.803102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 109.814514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 109.825329] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 109.833306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 109.852978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 109.864322] device veth1_vlan entered promiscuous mode [ 109.875136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.885318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.897142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 109.907932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 109.918393] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 109.926014] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 109.937051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 109.952484] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 109.962809] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 109.969971] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 109.979123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.987717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.001899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.012277] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.022278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.032144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.042784] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 110.051047] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 110.059456] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 110.074315] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 110.086385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.094548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.102697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 110.110672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.118180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.126250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.138686] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 110.153405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.163844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.177747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.188559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.200213] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 110.207132] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 110.218450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 110.227803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.236214] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.244716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.264729] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 110.286754] device veth0_vlan entered promiscuous mode [ 110.311521] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 110.336615] device veth1_vlan entered promiscuous mode [ 110.345373] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 110.357227] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 110.364918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 110.373690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.384350] device veth0_macvtap entered promiscuous mode [ 110.385141] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 110.386365] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 110.386917] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 110.387495] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 110.396748] device veth1_macvtap entered promiscuous mode [ 110.428368] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 110.438665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 110.455525] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 110.470393] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 110.477315] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 110.490641] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 110.502180] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.511071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 110.520183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.534327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 110.553100] device veth0_vlan entered promiscuous mode [ 110.562645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.576601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.599252] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready 04:13:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x31008}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) socket$unix(0x1, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @multicast1}}) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x1410, 0x400, 0x70bd27, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x40000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 110.620414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.634619] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.645749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.670603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.689429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.699946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.712682] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 110.720008] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 110.735299] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 110.746109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=7663 comm=syz-executor.0 [ 110.765558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.775986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.785094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 110.797202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.811473] device veth1_vlan entered promiscuous mode [ 110.826113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.836440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.846646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.857359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.867773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.878672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.888843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=7656 comm=syz-executor.0 [ 110.890212] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 110.908449] batman_adv: batadv0: Interface activated: batadv_slave_1 04:13:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = dup(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x7c0440, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'veth1_to_team\x00', 0x1000}) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f7e00a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x2, 0xd000, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x6, 0x0, 0x0, 0x200000201, 0x0, 0x4c8]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x101000, 0x0) r5 = openat$bsg(0xffffffffffffff9c, 0x0, 0x4c0042, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r5, 0xc008ae67, &(0x7f0000000180)={0x10400002, 0x240}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 110.934740] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 110.950048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.957946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.990735] device veth0_macvtap entered promiscuous mode [ 110.998197] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 111.022780] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 111.035306] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 111.053891] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 111.062530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.075117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.085866] device veth1_macvtap entered promiscuous mode [ 111.108993] device veth0_macvtap entered promiscuous mode [ 111.121804] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 111.142981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 04:13:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000300)=[{&(0x7f00000002c0)='\x00', 0x1}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x41, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, 0x0) clone(0x20000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000400)='\x05\x00\x9e\x86p\xbe\xf2#\xda0n\x004\x1cVV\x87x\xae4\xe0\x87Yi\xf8\x12\x14\xcd|l\xbe(n\x87(P\xbbr\rI5\xe5\xd1M\x92m\x7f{\xee\xfb[\xd7\xe0\xc4\t-\xa5>\xac\x0f\xc0\xc0\xd6\x19\x1bU\x05\x844\xb0\xed\x0e#\tD\xf2\x1c\x99\x9e\xba\x10\x8b\xb0\xe2\xb6x\xc3PT\xba=\xa0\x9f\x19\xb5\x95\xa8\xb6\xd0\x13Z\xe4', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000d, 0x11, r4, 0x0) r5 = openat$nvram(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f0000000100)={@none, 0x1}) r6 = socket$inet(0x2, 0x2, 0x0) syz_open_pts(r1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6174000000000004000000000000000002000000000000000000000000000000000000000000000000db0000009364e0dbc90000000000000000000000ea438bf10670218950005323f809ce8d08f27ae9eb7472209b120cbd2cb8ecdd1c921d729c3100aa626de13c5e19d45d9e1828932f17c6ac6b81014ebfaf0200af08490ae4dd36e1529b439ec7ec4edd959a272cbc3222cd9321f366574519eb6214a0dfa7eec70e2ab5cb60d2a2d83c3e0aa35424c567345758"], 0x48) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 111.184416] device veth1_macvtap entered promiscuous mode [ 111.210942] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 111.230783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 111.246939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.263591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.272947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.282774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.291990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.302197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.311742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.321533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.332180] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 111.339170] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 111.348727] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.358933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.368366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.378247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.387520] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.397347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.410148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.421158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:13:13 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0xc32f, &(0x7f0000001140)=0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x97fb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20802, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x1) io_submit(r1, 0x10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x0, 0x0, 0x2}]) [ 111.431838] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 111.439209] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 111.446979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 111.454850] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.468486] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.487953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.504002] audit: type=1804 audit(1594699993.435:9): pid=7718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir490328420/syzkaller.HW8bV7/4/bus" dev="sda1" ino=15742 res=1 [ 111.529460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.546249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.568453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 111.606039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 04:13:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="2900000000000000000000004f9efd000000d92456df8ddf50e83be00000020000000000010000000000000000000000000000000000000000000000000000000000000000000000bc694e60470000e4ffffa9aaaaaaaa00000000000000000000000000000000000000000000000000000000012001000000007daea9c20aadfafd6c98ed7f470000000000000000000100000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000000000000000000000200000000000000b685c51678e75d98ca24e11f46a5d04902e7aad1bf53b2e62dc13e36ec32a30aca2e2eeaa63ac27df44bea4e9d54c90a06103333aaa46623b756e89b92f2e19e38e439b2fa3895257c0e603be8aa4387feaa0f0993425bd11427700c7eaad521547c17a2445e74747ce532b36eff686aece7e32da87d0d4437f92e28d85118f5218f18176c3468fb0f18fae48b4851bdfca073d8fa6606d982cd0f93490fe7a86096c2bfe6a09d6dd8a24ee090cdd1397a"]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0, 0x0, 0x0) [ 111.648865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.650167] audit: type=1804 audit(1594699993.575:10): pid=7718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir490328420/syzkaller.HW8bV7/4/bus" dev="sda1" ino=15742 res=1 [ 111.685625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.685668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.685672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.685684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.685687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.685700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 04:13:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000680), 0x9}, 0x8000000200004d1e, 0x3, 0x0, 0x0, 0x4000000000000, 0x0, 0x27fc}, 0x0, 0x0, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f00000000c0)={{0x2, 0x0, @reserved="d263f0250cff3edda89f008ad4f93a4fad278e605ae24410c9e638a3d6ddeb8b"}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x10001) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @remote}]}, 0x2c}}, 0x0) bind$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x43, 0x3}, 0x4}}, 0x10) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@part={'part'}}, {@nls={'nls', 0x3d, 'maciceland'}}, {@force='force'}, {@umask={'umask'}}]}) [ 111.685703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.685712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.685715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.689103] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 111.718481] hrtimer: interrupt took 25556 ns [ 111.810025] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 111.817833] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.842587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.854676] audit: type=1804 audit(1594699993.785:11): pid=7737 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir738262924/syzkaller.wFCHia/1/file0/bus" dev="loop2" ino=3 res=1 [ 111.882287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.925734] audit: type=1800 audit(1594699993.785:12): pid=7737 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="loop2" ino=3 res=0 [ 111.948404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:13:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) [ 111.976040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.986572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.996362] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 112.024542] audit: type=1804 audit(1594699993.955:13): pid=7743 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir738262924/syzkaller.wFCHia/1/file0/bus" dev="loop2" ino=3 res=1 [ 112.034481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:13:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0, 0x0, 0x0) [ 112.055725] audit: type=1800 audit(1594699993.955:14): pid=7743 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="loop2" ino=3 res=0 [ 112.098487] hfsplus: unable to find HFS+ superblock [ 112.106423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 112.106708] audit: type=1400 audit(1594699994.035:15): avc: denied { sys_admin } for pid=7748 comm="syz-executor.0" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 112.124961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.156295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 112.166900] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.169606] IPVS: ftp: loaded support on port[0] = 21 [ 112.180259] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 112.180310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 112.239189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.239886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.411416] audit: type=1804 audit(1594699994.335:16): pid=7772 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir738262924/syzkaller.wFCHia/2/file0/bus" dev="loop2" ino=4 res=1 [ 112.411499] audit: type=1800 audit(1594699994.335:17): pid=7772 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="loop2" ino=4 res=0 04:13:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x9, 0x7e, 0x25, 0x7fffffff, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x6, 0xe0e0e0e0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) write$6lowpan_control(r2, &(0x7f0000000140)='connect aa:aa:aa:aa:aa:11 1', 0x1b) setfsuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') r3 = dup3(0xffffffffffffffff, r2, 0x80000) sendmsg$nl_generic(r3, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f00000001c0)={0x49c, 0x3e, 0x200, 0x70bd29, 0x25dfdbfd, {0xb}, [@nested={0x482, 0x34, 0x0, 0x1, [@generic="5cee55f54a225eb277c4f90161d3d3ae0dcd0d70c091602697247e0c010e6812", @generic="fd5f0ec25fb695586a36dd559cd4809e23e81b047100a2deef01aee905d87f704c6f6625d091d81c3ee77e9b175f84b8cd668ad5cb1559a383e0b573f4b393a3401bfd8d459cbae01c44464df17d3095c5dcc1fc417e7b94b458080b3df3572428195cacdefd3d00af4a125377af3da2c170e6b519d02d33c75c00c93c2e29fda7d64b2dbaa51a30d2ee5e3e", @generic="0f25d3aa320046067729b9a601dd22d133e5f94a25a525bc58a4b84bd64146f24971b08626f2d6c3599f9f7675fbac38bd8ff0073ca58b5bc61f55c37167eaa9beb65e2b29d8e40e5bdb0f672e314319c720ab4fc41d6699d2407f672997f47ecca4416a1ee44e8c675b62cf69f98dd54a4f19162dd5cc7c253dcfd778f257bd3761b187d1ade08ce71a501c13825da1d0c8eda5cc0e9b38b9ef03e2334dac34b978026ce7e784ec0fa45653e907579f7bcd046832f67ee16788d7d0bebcb66ff206467f4265b365c4c6cacb10d042e12196b413a86c187ac5d851866e96049677516732", @typed={0xa0, 0x77, 0x0, 0x0, @binary="d1c2d5351f824cf6cb853b37e9cd0ad7bb5bc07760d32047e074b20fc19612d4a5a1e53f79a3111567dffcaab401565ee2807ce30cf93c1fb4021b5af883b138f0e2da250b510bcf39c6e92f74e2dc7ddc8c205c85446fff45342aaa2d1933753f8c40effe9f84308ae0863ceb12bc9f53403c1200966fc14f24b227938a7a0b8607286b19b724d56c3e844a72b7130bb6902bfc9cc96615305e4475"}, @generic="601017a8066f3d9231ae921155b7cc600fb075f29d5f0b1402903c0129049a601e5fab7eee71772a02f6d565103c5e658ec91afdee699640e318a8436c511508def9fb0bcffba32068e551e10509b1b985a80ef769c7873a8b461574e3e7b78c036c680df5fb2a", @generic="49e3f39626a78deb8fc3052cac3e79efca8c0d25d448a05d3240ef648d2d66303f575bee95a2e364bb0e57691e721cef01d82970bb8e5e79200da987310879cb989a45211fa5fcaa523e1867d0030318587289b2c80a47c576b5175d5e8445038e3c3e0720718c86f676c83ed78cbea90d1ff8b6ea78e562cf583b280c2665f91addfb2a91acf9ff2e7257c34be13a308330470412f236b65762e8bbd9a2c62e1f255fce90873f441e728416d76cc374c759320107917e764a48321dc634acf70e09a66a6eb9456deb13d95041e02490cb1fb429528c3b5b463f3bbe400e333bd6dfa41dd9e6b5bf86e2262018b7a2c58621", @typed={0x8, 0x5e, 0x0, 0x0, @ipv4=@broadcast}, @generic="e5539f74885977b14c4f14b26392c5b0f8ff589d0ccdf64cddfd6afb305fbc9254a517ad54c2f707ba2f9efea91260ed10023e0efcde80e7a9f08d092186792a91a3961e4f3135b9b87bc4cda4f1c73617e4f5db1b2d9e35e4ed0b3aece5624a440e8982a79896fdf8d21194069aa111e4a905b00629078b2f1dd33672ab647eda36675cf25b0b77f02b28805d7ccb15ec0d6bd204513942908a3410af135fae2491334fbbfbc7622ef0044cf448529a9e5bd0773ee3a3a30ff75da8af8783f9854143a47e0cb9098241795c3f8188142d7197245e2410e8458fc52b9748df2a6bba7e89d724ac556b1c848499"]}, @typed={0x4, 0x1b}]}, 0x49c}}, 0x40) 04:13:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0, 0x0, 0x0) 04:13:14 executing program 3: r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x280) r1 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x280) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@uni_xlate='uni_xlate=1'}]}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x3}, 0x16, 0x5) 04:13:15 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = dup(r0) open(&(0x7f0000000000)='./file0\x00', 0x153440, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0xa20000, 0x9, 0x2, r1, 0x0, &(0x7f0000000040)={0x9b0908, 0x1, [], @value64=0x4}}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, 0x0, 0x0) 04:13:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000680), 0x9}, 0x8000000200004d1e, 0x3, 0x0, 0x0, 0x4000000000000, 0x0, 0x27fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0xa30000, 0x43, 0x81, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990afd, 0x0, [], @p_u32=&(0x7f0000000080)=0x1}}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="34000200", @ANYRES16, @ANYRESOCT=r5], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4070000", @ANYRES16=r5, @ANYBLOB="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"], 0x7a4}, 0x1, 0x0, 0x0, 0x4090}, 0x44001) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r7, r6, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r6, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0x2000000000f, &(0x7f0000f10000)=0x100, 0x4) bind$inet6(r8, &(0x7f0000f13000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) dup3(r2, r8, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000200)={0x7, 'bridge_slave_1\x00', {0x8}, 0x9}) 04:13:15 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @remote}]}, 0x2c}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f00000000c0)=0x5) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) 04:13:15 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f135d", 0x13, 0x400}, {0x0, 0x0, 0x34f9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x150, 0x150, 0x150, 0xffffffff, 0xffffffff, 0x340, 0x340, 0x340, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x1c}, @dev={0xfe, 0x80, [], 0xf}, [0xff000000, 0xff000000, 0xff, 0xffffff], [0xffffff00, 0xffffff00, 0xffffff00], 'lo\x00', 'team0\x00', {0xff}, {0xff}, 0x3a, 0x2, 0x3, 0x40}, 0x0, 0x108, 0x150, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}, {[0x4, 0x9], 0x1, 0x1d, 0x1}}, @common=@frag={{0x30, 'frag\x00'}, {[0x6, 0x2], 0x2, 0x1}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8000, 'syz1\x00', {0x7}}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x14}, [0x0, 0x0, 0xffff00], [0x0, 0xffffff00], 'ip6erspan0\x00', 'wg2\x00', {}, {0xff}, 0x33, 0xd5, 0x2, 0x24}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"6af6"}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x60, 0x5, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x470) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x4, &(0x7f0000001900)=[{&(0x7f0000000680)="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", 0x1000, 0x4}, {&(0x7f0000001680)="80e3cfd46736ac699081ba8b91dbebf77d9a329323cba08a3ae7353238378904e86a68ea56d5fb8bc9385dd630b28bf288249141e455db0f1994d008e0aa37456b819a1c8ad1f8adaba7693c5fc02282de06499207134187adab2e83a5d381c5923f615a316ee1fd35a94d2fa551eb0ed71925b2f36ec876f62b0aa4576010e66fb73711f1179297164bd6ae8e003a9a87ee1042b6d625d21ad090a2a367f2b417aa8a0d876a1741035a54749cbe64b23e8752cf54452311dbe1cf81c8e5a4ec759de116ca3367c06126ab91473bdcd699a8", 0xd2, 0x7fff}, {&(0x7f0000001780)="a76d6d094fc662207e8e8ca9b172ee4cf39c55ee0815a59947fb5a8216d77c4be00effb6fbd52d6967eb98a9f419565546c07af93f0602a497aabbdb900e4d13f2c9252bbc0cadfd564eb879508cfe496a3f277d2b9ff7c7c0d072ee8bab634eaf", 0x61, 0x6}, {&(0x7f0000001800)="1bff60b46f13764d390850224ee27887c879a0cc82301dff6578ad363956167cf81a707582d016422a9d5cce56f5bc909597261fcd72f3425bb3017f7d200737576353778547febc8a229988b47d6611745add9759074e4a963c6bb3a75c8902833e7dddcde4eee1e40201deb2e050e18a6a4a8129fc97d4658d82fba563a2cdd4d84324ed502f0549f94b8d5e6b11cca8bf1b7f70a959bcd391213bce22d2ca7de65af7edd5fe9ad390bd2bdf4e9678c0f9b68c731d64972daa9aa4dc2bdb31b228efbc2bd3bef2be84cb4ce3ca44c133345435b30b407fc48526e5", 0xdc, 0x1}], 0x0, &(0x7f0000001980)={[{@allocsize={'allocsize', 0x3d, [0x39, 0xfd, 0x70, 0x74, 0x6d, 0x25]}}, {@dax='dax'}, {@ikeep='ikeep'}, {@noquota='noquota'}], [{@obj_role={'obj_role', 0x3d, 'minix\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@obj_user={'obj_user', 0x3d, 'wg2\x00'}}, {@subj_type={'subj_type', 0x3d, 'lo\x00'}}, {@subj_type={'subj_type', 0x3d, 'REJECT\x00'}}, {@dont_hash='dont_hash'}]}) 04:13:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x80002, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x8) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 112.888271] audit: type=1804 audit(1594699994.815:18): pid=7849 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir738262924/syzkaller.wFCHia/3/file0/bus" dev="loop2" ino=5 res=1 [ 113.059079] FAT-fs (loop3): bogus number of reserved sectors [ 113.059109] FAT-fs (loop3): Can't find a valid FAT filesystem [ 113.244212] FAT-fs (loop2): invalid media value (0x00) 04:13:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:15 executing program 2: socket$nl_route(0x10, 0x3, 0x0) setitimer(0x1, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000140)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet(0xa, 0x801, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) listen(r0, 0x4) accept4(r0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x80000000, 0x1c}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004904449cce4955a26af023678982ec771b321e05b02aa824fc70a4c87f5b7bbf2d328375b70dfbc7b736ea84151625a7908e14c2cd7ef997add9afcae137d41a2f73bfbb95f6bccf0e2cd13b7764aef0ef7ebf98d1409b1aa3bb3dfab6d7a6752587de21999b86563b10b2832ac378e4e309cfb8f9e32135792a09fb1fe3c94af7987857b7fb4ac35f459d26883930667d22c7e7d0b30d11f28dec893d9870c4e0faded359"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='ocfs2\x00', 0x810000, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(0xffffffffffffffff, 0x806c4120, &(0x7f0000000180)) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r1, &(0x7f0000000340)=""/41, 0x29) 04:13:15 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r6}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:15 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:15 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:15 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:16 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) [ 113.355587] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 113.360581] minix_free_inode: bit 1 already cleared [ 113.378388] FAT-fs (loop2): Can't find a valid FAT filesystem [ 113.669442] (syz-executor.2,7919,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! [ 113.669476] (syz-executor.2,7919,0):ocfs2_fill_super:1217 ERROR: status = -22 [ 113.778280] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 113.778319] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 113.778327] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 113.794390] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 113.795471] EXT4-fs (loop4): get root inode failed [ 113.795478] EXT4-fs (loop4): mount failed [ 113.856136] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 114.437846] (syz-executor.2,7919,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! [ 114.437859] (syz-executor.2,7919,0):ocfs2_fill_super:1217 ERROR: status = -22 04:13:16 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) 04:13:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:16 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:16 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r6}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x4c0042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0xc735, @empty, 0xae}, 0x1c) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000340)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @remote}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x102200}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@newtclass={0x100, 0x28, 0x0, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xc, 0x6}, {0x6, 0x3}, {0x0, 0x5}}, [@tclass_kind_options=@c_cake={0x9, 0x1, 'cake\x00'}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @tclass_kind_options=@c_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x14, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0xfffffffe, 0xfffffc01, 0x3}}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x74, 0x2, [@TCA_ATM_FD={0x8}, @TCA_ATM_HDR={0x21, 0x3, "2273a62ddc89f5fa67c37d02cddce08b6c07ef3677aad4dfdd03991e39"}, @TCA_ATM_HDR={0x3b, 0x3, "6302d5f4fde93755b8b9463d358b4f242f68d4c052ad02becd0b87ebbc1ad72c91096b0e3338020ab4da52bf999390e572a93cc4a7e944"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x2, 0xfff2}}]}}, @TCA_RATE={0x6, 0x5, {0x0, 0xff}}, @TCA_RATE={0x6, 0x5, {0x1}}, @tclass_kind_options=@c_ingress={0xc, 0x1, 'ingress\x00'}, @TCA_RATE={0x6, 0x5, {0x6, 0x1f}}, @tclass_kind_options=@c_sfb={0x8, 0x1, 'sfb\x00'}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000800}, 0x4001) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000240)={r0}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x480, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f00000003c0)=0x4, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8980, &(0x7f0000000100)) 04:13:16 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:16 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:16 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc) 04:13:16 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:16 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r1}, 0xc) 04:13:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:17 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 115.142632] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 115.142643] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 115.142651] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 115.157967] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 115.158310] EXT4-fs (loop4): get root inode failed [ 115.158317] EXT4-fs (loop4): mount failed 04:13:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:17 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x4c0042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0xc735, @empty, 0xae}, 0x1c) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000340)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @remote}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x102200}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@newtclass={0x100, 0x28, 0x0, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xc, 0x6}, {0x6, 0x3}, {0x0, 0x5}}, [@tclass_kind_options=@c_cake={0x9, 0x1, 'cake\x00'}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @tclass_kind_options=@c_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x14, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0xfffffffe, 0xfffffc01, 0x3}}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x74, 0x2, [@TCA_ATM_FD={0x8}, @TCA_ATM_HDR={0x21, 0x3, "2273a62ddc89f5fa67c37d02cddce08b6c07ef3677aad4dfdd03991e39"}, @TCA_ATM_HDR={0x3b, 0x3, "6302d5f4fde93755b8b9463d358b4f242f68d4c052ad02becd0b87ebbc1ad72c91096b0e3338020ab4da52bf999390e572a93cc4a7e944"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x2, 0xfff2}}]}}, @TCA_RATE={0x6, 0x5, {0x0, 0xff}}, @TCA_RATE={0x6, 0x5, {0x1}}, @tclass_kind_options=@c_ingress={0xc, 0x1, 'ingress\x00'}, @TCA_RATE={0x6, 0x5, {0x6, 0x1f}}, @tclass_kind_options=@c_sfb={0x8, 0x1, 'sfb\x00'}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000800}, 0x4001) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000240)={r0}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x480, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f00000003c0)=0x4, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8980, &(0x7f0000000100)) 04:13:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x1) 04:13:17 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r6}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:17 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) 04:13:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000, 0x2, &(0x7f0000002280)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x804803, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_genetlink_get_family_id$team(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="c0"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0xf, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x1, 0x0, 0x0, {{0x0, 0x2}, [@TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x5c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000228bd7000fddbdf25080000000c00018008000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000300000000000800030002000000140002006970366772653000000000000000000008000100", @ANYRES32=r5, @ANYBLOB], 0x1dc}, 0x1, 0x0, 0x0, 0x2fa050dcfb9d201d}, 0x4) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, 0x0, 0x0) [ 116.166346] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 116.166356] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 116.166363] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 116.185827] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 116.186874] EXT4-fs (loop4): get root inode failed [ 116.186882] EXT4-fs (loop4): mount failed [ 116.744074] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 116.744442] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 116.744452] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 116.744459] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 116.757498] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 116.857356] IPVS: ftp: loaded support on port[0] = 21 [ 117.029949] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 117.030350] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 117.030359] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 117.030368] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 117.056656] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:13:19 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="193c1f00c82dab12f84c48b7d34ac67ab67891d2bf8954c142a1ba1a195bd35da90932fd16a323bdc051b395bc7f074ad3cbbbc2bd331580540b2c11be65a03d3b82714289d9a3ff2a10f790ce71d934ec0f4ce3647eab85f84c00970ca23fbaa429b8c280ac5a8b679c1496d9b7d1c6ff61fd7fba4bbeea3a33a646d30f68f47dfa9330e5"]) 04:13:19 executing program 1: capset(0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:19 executing program 2: capset(0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:19 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r6}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000, 0x2, &(0x7f0000002280)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x804803, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_genetlink_get_family_id$team(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="c0"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0xf, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x1, 0x0, 0x0, {{0x0, 0x2}, [@TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x5c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000228bd7000fddbdf25080000000c00018008000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000300000000000800030002000000140002006970366772653000000000000000000008000100", @ANYRES32=r5, @ANYBLOB], 0x1dc}, 0x1, 0x0, 0x0, 0x2fa050dcfb9d201d}, 0x4) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, 0x0, 0x0) 04:13:19 executing program 1: capset(0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:19 executing program 2: capset(0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:19 executing program 2: capset(0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 117.606151] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 117.606517] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 117.606524] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 117.606531] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 117.622304] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 117.661550] tmpfs: No value for mount option '<' [ 117.725334] tmpfs: No value for mount option '<' [ 117.894763] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 117.894774] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 117.894781] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:13:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:20 executing program 1: capset(0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:20 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x3ff}) 04:13:20 executing program 2: capset(&(0x7f0000000000), &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:20 executing program 5: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x4, 0x70bd28, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x200}, {0x8, 0x13, 0x5e}, {0x5}}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008010}, 0x40010) close(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"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", 0xffffffed}}, 0x1006) [ 117.909921] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 117.910265] EXT4-fs (loop4): get root inode failed [ 117.910272] EXT4-fs (loop4): mount failed 04:13:20 executing program 1: capset(&(0x7f0000000000), &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:20 executing program 2: capset(&(0x7f0000000000), &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 118.169980] kauditd_printk_skb: 1 callbacks suppressed [ 118.169988] audit: type=1800 audit(1594700000.095:20): pid=8204 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15793 res=0 04:13:20 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r6}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:20 executing program 1: capset(&(0x7f0000000000), &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:20 executing program 2: capset(&(0x7f0000000000), &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:20 executing program 1: capset(&(0x7f0000000000), &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:20 executing program 2: capset(&(0x7f0000000000)={0x19980330}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x54) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:20 executing program 2: capset(&(0x7f0000000000)={0x19980330}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 118.921534] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 118.921545] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 118.921552] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:13:21 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x3ff}) 04:13:21 executing program 1: capset(&(0x7f0000000000)={0x19980330}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 118.945227] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 118.945533] EXT4-fs (loop4): get root inode failed [ 118.945540] EXT4-fs (loop4): mount failed [ 118.960072] audit: type=1800 audit(1594700000.895:21): pid=8221 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15793 res=0 [ 119.149124] audit: type=1800 audit(1594700001.075:22): pid=8265 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15803 res=0 04:13:21 executing program 2: capset(&(0x7f0000000000)={0x19980330}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000), 0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000140)={0x6, 0x10001, 0x8, {0xc2, 0x8001}, 0xffff, 0x100}) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0002238a7f89011f7daa7a43be0000"], 0x24}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r3 = socket(0x11, 0x800000003, 0x8) getpgid(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x1000, 0x8, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000001c0)="0c268a927d1f6588b967480a41a9b7063fbab3a8f2d0af2a9f7c1f727860ac5cf65ac618def922b3f1e0b02bd67aa03079bcecc7995425a3a07e758044ab4ea6f7ae55d88fece40c1a7511bf746bec66ba", 0x51, 0x20c49a, 0x0, 0x0) 04:13:21 executing program 1: capset(&(0x7f0000000000)={0x19980330}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:21 executing program 1: capset(&(0x7f0000000000)={0x19980330}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:21 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:13:21 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:21 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:21 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 119.839034] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 119.839044] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 119.839051] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 119.849554] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 119.853716] EXT4-fs (loop4): get root inode failed [ 119.853723] EXT4-fs (loop4): mount failed 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:22 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:13:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:22 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x3ff}) 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 120.140286] audit: type=1800 audit(1594700002.075:23): pid=8321 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15817 res=0 [ 120.351580] IPVS: ftp: loaded support on port[0] = 21 04:13:22 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:22 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e21, 0xc735, @empty, 0xae}, 0x1c) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000040)={0x2, [0x3, 0xfffffffffffff880]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:22 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:22 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:22 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:23 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x3ff}) 04:13:23 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:23 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:23 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 121.263953] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 121.263964] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 121.263971] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 121.276020] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 121.276359] EXT4-fs (loop4): get root inode failed [ 121.276366] EXT4-fs (loop4): mount failed [ 121.313281] audit: type=1800 audit(1594700003.235:24): pid=8429 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15821 res=0 04:13:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:23 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x4, 0x1, @remote}]}, 0x2c}}, 0x0) r4 = accept$nfc_llcp(r3, &(0x7f0000000380), &(0x7f00000000c0)=0x60) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000100)=0xd0, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f00000001c0)={0x1, 0x0, {0x0, 0x1, 0xffff, 0x1000}}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x3c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0xff, 0x4, 0xfc, 0x0, 0x7f, 0x3480, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000680), 0x9}, 0x8000000200004d1e, 0x3, 0x0, 0x0, 0x4000000000000, 0x0, 0x27fc}, 0x0, 0x0, r8, 0x0) fcntl$getown(r8, 0x9) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:13:23 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:23 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:23 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:23 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:23 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 121.997665] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 121.997681] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 121.997781] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 122.023856] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 122.024155] EXT4-fs (loop4): get root inode failed [ 122.024162] EXT4-fs (loop4): mount failed 04:13:24 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) 04:13:24 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:24 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:24 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 122.583461] audit: type=1800 audit(1594700004.515:25): pid=8488 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15808 res=0 04:13:25 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:25 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:25 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:25 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:25 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:25 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:25 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 123.342563] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 123.342573] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 123.342580] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 123.358139] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 123.358149] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 123.358157] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 123.363261] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 123.363975] EXT4-fs (loop4): get root inode failed [ 123.363981] EXT4-fs (loop4): mount failed [ 123.376287] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 123.376638] EXT4-fs (loop5): get root inode failed [ 123.376644] EXT4-fs (loop5): mount failed 04:13:25 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:25 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:25 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:25 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:26 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 123.821622] IPVS: ftp: loaded support on port[0] = 21 [ 123.862379] audit: type=1800 audit(1594700005.795:26): pid=8556 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15821 res=0 04:13:26 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:26 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:26 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 124.388894] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 124.388904] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 124.388912] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 124.399506] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 124.400088] EXT4-fs (loop4): get root inode failed 04:13:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:26 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:26 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 124.400094] EXT4-fs (loop4): mount failed [ 124.436033] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 124.436044] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 124.436051] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:13:26 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 124.453810] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 124.454113] EXT4-fs (loop5): get root inode failed [ 124.454120] EXT4-fs (loop5): mount failed 04:13:26 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:26 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:26 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:26 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:27 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:27 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:27 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 124.912415] audit: type=1800 audit(1594700006.845:27): pid=8649 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15821 res=0 [ 125.288322] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 125.288332] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 125.288339] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 125.310195] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 125.310594] EXT4-fs (loop4): get root inode failed [ 125.310601] EXT4-fs (loop4): mount failed 04:13:27 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:27 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:27 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:27 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:27 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:27 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:27 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:27 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 125.732258] audit: type=1800 audit(1594700007.665:28): pid=8707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15821 res=0 [ 125.803718] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 125.803729] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 125.803737] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 125.809334] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 125.810610] EXT4-fs (loop5): get root inode failed [ 125.810616] EXT4-fs (loop5): mount failed 04:13:28 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:28 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:28 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 126.603706] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 126.603715] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 126.603722] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 126.613933] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 126.614248] EXT4-fs (loop4): get root inode failed [ 126.614254] EXT4-fs (loop4): mount failed 04:13:28 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x50100100, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:28 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:28 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:28 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:28 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:28 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:28 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:28 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e000000840000000000000095000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 126.966119] audit: type=1800 audit(1594700008.895:29): pid=8756 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15861 res=0 [ 127.132945] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 127.132956] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 127.132963] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 127.136338] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 127.136701] EXT4-fs (loop5): get root inode failed [ 127.136707] EXT4-fs (loop5): mount failed 04:13:29 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:29 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:29 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 127.524866] IPVS: ftp: loaded support on port[0] = 21 [ 127.675346] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 127.675356] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 127.675364] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 127.689071] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 127.689459] EXT4-fs (loop4): get root inode failed [ 127.689466] EXT4-fs (loop4): mount failed 04:13:29 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x2, 0x80, 0x99, 0x7ff, 0x10}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 128.121175] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 128.121186] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 128.121193] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 128.133939] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 128.134280] EXT4-fs (loop5): get root inode failed [ 128.134285] EXT4-fs (loop5): mount failed 04:13:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 04:13:30 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:30 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:30 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:30 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:30 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:30 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 04:13:30 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 128.386356] audit: type=1800 audit(1594700010.315:30): pid=8856 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15876 res=0 04:13:30 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:30 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:30 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 128.771499] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 128.771509] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 128.771517] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 128.786647] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 128.786932] EXT4-fs (loop4): get root inode failed [ 128.786940] EXT4-fs (loop4): mount failed 04:13:30 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) 04:13:31 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:31 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 04:13:31 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:31 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:31 executing program 2 (fault-call:1 fault-nth:0): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:31 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:31 executing program 2 (fault-call:1 fault-nth:1): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 129.507641] audit: type=1800 audit(1594700011.435:31): pid=8916 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15821 res=0 [ 129.526870] FAULT_INJECTION: forcing a failure. [ 129.526870] name failslab, interval 1, probability 0, space 0, times 1 [ 129.526883] CPU: 1 PID: 8927 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 129.526889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.526893] Call Trace: [ 129.526911] dump_stack+0x1b2/0x283 [ 129.526928] should_fail.cold+0x10a/0x154 [ 129.526944] should_failslab+0xd6/0x130 [ 129.526955] kmem_cache_alloc_node_trace+0x25a/0x400 [ 129.526973] __get_vm_area_node+0xed/0x340 [ 129.526990] __vmalloc_node_range+0xa5/0x690 [ 129.527004] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.527018] ? kstrtouint+0xe6/0x130 [ 129.527035] ? check_stack_object+0x6e/0xa0 [ 129.527048] __vmalloc+0x40/0x50 [ 129.527062] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.527075] bpf_prog_alloc+0x3a/0x1e0 [ 129.527088] bpf_prog_load+0x255/0xe00 [ 129.527101] ? __bpf_prog_charge+0xc0/0xc0 [ 129.527113] ? __might_fault+0x104/0x1b0 [ 129.527126] ? lock_acquire+0x170/0x3f0 [ 129.527137] ? lock_downgrade+0x6e0/0x6e0 [ 129.527152] ? __might_fault+0x177/0x1b0 [ 129.527167] SyS_bpf+0x12b2/0x34e0 [ 129.527180] ? bpf_prog_get+0x20/0x20 [ 129.527191] ? __mutex_unlock_slowpath+0x75/0x780 [ 129.527204] ? wait_for_completion_io+0x10/0x10 [ 129.527216] ? vfs_write+0x319/0x4d0 [ 129.527228] ? fput+0xb/0x140 [ 129.527255] ? do_syscall_64+0x4c/0x640 [ 129.527265] ? bpf_prog_get+0x20/0x20 [ 129.527278] do_syscall_64+0x1d5/0x640 [ 129.527297] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 129.527306] RIP: 0033:0x45cba9 [ 129.527312] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.527326] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 129.527333] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 129.527341] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 129.527348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 129.527356] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 129.532312] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 129.532340] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 129.532426] CPU: 1 PID: 8927 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 129.532432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.532436] Call Trace: [ 129.532453] dump_stack+0x1b2/0x283 [ 129.532468] warn_alloc.cold+0x96/0x1af [ 129.532480] ? zone_watermark_ok_safe+0x250/0x250 [ 129.532494] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 129.532505] ? __get_vm_area_node+0xed/0x340 [ 129.532516] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 129.532529] ? __get_vm_area_node+0x27d/0x340 [ 129.532543] __vmalloc_node_range+0x3b2/0x690 [ 129.532553] ? kstrtouint+0xe6/0x130 [ 129.532566] ? check_stack_object+0x6e/0xa0 [ 129.532580] __vmalloc+0x40/0x50 [ 129.532591] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.532601] bpf_prog_alloc+0x3a/0x1e0 [ 129.532611] bpf_prog_load+0x255/0xe00 [ 129.532621] ? __bpf_prog_charge+0xc0/0xc0 [ 129.532631] ? __might_fault+0x104/0x1b0 [ 129.532644] ? lock_acquire+0x170/0x3f0 [ 129.532653] ? lock_downgrade+0x6e0/0x6e0 [ 129.532667] ? __might_fault+0x177/0x1b0 [ 129.532680] SyS_bpf+0x12b2/0x34e0 [ 129.532694] ? bpf_prog_get+0x20/0x20 [ 129.532702] ? __mutex_unlock_slowpath+0x75/0x780 [ 129.532714] ? wait_for_completion_io+0x10/0x10 [ 129.532724] ? vfs_write+0x319/0x4d0 [ 129.532736] ? fput+0xb/0x140 [ 129.532754] ? do_syscall_64+0x4c/0x640 [ 129.532763] ? bpf_prog_get+0x20/0x20 [ 129.532776] do_syscall_64+0x1d5/0x640 [ 129.532791] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 129.532799] RIP: 0033:0x45cba9 [ 129.532804] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.532815] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 129.532822] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 129.532828] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 129.532834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 129.532841] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 129.532908] Mem-Info: [ 129.532934] active_anon:111641 inactive_anon:4044 isolated_anon:0 [ 129.532934] active_file:6921 inactive_file:10403 isolated_file:0 [ 129.532934] unevictable:0 dirty:299 writeback:0 unstable:0 [ 129.532934] slab_reclaimable:16575 slab_unreclaimable:120721 [ 129.532934] mapped:60276 shmem:4200 pagetables:1037 bounce:0 [ 129.532934] free:1261555 free_pcp:154 free_cma:0 [ 129.532955] Node 0 active_anon:446564kB inactive_anon:16176kB active_file:27552kB inactive_file:41612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241104kB dirty:1192kB writeback:0kB shmem:16800kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 397312kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 129.532975] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 129.532979] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 129.533000] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 129.533019] Node 0 DMA32 free:1246152kB min:36296kB low:45368kB high:54440kB active_anon:446564kB inactive_anon:16176kB active_file:27552kB inactive_file:41612kB unevictable:0kB writepending:1192kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7424kB pagetables:4148kB bounce:0kB free_pcp:616kB local_pcp:468kB free_cma:0kB [ 129.533041] lowmem_reserve[]: 0 0 0 0 0 [ 129.533060] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 129.533080] lowmem_reserve[]: 0 0 0 0 0 [ 129.533100] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 129.533124] lowmem_reserve[]: 0 0 0 0 0 [ 129.536726] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 129.536803] Node 0 DMA32: 5696*4kB (UME) 120*8kB (UM) 60*16kB (UM) 35*32kB (UM) 16*64kB (UM) 4*128kB (ME) 2*256kB (U) 1*512kB (U) 3*1024kB (UME) 6*2048kB (U) 293*4096kB (UM) = 1243872kB [ 129.536882] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 129.536937] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 129.537024] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 129.537032] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 129.537040] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 129.537048] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 129.537052] 20871 total pagecache pages [ 129.537062] 0 pages in swap cache [ 129.537067] Swap cache stats: add 0, delete 0, find 0/0 [ 129.537071] Free swap = 0kB [ 129.537074] Total swap = 0kB [ 129.537221] 1965979 pages RAM [ 129.537226] 0 pages HighMem/MovableOnly [ 129.537229] 338456 pages reserved [ 129.537232] 0 pages cma reserved [ 129.605400] FAULT_INJECTION: forcing a failure. [ 129.605400] name failslab, interval 1, probability 0, space 0, times 0 [ 129.605414] CPU: 0 PID: 8934 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 129.605420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.605423] Call Trace: [ 129.605441] dump_stack+0x1b2/0x283 [ 129.605457] should_fail.cold+0x10a/0x154 [ 129.605472] should_failslab+0xd6/0x130 [ 129.605484] kmem_cache_alloc_node_trace+0x25a/0x400 [ 129.605501] alloc_vmap_area+0xf0/0x7c0 [ 129.605521] ? purge_vmap_area_lazy+0x40/0x40 [ 129.605532] ? rcu_read_lock_sched_held+0x10a/0x130 [ 129.605542] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 129.605555] __get_vm_area_node+0x126/0x340 [ 129.605571] __vmalloc_node_range+0xa5/0x690 [ 129.605582] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.605594] ? kstrtouint+0xe6/0x130 [ 129.605609] ? check_stack_object+0x6e/0xa0 [ 129.605624] __vmalloc+0x40/0x50 [ 129.605637] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.605649] bpf_prog_alloc+0x3a/0x1e0 [ 129.605659] bpf_prog_load+0x255/0xe00 [ 129.605669] ? __bpf_prog_charge+0xc0/0xc0 [ 129.605682] ? __might_fault+0x104/0x1b0 [ 129.605705] ? lock_acquire+0x170/0x3f0 [ 129.605716] ? lock_downgrade+0x6e0/0x6e0 [ 129.605733] ? __might_fault+0x177/0x1b0 [ 129.605751] SyS_bpf+0x12b2/0x34e0 [ 129.605767] ? bpf_prog_get+0x20/0x20 [ 129.605780] ? __mutex_unlock_slowpath+0x75/0x780 [ 129.605794] ? wait_for_completion_io+0x10/0x10 [ 129.605805] ? vfs_write+0x319/0x4d0 [ 129.605817] ? fput+0xb/0x140 [ 129.605836] ? do_syscall_64+0x4c/0x640 [ 129.605846] ? bpf_prog_get+0x20/0x20 [ 129.605859] do_syscall_64+0x1d5/0x640 [ 129.605885] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 129.605895] RIP: 0033:0x45cba9 [ 129.605901] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.605913] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 129.605919] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 129.605925] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 129.605931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 129.605937] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 129.607146] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 129.607169] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 129.607192] CPU: 0 PID: 8934 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 129.607198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.607202] Call Trace: [ 129.607216] dump_stack+0x1b2/0x283 [ 129.607233] warn_alloc.cold+0x96/0x1af [ 129.607247] ? zone_watermark_ok_safe+0x250/0x250 [ 129.607259] ? debug_object_activate+0x450/0x450 [ 129.607273] ? kfree+0x1cf/0x260 [ 129.607292] ? __get_vm_area_node+0x27d/0x340 [ 129.607309] __vmalloc_node_range+0x3b2/0x690 [ 129.607321] ? kstrtouint+0xe6/0x130 [ 129.607335] ? check_stack_object+0x6e/0xa0 [ 129.607347] __vmalloc+0x40/0x50 [ 129.607359] ? bpf_prog_alloc+0x3a/0x1e0 [ 129.607372] bpf_prog_alloc+0x3a/0x1e0 [ 129.607386] bpf_prog_load+0x255/0xe00 [ 129.607398] ? __bpf_prog_charge+0xc0/0xc0 [ 129.607406] ? __might_fault+0x104/0x1b0 [ 129.607424] ? lock_acquire+0x170/0x3f0 [ 129.607434] ? lock_downgrade+0x6e0/0x6e0 [ 129.607450] ? __might_fault+0x177/0x1b0 [ 129.607463] SyS_bpf+0x12b2/0x34e0 [ 129.607478] ? bpf_prog_get+0x20/0x20 [ 129.607488] ? __mutex_unlock_slowpath+0x75/0x780 [ 129.607500] ? wait_for_completion_io+0x10/0x10 [ 129.607514] ? vfs_write+0x319/0x4d0 [ 129.607527] ? fput+0xb/0x140 [ 129.607547] ? do_syscall_64+0x4c/0x640 [ 129.607557] ? bpf_prog_get+0x20/0x20 [ 129.607592] do_syscall_64+0x1d5/0x640 [ 129.607611] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 129.607618] RIP: 0033:0x45cba9 [ 129.607624] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.607636] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 129.607642] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 129.607648] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 129.607654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 129.607660] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 129.674778] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 129.674787] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 129.674793] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 129.688803] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 129.689163] EXT4-fs (loop5): get root inode failed [ 129.689170] EXT4-fs (loop5): mount failed 04:13:33 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:33 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:33 executing program 2 (fault-call:1 fault-nth:2): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:33 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x2, 0x1, 0x4, 0x800, 0xd2f, {0x0, 0xea60}, {0x3, 0x8, 0x21, 0x1, 0x5, 0x7, "34d32cc4"}, 0x80, 0x2, @planes=&(0x7f0000000040)={0x80000000, 0x80000001, @userptr=0x7fffffff, 0x401}, 0x1, 0x0, r4}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) 04:13:33 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 04:13:33 executing program 2 (fault-call:1 fault-nth:3): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:33 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:33 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 04:13:33 executing program 2 (fault-call:1 fault-nth:4): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:33 executing program 2 (fault-call:1 fault-nth:5): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:33 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 131.391516] FAULT_INJECTION: forcing a failure. [ 131.391516] name failslab, interval 1, probability 0, space 0, times 0 [ 131.391529] CPU: 0 PID: 8966 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 131.391535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.391538] Call Trace: [ 131.391557] dump_stack+0x1b2/0x283 [ 131.391573] should_fail.cold+0x10a/0x154 [ 131.391589] should_failslab+0xd6/0x130 [ 131.391601] kmem_cache_alloc_node_trace+0x25a/0x400 [ 131.391617] __kmalloc_node+0x38/0x70 [ 131.391633] __vmalloc_node_range+0x182/0x690 [ 131.391645] ? kstrtouint+0xe6/0x130 [ 131.391673] __vmalloc+0x40/0x50 [ 131.391687] ? bpf_prog_alloc+0x3a/0x1e0 [ 131.391699] bpf_prog_alloc+0x3a/0x1e0 [ 131.391712] bpf_prog_load+0x255/0xe00 [ 131.391724] ? __bpf_prog_charge+0xc0/0xc0 [ 131.391736] ? __might_fault+0x104/0x1b0 [ 131.391750] ? lock_acquire+0x170/0x3f0 [ 131.391759] ? lock_downgrade+0x6e0/0x6e0 [ 131.391775] ? __might_fault+0x177/0x1b0 [ 131.391788] SyS_bpf+0x12b2/0x34e0 04:13:34 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:34 executing program 2 (fault-call:1 fault-nth:6): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:34 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 131.391801] ? bpf_prog_get+0x20/0x20 [ 131.391810] ? __mutex_unlock_slowpath+0x75/0x780 [ 131.391822] ? wait_for_completion_io+0x10/0x10 [ 131.391844] ? vfs_write+0x319/0x4d0 [ 131.391856] ? fput+0xb/0x140 [ 131.391874] ? do_syscall_64+0x4c/0x640 [ 131.391882] ? bpf_prog_get+0x20/0x20 [ 131.391894] do_syscall_64+0x1d5/0x640 04:13:34 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 131.391910] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 131.391918] RIP: 0033:0x45cba9 [ 131.391924] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.391937] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 131.391944] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 131.391950] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.391957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 131.391964] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 131.444046] audit: type=1800 audit(1594700013.375:32): pid=8964 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15888 res=0 [ 131.475499] FAULT_INJECTION: forcing a failure. [ 131.475499] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 131.476328] CPU: 0 PID: 8981 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 131.476333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.476337] Call Trace: [ 131.476355] dump_stack+0x1b2/0x283 [ 131.476371] should_fail.cold+0x10a/0x154 [ 131.476387] __alloc_pages_nodemask+0x22b/0x2730 [ 131.476401] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 131.476415] ? __vmalloc+0x40/0x50 [ 131.476427] ? bpf_prog_alloc+0x3a/0x1e0 [ 131.476438] ? bpf_prog_load+0x255/0xe00 [ 131.476446] ? SyS_bpf+0x12b2/0x34e0 [ 131.476458] ? do_syscall_64+0x1d5/0x640 [ 131.476475] ? lock_acquire+0x170/0x3f0 [ 131.476487] ? lock_downgrade+0x6e0/0x6e0 [ 131.476505] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 131.476519] ? _raw_spin_unlock+0x29/0x40 [ 131.476531] ? fs_reclaim_acquire+0x10/0x10 [ 131.476555] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 131.476569] ? kasan_unpoison_shadow+0x30/0x40 [ 131.476586] alloc_pages_current+0xe7/0x1e0 [ 131.476611] __vmalloc_node_range+0x3f9/0x690 [ 131.476634] __vmalloc+0x40/0x50 [ 131.476647] ? bpf_prog_alloc+0x3a/0x1e0 [ 131.476658] bpf_prog_alloc+0x3a/0x1e0 [ 131.476669] bpf_prog_load+0x255/0xe00 [ 131.476681] ? __bpf_prog_charge+0xc0/0xc0 [ 131.476693] ? __might_fault+0x104/0x1b0 [ 131.476709] ? lock_acquire+0x170/0x3f0 [ 131.476720] ? lock_downgrade+0x6e0/0x6e0 [ 131.476736] ? __might_fault+0x177/0x1b0 [ 131.476750] SyS_bpf+0x12b2/0x34e0 [ 131.476765] ? bpf_prog_get+0x20/0x20 [ 131.476774] ? __mutex_unlock_slowpath+0x75/0x780 [ 131.476787] ? wait_for_completion_io+0x10/0x10 [ 131.476800] ? vfs_write+0x319/0x4d0 [ 131.476815] ? fput+0xb/0x140 [ 131.476842] ? do_syscall_64+0x4c/0x640 [ 131.476852] ? bpf_prog_get+0x20/0x20 [ 131.476865] do_syscall_64+0x1d5/0x640 [ 131.476884] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 131.476894] RIP: 0033:0x45cba9 [ 131.476901] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.476917] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 131.476925] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 131.476931] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.476938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 131.476947] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 131.479254] syz-executor.2: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 131.479280] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 131.479304] CPU: 0 PID: 8981 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 131.479312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.479315] Call Trace: [ 131.479331] dump_stack+0x1b2/0x283 [ 131.479351] warn_alloc.cold+0x96/0x1af [ 131.479364] ? zone_watermark_ok_safe+0x250/0x250 [ 131.479380] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 131.479393] ? kasan_unpoison_shadow+0x30/0x40 [ 131.479411] __vmalloc_node_range+0x47c/0x690 [ 131.479429] __vmalloc+0x40/0x50 [ 131.479448] ? bpf_prog_alloc+0x3a/0x1e0 [ 131.479460] bpf_prog_alloc+0x3a/0x1e0 [ 131.479472] bpf_prog_load+0x255/0xe00 [ 131.479484] ? __bpf_prog_charge+0xc0/0xc0 [ 131.479495] ? __might_fault+0x104/0x1b0 [ 131.479507] ? lock_acquire+0x170/0x3f0 [ 131.479517] ? lock_downgrade+0x6e0/0x6e0 [ 131.479532] ? __might_fault+0x177/0x1b0 [ 131.479545] SyS_bpf+0x12b2/0x34e0 [ 131.479556] ? bpf_prog_get+0x20/0x20 [ 131.479565] ? __mutex_unlock_slowpath+0x75/0x780 [ 131.479579] ? wait_for_completion_io+0x10/0x10 [ 131.479591] ? vfs_write+0x319/0x4d0 [ 131.479602] ? fput+0xb/0x140 [ 131.479616] ? do_syscall_64+0x4c/0x640 [ 131.479624] ? bpf_prog_get+0x20/0x20 [ 131.479638] do_syscall_64+0x1d5/0x640 [ 131.479653] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 131.479661] RIP: 0033:0x45cba9 [ 131.479667] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.479678] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 131.479685] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 131.479691] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.479697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 131.479703] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 131.482590] warn_alloc_show_mem: 1 callbacks suppressed [ 131.482595] Mem-Info: [ 131.482624] active_anon:111673 inactive_anon:4044 isolated_anon:0 [ 131.482624] active_file:6922 inactive_file:10403 isolated_file:0 [ 131.482624] unevictable:0 dirty:299 writeback:0 unstable:0 [ 131.482624] slab_reclaimable:16587 slab_unreclaimable:120637 [ 131.482624] mapped:60283 shmem:4200 pagetables:1031 bounce:0 [ 131.482624] free:1261502 free_pcp:214 free_cma:0 [ 131.482649] Node 0 active_anon:446692kB inactive_anon:16176kB active_file:27556kB inactive_file:41612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241132kB dirty:1192kB writeback:0kB shmem:16800kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 389120kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 131.482666] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 131.482670] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 131.482693] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 131.482719] Node 0 DMA32 free:1245940kB min:36296kB low:45368kB high:54440kB active_anon:446692kB inactive_anon:16176kB active_file:27556kB inactive_file:41612kB unevictable:0kB writepending:1192kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7520kB pagetables:4124kB bounce:0kB free_pcp:856kB local_pcp:576kB free_cma:0kB [ 131.482745] lowmem_reserve[]: 0 0 0 0 0 [ 131.482768] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 131.482791] lowmem_reserve[]: 0 0 0 0 0 [ 131.482812] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 131.482849] lowmem_reserve[]: 0 0 0 0 0 [ 131.482873] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 131.482957] Node 0 DMA32: 5495*4kB (UM) 205*8kB (UM) 80*16kB (UME) 41*32kB (UM) 18*64kB (UM) 5*128kB (UM) 1*256kB (U) 0*512kB 3*1024kB (UME) 7*2048kB (UM) 293*4096kB (UM) = 1245796kB [ 131.483050] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 131.483107] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 131.483200] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 131.483217] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 131.485894] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 131.485903] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 131.485908] 20871 total pagecache pages [ 131.485919] 0 pages in swap cache [ 131.485926] Swap cache stats: add 0, delete 0, find 0/0 [ 131.485930] Free swap = 0kB [ 131.485934] Total swap = 0kB [ 131.485940] 1965979 pages RAM [ 131.485945] 0 pages HighMem/MovableOnly [ 131.485948] 338456 pages reserved [ 131.485952] 0 pages cma reserved [ 131.566919] FAULT_INJECTION: forcing a failure. [ 131.566919] name failslab, interval 1, probability 0, space 0, times 0 [ 131.566934] CPU: 1 PID: 8990 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 131.566940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.566944] Call Trace: [ 131.566961] dump_stack+0x1b2/0x283 [ 131.566978] should_fail.cold+0x10a/0x154 [ 131.566995] should_failslab+0xd6/0x130 [ 131.567008] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 131.567017] ? __vmalloc+0x40/0x50 [ 131.567032] bpf_prog_alloc+0x177/0x1e0 [ 131.567043] bpf_prog_load+0x255/0xe00 [ 131.567056] ? __bpf_prog_charge+0xc0/0xc0 [ 131.567067] ? __might_fault+0x104/0x1b0 [ 131.567081] ? lock_acquire+0x170/0x3f0 [ 131.567091] ? lock_downgrade+0x6e0/0x6e0 [ 131.567106] ? __might_fault+0x177/0x1b0 [ 131.567119] SyS_bpf+0x12b2/0x34e0 [ 131.567132] ? bpf_prog_get+0x20/0x20 [ 131.567141] ? __mutex_unlock_slowpath+0x75/0x780 [ 131.567152] ? wait_for_completion_io+0x10/0x10 [ 131.567163] ? vfs_write+0x319/0x4d0 [ 131.567173] ? fput+0xb/0x140 [ 131.567189] ? do_syscall_64+0x4c/0x640 [ 131.567197] ? bpf_prog_get+0x20/0x20 [ 131.567209] do_syscall_64+0x1d5/0x640 [ 131.567225] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 131.567233] RIP: 0033:0x45cba9 [ 131.567238] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.567249] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 131.567255] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 131.567262] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.567268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 131.567275] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 131.586384] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 131.586394] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 131.586403] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 131.596440] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 131.596450] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 131.596456] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 131.596848] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 131.597118] EXT4-fs (loop5): get root inode failed [ 131.597126] EXT4-fs (loop5): mount failed [ 131.600190] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 131.600453] EXT4-fs (loop4): get root inode failed [ 131.600459] EXT4-fs (loop4): mount failed [ 131.647284] FAULT_INJECTION: forcing a failure. [ 131.647284] name failslab, interval 1, probability 0, space 0, times 0 [ 131.647298] CPU: 1 PID: 9002 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 131.647304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.647308] Call Trace: [ 131.647324] dump_stack+0x1b2/0x283 [ 131.647351] should_fail.cold+0x10a/0x154 [ 131.647371] should_failslab+0xd6/0x130 [ 131.647384] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 131.647400] bpf_check+0x53/0x1830 [ 131.647417] ? __might_fault+0x177/0x1b0 [ 131.647432] bpf_prog_load+0x5e9/0xe00 [ 131.647444] ? __bpf_prog_charge+0xc0/0xc0 [ 131.647453] ? __might_fault+0x104/0x1b0 [ 131.647466] ? lock_acquire+0x170/0x3f0 [ 131.647475] ? lock_downgrade+0x6e0/0x6e0 [ 131.647489] ? __might_fault+0x177/0x1b0 [ 131.647501] SyS_bpf+0x12b2/0x34e0 [ 131.647513] ? bpf_prog_get+0x20/0x20 [ 131.647522] ? __mutex_unlock_slowpath+0x75/0x780 [ 131.647534] ? wait_for_completion_io+0x10/0x10 [ 131.647543] ? vfs_write+0x319/0x4d0 [ 131.647554] ? fput+0xb/0x140 [ 131.647590] ? do_syscall_64+0x4c/0x640 [ 131.647600] ? bpf_prog_get+0x20/0x20 [ 131.647613] do_syscall_64+0x1d5/0x640 [ 131.647630] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 131.647638] RIP: 0033:0x45cba9 [ 131.647644] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.647654] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 131.647660] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 131.647665] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.647671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 131.647676] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 132.215201] FAULT_INJECTION: forcing a failure. [ 132.215201] name failslab, interval 1, probability 0, space 0, times 0 [ 132.215214] CPU: 1 PID: 9017 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 132.215219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.215223] Call Trace: [ 132.215240] dump_stack+0x1b2/0x283 [ 132.215257] should_fail.cold+0x10a/0x154 [ 132.215273] should_failslab+0xd6/0x130 [ 132.215288] kmem_cache_alloc_node_trace+0x25a/0x400 [ 132.215305] __get_vm_area_node+0xed/0x340 [ 132.215318] ? fs_reclaim_acquire+0x10/0x10 [ 132.215332] __vmalloc_node_range+0xa5/0x690 [ 132.215345] ? bpf_check+0xc1/0x1830 [ 132.215364] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 132.215373] ? bpf_check+0x53/0x1830 [ 132.215385] vzalloc+0x42/0x50 [ 132.215397] ? bpf_check+0xc1/0x1830 [ 132.215407] bpf_check+0xc1/0x1830 [ 132.215428] ? __might_fault+0x177/0x1b0 [ 132.215445] bpf_prog_load+0x5e9/0xe00 [ 132.215458] ? __bpf_prog_charge+0xc0/0xc0 [ 132.215469] ? __might_fault+0x104/0x1b0 [ 132.215485] ? lock_acquire+0x170/0x3f0 [ 132.215496] ? lock_downgrade+0x6e0/0x6e0 [ 132.215514] ? __might_fault+0x177/0x1b0 [ 132.215527] SyS_bpf+0x12b2/0x34e0 [ 132.215550] ? bpf_prog_get+0x20/0x20 [ 132.215563] ? __mutex_unlock_slowpath+0x75/0x780 [ 132.215577] ? wait_for_completion_io+0x10/0x10 [ 132.215589] ? vfs_write+0x319/0x4d0 [ 132.215603] ? fput+0xb/0x140 [ 132.215628] ? do_syscall_64+0x4c/0x640 [ 132.215638] ? bpf_prog_get+0x20/0x20 [ 132.215652] do_syscall_64+0x1d5/0x640 [ 132.215670] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 132.215680] RIP: 0033:0x45cba9 [ 132.215687] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.215699] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 132.215705] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 132.215712] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 132.215719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 132.215726] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 132.225379] syz-executor.2: vmalloc: allocation failure: 72 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 132.225407] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 132.225435] CPU: 1 PID: 9017 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 132.225441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.225446] Call Trace: [ 132.225465] dump_stack+0x1b2/0x283 [ 132.225482] warn_alloc.cold+0x96/0x1af [ 132.225495] ? zone_watermark_ok_safe+0x250/0x250 [ 132.225510] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 132.225520] ? __get_vm_area_node+0xed/0x340 [ 132.225532] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 132.225555] ? __get_vm_area_node+0x27d/0x340 [ 132.225568] ? fs_reclaim_acquire+0x10/0x10 [ 132.225583] __vmalloc_node_range+0x3b2/0x690 [ 132.225601] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 132.225612] ? bpf_check+0x53/0x1830 [ 132.225626] vzalloc+0x42/0x50 [ 132.225639] ? bpf_check+0xc1/0x1830 [ 132.225649] bpf_check+0xc1/0x1830 [ 132.225665] ? __might_fault+0x177/0x1b0 [ 132.225681] bpf_prog_load+0x5e9/0xe00 [ 132.225692] ? __bpf_prog_charge+0xc0/0xc0 [ 132.225703] ? __might_fault+0x104/0x1b0 [ 132.225716] ? lock_acquire+0x170/0x3f0 [ 132.225725] ? lock_downgrade+0x6e0/0x6e0 [ 132.225740] ? __might_fault+0x177/0x1b0 [ 132.225754] SyS_bpf+0x12b2/0x34e0 [ 132.225768] ? bpf_prog_get+0x20/0x20 [ 132.225778] ? __mutex_unlock_slowpath+0x75/0x780 [ 132.225791] ? wait_for_completion_io+0x10/0x10 [ 132.225802] ? vfs_write+0x319/0x4d0 [ 132.225813] ? fput+0xb/0x140 [ 132.225833] ? do_syscall_64+0x4c/0x640 [ 132.225842] ? bpf_prog_get+0x20/0x20 [ 132.225854] do_syscall_64+0x1d5/0x640 [ 132.225872] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 132.225880] RIP: 0033:0x45cba9 [ 132.225887] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.225900] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 132.225907] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 132.225913] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 132.225931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 132.225938] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 132.427836] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 132.427845] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 132.427852] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 132.433972] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 132.493009] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 132.575164] EXT4-fs (loop4): get root inode failed [ 132.577908] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 132.602951] EXT4-fs (loop4): mount failed [ 132.606552] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:13:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) 04:13:36 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:36 executing program 2 (fault-call:1 fault-nth:7): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:36 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:36 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 134.100313] EXT4-fs: failed to create workqueue [ 134.100323] EXT4-fs (loop5): mount failed [ 134.133080] FAULT_INJECTION: forcing a failure. [ 134.133080] name failslab, interval 1, probability 0, space 0, times 0 [ 134.144833] CPU: 0 PID: 9058 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.152648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.162003] Call Trace: [ 134.164597] dump_stack+0x1b2/0x283 [ 134.168236] should_fail.cold+0x10a/0x154 [ 134.172391] should_failslab+0xd6/0x130 [ 134.176400] kmem_cache_alloc_node_trace+0x25a/0x400 [ 134.181511] alloc_vmap_area+0xf0/0x7c0 [ 134.185540] ? purge_vmap_area_lazy+0x40/0x40 [ 134.190054] ? rcu_read_lock_sched_held+0x10a/0x130 [ 134.195076] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 134.200387] __get_vm_area_node+0x126/0x340 [ 134.204717] ? fs_reclaim_acquire+0x10/0x10 [ 134.209043] __vmalloc_node_range+0xa5/0x690 [ 134.213458] ? bpf_check+0xc1/0x1830 [ 134.217187] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.222647] ? bpf_check+0x53/0x1830 [ 134.226379] vzalloc+0x42/0x50 [ 134.229575] ? bpf_check+0xc1/0x1830 [ 134.233288] bpf_check+0xc1/0x1830 [ 134.236834] ? __might_fault+0x177/0x1b0 [ 134.240897] bpf_prog_load+0x5e9/0xe00 [ 134.244805] ? __bpf_prog_charge+0xc0/0xc0 [ 134.249037] ? __might_fault+0x104/0x1b0 [ 134.253097] ? lock_acquire+0x170/0x3f0 [ 134.257092] ? lock_downgrade+0x6e0/0x6e0 [ 134.261242] ? __might_fault+0x177/0x1b0 [ 134.265304] SyS_bpf+0x12b2/0x34e0 [ 134.268848] ? bpf_prog_get+0x20/0x20 [ 134.272644] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.277486] ? wait_for_completion_io+0x10/0x10 [ 134.282155] ? vfs_write+0x319/0x4d0 [ 134.285880] ? fput+0xb/0x140 [ 134.289014] ? do_syscall_64+0x4c/0x640 [ 134.293000] ? bpf_prog_get+0x20/0x20 [ 134.296821] do_syscall_64+0x1d5/0x640 [ 134.300736] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.305937] RIP: 0033:0x45cba9 [ 134.309116] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.316825] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.324109] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.331384] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.338659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.345931] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 04:13:36 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:36 executing program 2 (fault-call:1 fault-nth:8): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 134.372847] syz-executor.2: vmalloc: allocation failure: 72 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) 04:13:36 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:36 executing program 2 (fault-call:1 fault-nth:9): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:36 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 04:13:36 executing program 2 (fault-call:1 fault-nth:10): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:36 executing program 2 (fault-call:1 fault-nth:11): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 134.386766] audit: type=1800 audit(1594700016.315:33): pid=9063 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15864 res=0 [ 134.402551] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 134.402576] CPU: 0 PID: 9058 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.402583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.402587] Call Trace: [ 134.402603] dump_stack+0x1b2/0x283 [ 134.402618] warn_alloc.cold+0x96/0x1af [ 134.402629] ? zone_watermark_ok_safe+0x250/0x250 [ 134.402639] ? debug_object_activate+0x450/0x450 [ 134.402649] ? kfree+0x1cf/0x260 [ 134.402666] ? __get_vm_area_node+0x27d/0x340 [ 134.402674] ? fs_reclaim_acquire+0x10/0x10 [ 134.402687] __vmalloc_node_range+0x3b2/0x690 [ 134.402702] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.402712] ? bpf_check+0x53/0x1830 [ 134.402723] vzalloc+0x42/0x50 [ 134.402732] ? bpf_check+0xc1/0x1830 [ 134.402740] bpf_check+0xc1/0x1830 [ 134.402756] ? __might_fault+0x177/0x1b0 [ 134.402767] bpf_prog_load+0x5e9/0xe00 [ 134.402777] ? __bpf_prog_charge+0xc0/0xc0 [ 134.402785] ? __might_fault+0x104/0x1b0 [ 134.402797] ? lock_acquire+0x170/0x3f0 [ 134.402807] ? lock_downgrade+0x6e0/0x6e0 [ 134.402822] ? __might_fault+0x177/0x1b0 [ 134.402836] SyS_bpf+0x12b2/0x34e0 [ 134.402848] ? bpf_prog_get+0x20/0x20 [ 134.402857] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.402866] ? wait_for_completion_io+0x10/0x10 [ 134.402876] ? vfs_write+0x319/0x4d0 [ 134.402886] ? fput+0xb/0x140 [ 134.402902] ? do_syscall_64+0x4c/0x640 [ 134.402910] ? bpf_prog_get+0x20/0x20 [ 134.402921] do_syscall_64+0x1d5/0x640 [ 134.402937] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.402945] RIP: 0033:0x45cba9 [ 134.402950] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.402961] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.402967] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.402973] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.402979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.402985] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.403004] warn_alloc_show_mem: 1 callbacks suppressed [ 134.403008] Mem-Info: [ 134.403031] active_anon:110549 inactive_anon:4052 isolated_anon:0 [ 134.403031] active_file:6927 inactive_file:10441 isolated_file:0 04:13:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:37 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x10) 04:13:37 executing program 2 (fault-call:1 fault-nth:12): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:37 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) [ 134.403031] unevictable:0 dirty:338 writeback:0 unstable:0 [ 134.403031] slab_reclaimable:16581 slab_unreclaimable:121383 [ 134.403031] mapped:60260 shmem:4209 pagetables:994 bounce:0 [ 134.403031] free:1261815 free_pcp:348 free_cma:0 [ 134.403051] Node 0 active_anon:442196kB inactive_anon:16208kB active_file:27576kB inactive_file:41764kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241040kB dirty:1348kB writeback:0kB shmem:16836kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 389120kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 134.403068] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 134.403072] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 134.403092] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 134.403112] Node 0 DMA32 free:1247192kB min:36296kB low:45368kB high:54440kB active_anon:442196kB inactive_anon:16208kB active_file:27576kB inactive_file:41764kB unevictable:0kB writepending:1348kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7552kB pagetables:3976kB bounce:0kB free_pcp:1392kB local_pcp:660kB free_cma:0kB [ 134.403134] lowmem_reserve[]: 0 0 0 0 0 [ 134.403153] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 134.403173] lowmem_reserve[]: 0 0 0 0 0 [ 134.403193] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 134.403214] lowmem_reserve[]: 0 0 0 0 0 [ 134.403234] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 134.403307] Node 0 DMA32: 5711*4kB (UME) 101*8kB (UM) 114*16kB (UME) 21*32kB (UME) 9*64kB (ME) 7*128kB (UM) 4*256kB (UM) 2*512kB (M) 1*1024kB (E) 8*2048kB (UM) 293*4096kB (UM) = 1247204kB [ 134.403398] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 134.403448] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 134.403535] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 134.403543] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 134.403549] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 134.403564] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 134.403958] 20919 total pagecache pages [ 134.403969] 0 pages in swap cache [ 134.403975] Swap cache stats: add 0, delete 0, find 0/0 [ 134.403978] Free swap = 0kB [ 134.403982] Total swap = 0kB [ 134.403988] 1965979 pages RAM [ 134.403991] 0 pages HighMem/MovableOnly [ 134.403995] 338456 pages reserved [ 134.403998] 0 pages cma reserved [ 134.453151] FAULT_INJECTION: forcing a failure. [ 134.453151] name failslab, interval 1, probability 0, space 0, times 0 [ 134.453166] CPU: 0 PID: 9078 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.453173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.453177] Call Trace: [ 134.453195] dump_stack+0x1b2/0x283 [ 134.453209] should_fail.cold+0x10a/0x154 [ 134.453224] should_failslab+0xd6/0x130 [ 134.453237] kmem_cache_alloc_node_trace+0x25a/0x400 [ 134.453251] __kmalloc_node+0x38/0x70 [ 134.453267] __vmalloc_node_range+0x182/0x690 [ 134.453286] vzalloc+0x42/0x50 [ 134.453296] ? bpf_check+0xc1/0x1830 [ 134.453305] bpf_check+0xc1/0x1830 [ 134.453320] ? __might_fault+0x177/0x1b0 [ 134.453333] bpf_prog_load+0x5e9/0xe00 [ 134.453343] ? __bpf_prog_charge+0xc0/0xc0 [ 134.453352] ? __might_fault+0x104/0x1b0 [ 134.453365] ? lock_acquire+0x170/0x3f0 [ 134.453382] ? lock_downgrade+0x6e0/0x6e0 [ 134.453399] ? __might_fault+0x177/0x1b0 [ 134.453412] SyS_bpf+0x12b2/0x34e0 [ 134.453425] ? bpf_prog_get+0x20/0x20 [ 134.453436] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.453447] ? wait_for_completion_io+0x10/0x10 [ 134.453457] ? vfs_write+0x319/0x4d0 [ 134.453466] ? fput+0xb/0x140 [ 134.453481] ? do_syscall_64+0x4c/0x640 [ 134.453489] ? bpf_prog_get+0x20/0x20 [ 134.453501] do_syscall_64+0x1d5/0x640 [ 134.453519] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.453529] RIP: 0033:0x45cba9 [ 134.453535] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.453549] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.453556] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.453563] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.453571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.453578] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.487032] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 134.487041] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 134.487048] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 134.498469] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 134.499264] FAULT_INJECTION: forcing a failure. [ 134.499264] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.499277] CPU: 0 PID: 9089 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.499283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.499287] Call Trace: [ 134.499304] dump_stack+0x1b2/0x283 [ 134.499321] should_fail.cold+0x10a/0x154 [ 134.499339] __alloc_pages_nodemask+0x22b/0x2730 [ 134.499353] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 134.499366] ? vzalloc+0x42/0x50 [ 134.499387] ? bpf_check+0xc1/0x1830 [ 134.499399] ? bpf_prog_load+0x5e9/0xe00 [ 134.499408] ? SyS_bpf+0x12b2/0x34e0 [ 134.499420] ? do_syscall_64+0x1d5/0x640 [ 134.499436] ? lock_acquire+0x170/0x3f0 [ 134.499450] ? lock_downgrade+0x6e0/0x6e0 [ 134.499468] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 134.499480] ? _raw_spin_unlock+0x29/0x40 [ 134.499491] ? fs_reclaim_acquire+0x10/0x10 [ 134.499513] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.499519] EXT4-fs (loop4): get root inode failed [ 134.499529] ? kasan_unpoison_shadow+0x30/0x40 [ 134.499533] EXT4-fs (loop4): mount failed [ 134.499544] alloc_pages_current+0xe7/0x1e0 [ 134.499557] __vmalloc_node_range+0x3f9/0x690 [ 134.499578] vzalloc+0x42/0x50 [ 134.499590] ? bpf_check+0xc1/0x1830 [ 134.499599] bpf_check+0xc1/0x1830 [ 134.499624] ? __might_fault+0x177/0x1b0 [ 134.499638] bpf_prog_load+0x5e9/0xe00 [ 134.499649] ? __bpf_prog_charge+0xc0/0xc0 [ 134.499660] ? __might_fault+0x104/0x1b0 [ 134.499673] ? lock_acquire+0x170/0x3f0 [ 134.499683] ? lock_downgrade+0x6e0/0x6e0 [ 134.499697] ? __might_fault+0x177/0x1b0 [ 134.499710] SyS_bpf+0x12b2/0x34e0 [ 134.499725] ? bpf_prog_get+0x20/0x20 [ 134.499734] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.499746] ? wait_for_completion_io+0x10/0x10 [ 134.499757] ? vfs_write+0x319/0x4d0 [ 134.499770] ? fput+0xb/0x140 [ 134.499787] ? do_syscall_64+0x4c/0x640 [ 134.499798] ? bpf_prog_get+0x20/0x20 [ 134.499810] do_syscall_64+0x1d5/0x640 [ 134.499827] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.499834] RIP: 0033:0x45cba9 [ 134.499841] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.499852] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.499858] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.499864] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.499871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.499876] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.503006] syz-executor.2: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 134.503033] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 134.503056] CPU: 0 PID: 9089 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.503062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.503066] Call Trace: [ 134.503083] dump_stack+0x1b2/0x283 [ 134.503099] warn_alloc.cold+0x96/0x1af [ 134.503110] ? zone_watermark_ok_safe+0x250/0x250 [ 134.503126] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.503136] ? kasan_unpoison_shadow+0x30/0x40 [ 134.503157] __vmalloc_node_range+0x47c/0x690 [ 134.503177] vzalloc+0x42/0x50 [ 134.503187] ? bpf_check+0xc1/0x1830 [ 134.503197] bpf_check+0xc1/0x1830 [ 134.503211] ? __might_fault+0x177/0x1b0 [ 134.503226] bpf_prog_load+0x5e9/0xe00 [ 134.503238] ? __bpf_prog_charge+0xc0/0xc0 [ 134.503248] ? __might_fault+0x104/0x1b0 [ 134.503260] ? lock_acquire+0x170/0x3f0 [ 134.503269] ? lock_downgrade+0x6e0/0x6e0 [ 134.503285] ? __might_fault+0x177/0x1b0 [ 134.503299] SyS_bpf+0x12b2/0x34e0 [ 134.503313] ? bpf_prog_get+0x20/0x20 [ 134.503322] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.503335] ? wait_for_completion_io+0x10/0x10 [ 134.503347] ? vfs_write+0x319/0x4d0 [ 134.503358] ? fput+0xb/0x140 [ 134.503382] ? do_syscall_64+0x4c/0x640 [ 134.503392] ? bpf_prog_get+0x20/0x20 [ 134.503405] do_syscall_64+0x1d5/0x640 [ 134.503421] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.503428] RIP: 0033:0x45cba9 [ 134.503434] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.503444] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.503450] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.503456] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.503461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.503467] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.578457] FAULT_INJECTION: forcing a failure. [ 134.578457] name failslab, interval 1, probability 0, space 0, times 0 [ 134.578498] CPU: 1 PID: 9098 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.578504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.578507] Call Trace: [ 134.578525] dump_stack+0x1b2/0x283 [ 134.578546] should_fail.cold+0x10a/0x154 [ 134.578565] should_failslab+0xd6/0x130 [ 134.578580] kmem_cache_alloc_node_trace+0x25a/0x400 [ 134.578598] __get_vm_area_node+0xed/0x340 [ 134.578615] __vmalloc_node_range+0xa5/0x690 [ 134.578630] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.578645] ? bpf_check+0x155/0x1830 [ 134.578661] vmalloc+0x42/0x50 [ 134.578674] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.578687] bpf_prog_calc_tag+0xa6/0x660 [ 134.578704] ? __bpf_prog_free+0x40/0x40 [ 134.578719] ? __vmalloc_node_range+0x3b7/0x690 [ 134.578741] bpf_check+0x390/0x1830 [ 134.578766] bpf_prog_load+0x5e9/0xe00 [ 134.578779] ? __bpf_prog_charge+0xc0/0xc0 [ 134.578792] ? __might_fault+0x104/0x1b0 [ 134.578807] ? lock_acquire+0x170/0x3f0 [ 134.578818] ? lock_downgrade+0x6e0/0x6e0 [ 134.578833] ? __might_fault+0x177/0x1b0 [ 134.578848] SyS_bpf+0x12b2/0x34e0 [ 134.578862] ? bpf_prog_get+0x20/0x20 [ 134.578883] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.578897] ? wait_for_completion_io+0x10/0x10 [ 134.578910] ? vfs_write+0x319/0x4d0 [ 134.578922] ? fput+0xb/0x140 [ 134.578942] ? do_syscall_64+0x4c/0x640 [ 134.578951] ? bpf_prog_get+0x20/0x20 [ 134.578965] do_syscall_64+0x1d5/0x640 [ 134.578983] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.578991] RIP: 0033:0x45cba9 [ 134.578998] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.579010] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.579017] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.579024] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.579031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.579039] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.579061] syz-executor.2: vmalloc: allocation failure: 64 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 134.579085] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 134.579159] CPU: 1 PID: 9098 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.579166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.579169] Call Trace: [ 134.579183] dump_stack+0x1b2/0x283 [ 134.579200] warn_alloc.cold+0x96/0x1af [ 134.579212] ? zone_watermark_ok_safe+0x250/0x250 [ 134.579226] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.579236] ? __get_vm_area_node+0xed/0x340 [ 134.579247] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 134.579262] ? __get_vm_area_node+0x27d/0x340 [ 134.579277] __vmalloc_node_range+0x3b2/0x690 [ 134.579292] ? bpf_check+0x155/0x1830 [ 134.579303] vmalloc+0x42/0x50 [ 134.579315] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.579325] bpf_prog_calc_tag+0xa6/0x660 [ 134.579338] ? __bpf_prog_free+0x40/0x40 [ 134.579349] ? __vmalloc_node_range+0x3b7/0x690 [ 134.579368] bpf_check+0x390/0x1830 [ 134.579389] bpf_prog_load+0x5e9/0xe00 [ 134.579401] ? __bpf_prog_charge+0xc0/0xc0 [ 134.579412] ? __might_fault+0x104/0x1b0 [ 134.579425] ? lock_acquire+0x170/0x3f0 [ 134.579435] ? lock_downgrade+0x6e0/0x6e0 [ 134.579452] ? __might_fault+0x177/0x1b0 [ 134.579466] SyS_bpf+0x12b2/0x34e0 [ 134.579480] ? bpf_prog_get+0x20/0x20 [ 134.579488] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.579501] ? wait_for_completion_io+0x10/0x10 [ 134.579512] ? vfs_write+0x319/0x4d0 [ 134.579524] ? fput+0xb/0x140 [ 134.579543] ? do_syscall_64+0x4c/0x640 [ 134.579553] ? bpf_prog_get+0x20/0x20 [ 134.579569] do_syscall_64+0x1d5/0x640 [ 134.579587] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.579595] RIP: 0033:0x45cba9 [ 134.579600] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.579612] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.579619] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.579626] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.579632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.579639] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.651021] FAULT_INJECTION: forcing a failure. [ 134.651021] name failslab, interval 1, probability 0, space 0, times 0 [ 134.651034] CPU: 0 PID: 9104 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.651040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.651043] Call Trace: [ 134.651070] dump_stack+0x1b2/0x283 [ 134.651088] should_fail.cold+0x10a/0x154 [ 134.651105] should_failslab+0xd6/0x130 [ 134.651118] kmem_cache_alloc_node_trace+0x25a/0x400 [ 134.651134] alloc_vmap_area+0xf0/0x7c0 [ 134.651154] ? purge_vmap_area_lazy+0x40/0x40 [ 134.651164] ? rcu_read_lock_sched_held+0x10a/0x130 [ 134.651174] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 134.651187] __get_vm_area_node+0x126/0x340 [ 134.651202] __vmalloc_node_range+0xa5/0x690 [ 134.651213] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.651226] ? bpf_check+0x155/0x1830 [ 134.651238] vmalloc+0x42/0x50 [ 134.651249] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.651259] bpf_prog_calc_tag+0xa6/0x660 [ 134.651273] ? __bpf_prog_free+0x40/0x40 [ 134.651285] ? __vmalloc_node_range+0x3b7/0x690 [ 134.651306] bpf_check+0x390/0x1830 [ 134.651327] bpf_prog_load+0x5e9/0xe00 [ 134.651337] ? __bpf_prog_charge+0xc0/0xc0 [ 134.651348] ? __might_fault+0x104/0x1b0 [ 134.651369] ? lock_acquire+0x170/0x3f0 [ 134.651380] ? lock_downgrade+0x6e0/0x6e0 [ 134.651398] ? __might_fault+0x177/0x1b0 [ 134.651412] SyS_bpf+0x12b2/0x34e0 [ 134.651425] ? bpf_prog_get+0x20/0x20 [ 134.651434] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.651447] ? wait_for_completion_io+0x10/0x10 [ 134.651457] ? vfs_write+0x319/0x4d0 [ 134.651467] ? fput+0xb/0x140 [ 134.651483] ? do_syscall_64+0x4c/0x640 [ 134.651491] ? bpf_prog_get+0x20/0x20 [ 134.651503] do_syscall_64+0x1d5/0x640 [ 134.651519] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.651527] RIP: 0033:0x45cba9 [ 134.651534] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.651545] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.651552] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.651559] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.651567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.651574] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.655311] syz-executor.2: vmalloc: allocation failure: 64 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 134.655336] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 134.655361] CPU: 0 PID: 9104 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 134.655368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.655371] Call Trace: [ 134.655388] dump_stack+0x1b2/0x283 [ 134.655406] warn_alloc.cold+0x96/0x1af [ 134.655419] ? zone_watermark_ok_safe+0x250/0x250 [ 134.655431] ? mark_held_locks+0xa6/0xf0 [ 134.655443] ? kfree+0x1cf/0x260 [ 134.655463] ? __get_vm_area_node+0x27d/0x340 [ 134.655479] __vmalloc_node_range+0x3b2/0x690 [ 134.655494] ? bpf_check+0x155/0x1830 [ 134.655509] vmalloc+0x42/0x50 [ 134.655521] ? bpf_prog_calc_tag+0xa6/0x660 [ 134.655532] bpf_prog_calc_tag+0xa6/0x660 [ 134.655548] ? __bpf_prog_free+0x40/0x40 [ 134.655561] ? __vmalloc_node_range+0x3b7/0x690 [ 134.655583] bpf_check+0x390/0x1830 [ 134.655607] bpf_prog_load+0x5e9/0xe00 [ 134.655619] ? __bpf_prog_charge+0xc0/0xc0 [ 134.655632] ? __might_fault+0x104/0x1b0 [ 134.655646] ? lock_acquire+0x170/0x3f0 [ 134.655656] ? lock_downgrade+0x6e0/0x6e0 [ 134.655672] ? __might_fault+0x177/0x1b0 [ 134.655687] SyS_bpf+0x12b2/0x34e0 [ 134.655702] ? bpf_prog_get+0x20/0x20 [ 134.655712] ? __mutex_unlock_slowpath+0x75/0x780 [ 134.655726] ? wait_for_completion_io+0x10/0x10 [ 134.655738] ? vfs_write+0x319/0x4d0 [ 134.655748] ? fput+0xb/0x140 [ 134.655766] ? do_syscall_64+0x4c/0x640 [ 134.655774] ? bpf_prog_get+0x20/0x20 [ 134.655787] do_syscall_64+0x1d5/0x640 [ 134.655805] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 134.655813] RIP: 0033:0x45cba9 [ 134.655818] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.655829] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 134.655837] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 134.655843] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.655850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 134.655857] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 134.692128] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 134.692138] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 134.692145] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 134.710042] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 134.710695] EXT4-fs (loop5): get root inode failed [ 134.710701] EXT4-fs (loop5): mount failed [ 135.252752] FAULT_INJECTION: forcing a failure. [ 135.252752] name failslab, interval 1, probability 0, space 0, times 0 [ 135.252766] CPU: 1 PID: 9121 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 135.252772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.252776] Call Trace: [ 135.252794] dump_stack+0x1b2/0x283 [ 135.252811] should_fail.cold+0x10a/0x154 [ 135.252827] should_failslab+0xd6/0x130 [ 135.252848] kmem_cache_alloc_node_trace+0x25a/0x400 [ 135.252863] __kmalloc_node+0x38/0x70 [ 135.252876] __vmalloc_node_range+0x182/0x690 [ 135.252890] ? bpf_check+0x155/0x1830 [ 135.252902] vmalloc+0x42/0x50 [ 135.252914] ? bpf_prog_calc_tag+0xa6/0x660 [ 135.252924] bpf_prog_calc_tag+0xa6/0x660 [ 135.252937] ? __bpf_prog_free+0x40/0x40 [ 135.252949] ? __vmalloc_node_range+0x3b7/0x690 [ 135.252970] bpf_check+0x390/0x1830 [ 135.252991] bpf_prog_load+0x5e9/0xe00 [ 135.253002] ? __bpf_prog_charge+0xc0/0xc0 [ 135.253012] ? __might_fault+0x104/0x1b0 [ 135.253026] ? lock_acquire+0x170/0x3f0 [ 135.253036] ? lock_downgrade+0x6e0/0x6e0 [ 135.253050] ? __might_fault+0x177/0x1b0 [ 135.253068] SyS_bpf+0x12b2/0x34e0 [ 135.253082] ? bpf_prog_get+0x20/0x20 [ 135.253093] ? __mutex_unlock_slowpath+0x75/0x780 [ 135.253105] ? wait_for_completion_io+0x10/0x10 [ 135.253119] ? vfs_write+0x319/0x4d0 [ 135.253132] ? fput+0xb/0x140 [ 135.253151] ? do_syscall_64+0x4c/0x640 [ 135.253168] ? bpf_prog_get+0x20/0x20 [ 135.253184] do_syscall_64+0x1d5/0x640 [ 135.253204] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 135.253213] RIP: 0033:0x45cba9 [ 135.253220] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 135.253231] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 135.253237] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 135.253243] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 135.253249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 135.253255] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 135.342428] audit: type=1800 audit(1594700017.275:34): pid=9122 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15886 res=0 04:13:39 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:39 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:39 executing program 2 (fault-call:1 fault-nth:13): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:39 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x10) 04:13:39 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:39 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 137.462621] FAULT_INJECTION: forcing a failure. [ 137.462621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:13:39 executing program 2 (fault-call:1 fault-nth:14): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:39 executing program 2 (fault-call:1 fault-nth:15): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:39 executing program 2 (fault-call:1 fault-nth:16): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:39 executing program 2 (fault-call:1 fault-nth:17): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:39 executing program 2 (fault-call:1 fault-nth:18): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 137.497177] CPU: 1 PID: 9150 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.497185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.497189] Call Trace: [ 137.497212] dump_stack+0x1b2/0x283 [ 137.497230] should_fail.cold+0x10a/0x154 [ 137.497248] __alloc_pages_nodemask+0x22b/0x2730 [ 137.497258] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 137.497268] ? vmalloc+0x42/0x50 [ 137.497278] ? bpf_prog_calc_tag+0xa6/0x660 [ 137.497286] ? bpf_check+0x390/0x1830 [ 137.497293] ? bpf_prog_load+0x5e9/0xe00 [ 137.497300] ? SyS_bpf+0x12b2/0x34e0 [ 137.497314] ? lock_acquire+0x170/0x3f0 [ 137.497323] ? lock_downgrade+0x6e0/0x6e0 [ 137.497337] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 137.497347] ? _raw_spin_unlock+0x29/0x40 [ 137.497359] ? fs_reclaim_acquire+0x10/0x10 [ 137.497383] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 137.497395] ? kasan_unpoison_shadow+0x30/0x40 [ 137.497413] alloc_pages_current+0xe7/0x1e0 [ 137.497426] __vmalloc_node_range+0x3f9/0x690 [ 137.497444] vmalloc+0x42/0x50 [ 137.497455] ? bpf_prog_calc_tag+0xa6/0x660 04:13:40 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:40 executing program 2 (fault-call:1 fault-nth:19): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:40 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:40 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 137.497466] bpf_prog_calc_tag+0xa6/0x660 [ 137.497480] ? __bpf_prog_free+0x40/0x40 [ 137.497491] ? __vmalloc_node_range+0x3b7/0x690 [ 137.497511] bpf_check+0x390/0x1830 [ 137.497530] bpf_prog_load+0x5e9/0xe00 04:13:40 executing program 1: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) [ 137.497542] ? __bpf_prog_charge+0xc0/0xc0 [ 137.497553] ? __might_fault+0x104/0x1b0 [ 137.497567] ? lock_acquire+0x170/0x3f0 [ 137.497577] ? lock_downgrade+0x6e0/0x6e0 [ 137.497592] ? __might_fault+0x177/0x1b0 [ 137.497605] SyS_bpf+0x12b2/0x34e0 [ 137.497617] ? bpf_prog_get+0x20/0x20 [ 137.497626] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.497637] ? wait_for_completion_io+0x10/0x10 [ 137.497647] ? vfs_write+0x319/0x4d0 [ 137.497658] ? fput+0xb/0x140 [ 137.497674] ? do_syscall_64+0x4c/0x640 [ 137.497681] ? bpf_prog_get+0x20/0x20 [ 137.497692] do_syscall_64+0x1d5/0x640 [ 137.497708] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.497717] RIP: 0033:0x45cba9 [ 137.497723] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.497736] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.497743] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.497750] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.497757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.497766] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.497787] syz-executor.2: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 137.497819] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 137.497846] CPU: 1 PID: 9150 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.497866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.497871] Call Trace: [ 137.497888] dump_stack+0x1b2/0x283 [ 137.497904] warn_alloc.cold+0x96/0x1af [ 137.497918] ? zone_watermark_ok_safe+0x250/0x250 [ 137.497934] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 137.497947] ? kasan_unpoison_shadow+0x30/0x40 [ 137.497967] __vmalloc_node_range+0x47c/0x690 [ 137.497986] vmalloc+0x42/0x50 [ 137.497997] ? bpf_prog_calc_tag+0xa6/0x660 [ 137.498006] bpf_prog_calc_tag+0xa6/0x660 [ 137.498020] ? __bpf_prog_free+0x40/0x40 [ 137.498031] ? __vmalloc_node_range+0x3b7/0x690 [ 137.498051] bpf_check+0x390/0x1830 [ 137.498073] bpf_prog_load+0x5e9/0xe00 [ 137.498087] ? __bpf_prog_charge+0xc0/0xc0 [ 137.498098] ? __might_fault+0x104/0x1b0 [ 137.498112] ? lock_acquire+0x170/0x3f0 [ 137.498123] ? lock_downgrade+0x6e0/0x6e0 [ 137.498135] ? __might_fault+0x177/0x1b0 [ 137.498147] SyS_bpf+0x12b2/0x34e0 [ 137.498161] ? bpf_prog_get+0x20/0x20 [ 137.498170] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.498184] ? wait_for_completion_io+0x10/0x10 [ 137.498195] ? vfs_write+0x319/0x4d0 [ 137.498206] ? fput+0xb/0x140 [ 137.498222] ? do_syscall_64+0x4c/0x640 [ 137.498230] ? bpf_prog_get+0x20/0x20 [ 137.498243] do_syscall_64+0x1d5/0x640 [ 137.498264] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.498273] RIP: 0033:0x45cba9 [ 137.498279] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.498292] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.498299] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.498305] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.498311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.498318] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.498344] warn_alloc_show_mem: 3 callbacks suppressed [ 137.498348] Mem-Info: [ 137.498378] active_anon:110576 inactive_anon:4044 isolated_anon:0 [ 137.498378] active_file:6930 inactive_file:10470 isolated_file:0 [ 137.498378] unevictable:0 dirty:82 writeback:0 unstable:0 [ 137.498378] slab_reclaimable:16581 slab_unreclaimable:121793 [ 137.498378] mapped:60314 shmem:4200 pagetables:994 bounce:0 [ 137.498378] free:1261588 free_pcp:74 free_cma:0 [ 137.498400] Node 0 active_anon:442304kB inactive_anon:16176kB active_file:27588kB inactive_file:41880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241256kB dirty:328kB writeback:0kB shmem:16800kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 389120kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 137.498422] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 137.498426] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 137.498452] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 137.498474] Node 0 DMA32 free:1246284kB min:36296kB low:45368kB high:54440kB active_anon:442304kB inactive_anon:16176kB active_file:27588kB inactive_file:41880kB unevictable:0kB writepending:376kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7552kB pagetables:3976kB bounce:0kB free_pcp:296kB local_pcp:144kB free_cma:0kB [ 137.498506] lowmem_reserve[]: 0 0 0 0 0 [ 137.498529] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 137.498553] lowmem_reserve[]: 0 0 0 0 0 [ 137.498575] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 137.498598] lowmem_reserve[]: 0 0 0 0 0 [ 137.498621] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 137.498701] Node 0 DMA32: 5777*4kB (UME) 86*8kB (UM) 53*16kB (UME) 42*32kB (UME) 18*64kB (UME) 10*128kB (UM) 5*256kB (UM) 2*512kB (M) 1*1024kB (E) 5*2048kB (U) 294*4096kB (UM) = 1246212kB [ 137.498785] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 137.498842] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 137.498950] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 137.498958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 137.498966] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 137.498974] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 137.498979] 20952 total pagecache pages [ 137.498992] 0 pages in swap cache [ 137.498998] Swap cache stats: add 0, delete 0, find 0/0 [ 137.499003] Free swap = 0kB [ 137.499008] Total swap = 0kB [ 137.499035] 1965979 pages RAM [ 137.499040] 0 pages HighMem/MovableOnly [ 137.499044] 338456 pages reserved [ 137.499049] 0 pages cma reserved [ 137.543680] audit: type=1800 audit(1594700019.475:35): pid=9147 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15925 res=0 [ 137.560977] FAULT_INJECTION: forcing a failure. [ 137.560977] name failslab, interval 1, probability 0, space 0, times 0 [ 137.560990] CPU: 1 PID: 9168 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.560996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.561000] Call Trace: [ 137.561017] dump_stack+0x1b2/0x283 [ 137.561035] should_fail.cold+0x10a/0x154 [ 137.561052] should_failslab+0xd6/0x130 [ 137.561065] __kmalloc+0x2c1/0x400 [ 137.561076] ? bpf_check+0xa5b/0x1830 [ 137.561089] bpf_check+0xa5b/0x1830 [ 137.561112] bpf_prog_load+0x5e9/0xe00 [ 137.561122] ? __bpf_prog_charge+0xc0/0xc0 [ 137.561133] ? __might_fault+0x104/0x1b0 [ 137.561147] ? lock_acquire+0x170/0x3f0 [ 137.561157] ? lock_downgrade+0x6e0/0x6e0 [ 137.561172] ? __might_fault+0x177/0x1b0 [ 137.561185] SyS_bpf+0x12b2/0x34e0 [ 137.561198] ? bpf_prog_get+0x20/0x20 [ 137.561207] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.561219] ? wait_for_completion_io+0x10/0x10 [ 137.561229] ? vfs_write+0x319/0x4d0 [ 137.561240] ? fput+0xb/0x140 [ 137.561256] ? do_syscall_64+0x4c/0x640 [ 137.561264] ? bpf_prog_get+0x20/0x20 [ 137.561276] do_syscall_64+0x1d5/0x640 [ 137.561292] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.561300] RIP: 0033:0x45cba9 [ 137.561306] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.561317] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.561323] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.561330] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.561339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.561345] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.608653] FAULT_INJECTION: forcing a failure. [ 137.608653] name failslab, interval 1, probability 0, space 0, times 0 [ 137.608667] CPU: 1 PID: 9175 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.608673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.608677] Call Trace: [ 137.608694] dump_stack+0x1b2/0x283 [ 137.608709] should_fail.cold+0x10a/0x154 [ 137.608727] should_failslab+0xd6/0x130 [ 137.608738] __kmalloc+0x2c1/0x400 [ 137.608746] ? check_cfg+0xa6/0x6f0 [ 137.608756] check_cfg+0xa6/0x6f0 [ 137.608768] ? rcu_read_lock_sched_held+0x10a/0x130 [ 137.608781] bpf_check+0xa96/0x1830 [ 137.608795] bpf_prog_load+0x5e9/0xe00 [ 137.608803] ? __bpf_prog_charge+0xc0/0xc0 [ 137.608810] ? __might_fault+0x104/0x1b0 [ 137.608820] ? lock_acquire+0x170/0x3f0 [ 137.608827] ? lock_downgrade+0x6e0/0x6e0 [ 137.608841] ? __might_fault+0x177/0x1b0 [ 137.608864] SyS_bpf+0x12b2/0x34e0 [ 137.608878] ? bpf_prog_get+0x20/0x20 [ 137.608890] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.608903] ? wait_for_completion_io+0x10/0x10 [ 137.608915] ? vfs_write+0x319/0x4d0 [ 137.608926] ? fput+0xb/0x140 [ 137.608943] ? do_syscall_64+0x4c/0x640 [ 137.608954] ? bpf_prog_get+0x20/0x20 [ 137.608968] do_syscall_64+0x1d5/0x640 [ 137.608989] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.608998] RIP: 0033:0x45cba9 [ 137.609006] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.609018] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.609025] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.609031] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.609037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.609045] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.650089] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 137.650099] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 137.650107] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 137.674084] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 137.674399] EXT4-fs (loop4): get root inode failed [ 137.674405] EXT4-fs (loop4): mount failed [ 137.678162] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 137.678172] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 137.678180] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 137.678804] FAULT_INJECTION: forcing a failure. [ 137.678804] name failslab, interval 1, probability 0, space 0, times 0 [ 137.678816] CPU: 0 PID: 9183 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.678822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.678827] Call Trace: [ 137.678844] dump_stack+0x1b2/0x283 [ 137.678859] should_fail.cold+0x10a/0x154 [ 137.678879] should_failslab+0xd6/0x130 [ 137.678892] __kmalloc+0x2c1/0x400 [ 137.678902] ? check_cfg+0xc8/0x6f0 [ 137.678923] check_cfg+0xc8/0x6f0 [ 137.678938] ? rcu_read_lock_sched_held+0x10a/0x130 [ 137.678954] bpf_check+0xa96/0x1830 [ 137.678977] bpf_prog_load+0x5e9/0xe00 [ 137.678990] ? __bpf_prog_charge+0xc0/0xc0 [ 137.679002] ? __might_fault+0x104/0x1b0 [ 137.679018] ? lock_acquire+0x170/0x3f0 [ 137.679030] ? lock_downgrade+0x6e0/0x6e0 [ 137.679047] ? __might_fault+0x177/0x1b0 [ 137.679063] SyS_bpf+0x12b2/0x34e0 [ 137.679077] ? bpf_prog_get+0x20/0x20 [ 137.679088] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.679103] ? wait_for_completion_io+0x10/0x10 [ 137.679116] ? vfs_write+0x319/0x4d0 [ 137.679128] ? fput+0xb/0x140 [ 137.679145] ? do_syscall_64+0x4c/0x640 [ 137.679152] ? bpf_prog_get+0x20/0x20 [ 137.679161] do_syscall_64+0x1d5/0x640 [ 137.679180] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.679189] RIP: 0033:0x45cba9 [ 137.679196] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.679209] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.679216] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.679222] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.679229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.679236] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.694895] EXT4-fs error (device loop1): ext4_fill_super:4365: inode #2: comm syz-executor.1: iget: root inode unallocated [ 137.695243] EXT4-fs (loop1): get root inode failed [ 137.695249] EXT4-fs (loop1): mount failed [ 137.713412] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 137.713423] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 137.713432] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 137.738887] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 137.739429] EXT4-fs (loop5): get root inode failed [ 137.739435] EXT4-fs (loop5): mount failed [ 137.756896] FAULT_INJECTION: forcing a failure. [ 137.756896] name failslab, interval 1, probability 0, space 0, times 0 [ 137.756910] CPU: 0 PID: 9194 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.756916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.756920] Call Trace: [ 137.756937] dump_stack+0x1b2/0x283 [ 137.756955] should_fail.cold+0x10a/0x154 [ 137.756973] should_failslab+0xd6/0x130 [ 137.756987] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 137.757005] do_check+0x119/0x9420 [ 137.757027] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 137.757040] ? debug_check_no_obj_freed+0x27c/0x5fd [ 137.757057] ? reg_set_min_max.part.0+0xe10/0xe10 [ 137.757070] ? mark_held_locks+0xa6/0xf0 [ 137.757081] ? kfree+0x1cf/0x260 [ 137.757100] ? check_cfg+0x3a8/0x6f0 [ 137.757114] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 137.757125] ? cap_capable+0x1c4/0x230 [ 137.757139] ? security_capable+0x88/0xb0 [ 137.757151] ? __start_tty.part.0+0xd8/0xf0 [ 137.757167] bpf_check+0xaf3/0x1830 [ 137.757190] bpf_prog_load+0x5e9/0xe00 [ 137.757203] ? __bpf_prog_charge+0xc0/0xc0 [ 137.757215] ? __might_fault+0x104/0x1b0 [ 137.757229] ? lock_acquire+0x170/0x3f0 [ 137.757239] ? lock_downgrade+0x6e0/0x6e0 [ 137.757253] ? __might_fault+0x177/0x1b0 [ 137.757267] SyS_bpf+0x12b2/0x34e0 [ 137.757284] ? bpf_prog_get+0x20/0x20 [ 137.757296] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.757310] ? wait_for_completion_io+0x10/0x10 [ 137.757322] ? vfs_write+0x319/0x4d0 [ 137.757333] ? fput+0xb/0x140 [ 137.757351] ? do_syscall_64+0x4c/0x640 [ 137.757359] ? bpf_prog_get+0x20/0x20 [ 137.757373] do_syscall_64+0x1d5/0x640 [ 137.757390] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.757400] RIP: 0033:0x45cba9 [ 137.757406] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.757419] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.757426] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.757434] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.757442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.757448] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 137.826893] FAULT_INJECTION: forcing a failure. [ 137.826893] name failslab, interval 1, probability 0, space 0, times 0 [ 137.826907] CPU: 1 PID: 9199 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 137.826912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.826916] Call Trace: [ 137.826933] dump_stack+0x1b2/0x283 [ 137.826953] should_fail.cold+0x10a/0x154 [ 137.826970] should_failslab+0xd6/0x130 [ 137.826982] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 137.827008] do_check+0x73e/0x9420 [ 137.827027] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 137.827044] ? reg_set_min_max.part.0+0xe10/0xe10 [ 137.827056] ? kfree+0x1cf/0x260 [ 137.827064] ? check_cfg+0x3a8/0x6f0 [ 137.827074] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 137.827083] ? cap_capable+0x1c4/0x230 [ 137.827095] ? security_capable+0x88/0xb0 [ 137.827109] bpf_check+0xaf3/0x1830 [ 137.827129] bpf_prog_load+0x5e9/0xe00 [ 137.827142] ? __bpf_prog_charge+0xc0/0xc0 [ 137.827153] ? __might_fault+0x104/0x1b0 [ 137.827170] ? lock_acquire+0x170/0x3f0 [ 137.827181] ? lock_downgrade+0x6e0/0x6e0 [ 137.827198] ? __might_fault+0x177/0x1b0 [ 137.827213] SyS_bpf+0x12b2/0x34e0 [ 137.827227] ? bpf_prog_get+0x20/0x20 [ 137.827235] ? __mutex_unlock_slowpath+0x75/0x780 [ 137.827246] ? wait_for_completion_io+0x10/0x10 [ 137.827258] ? vfs_write+0x319/0x4d0 [ 137.827269] ? fput+0xb/0x140 [ 137.827284] ? do_syscall_64+0x4c/0x640 [ 137.827292] ? bpf_prog_get+0x20/0x20 [ 137.827303] do_syscall_64+0x1d5/0x640 [ 137.827327] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 137.827336] RIP: 0033:0x45cba9 [ 137.827342] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.827356] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 137.827363] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 137.827370] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 137.827376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 137.827382] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 138.384051] FAULT_INJECTION: forcing a failure. [ 138.384051] name failslab, interval 1, probability 0, space 0, times 0 [ 138.384063] CPU: 0 PID: 9220 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 138.384070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.384074] Call Trace: [ 138.384092] dump_stack+0x1b2/0x283 [ 138.384112] should_fail.cold+0x10a/0x154 [ 138.384129] should_failslab+0xd6/0x130 [ 138.384141] __kmalloc+0x2c1/0x400 [ 138.384154] ? bpf_int_jit_compile+0x13d/0x5fe [ 138.384169] bpf_int_jit_compile+0x13d/0x5fe [ 138.384182] ? kfree+0x1cf/0x260 [ 138.384195] ? do_jit+0x5300/0x5300 [ 138.384208] ? bpf_check+0x7db/0x1830 [ 138.384218] ? __bpf_prog_run64+0xb0/0xb0 [ 138.384233] bpf_prog_select_runtime+0xde/0x4f0 [ 138.384248] bpf_prog_load+0x609/0xe00 [ 138.384260] ? __bpf_prog_charge+0xc0/0xc0 [ 138.384273] ? __might_fault+0x104/0x1b0 [ 138.384287] ? lock_acquire+0x170/0x3f0 [ 138.384298] ? lock_downgrade+0x6e0/0x6e0 [ 138.384316] ? __might_fault+0x177/0x1b0 [ 138.384332] SyS_bpf+0x12b2/0x34e0 [ 138.384358] ? bpf_prog_get+0x20/0x20 [ 138.384370] ? __mutex_unlock_slowpath+0x75/0x780 [ 138.384385] ? wait_for_completion_io+0x10/0x10 [ 138.384396] ? vfs_write+0x319/0x4d0 [ 138.384406] ? fput+0xb/0x140 [ 138.384424] ? do_syscall_64+0x4c/0x640 [ 138.384433] ? bpf_prog_get+0x20/0x20 [ 138.384455] do_syscall_64+0x1d5/0x640 [ 138.384473] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 138.384482] RIP: 0033:0x45cba9 [ 138.384488] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 138.384502] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 138.384508] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 138.384515] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 138.384522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 138.384528] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 138.406725] audit: type=1800 audit(1594700020.335:36): pid=9214 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15904 res=0 [ 138.446280] audit: type=1800 audit(1594700020.375:37): pid=9227 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=15925 res=0 [ 138.515622] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 138.631831] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 138.638933] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 138.643494] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 138.647612] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 138.658239] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 138.660329] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 138.669596] EXT4-fs (loop4): get root inode failed [ 138.684636] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 138.689487] EXT4-fs (loop4): mount failed [ 138.744893] EXT4-fs (loop5): get root inode failed [ 140.557950] EXT4-fs (loop5): mount failed 04:13:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:42 executing program 2 (fault-call:1 fault-nth:20): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:42 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:42 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) socket$rxrpc(0x21, 0x2, 0xa) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:42 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:42 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 140.676085] FAULT_INJECTION: forcing a failure. [ 140.676085] name failslab, interval 1, probability 0, space 0, times 0 [ 140.687517] CPU: 1 PID: 9252 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 140.695421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.704762] Call Trace: [ 140.707339] dump_stack+0x1b2/0x283 [ 140.710960] should_fail.cold+0x10a/0x154 [ 140.715110] should_failslab+0xd6/0x130 [ 140.719076] kmem_cache_alloc_node_trace+0x25a/0x400 [ 140.724173] __get_vm_area_node+0xed/0x340 [ 140.728406] __vmalloc_node_range+0xa5/0x690 [ 140.732819] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.737394] module_alloc+0x47/0x80 [ 140.741007] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.745584] bpf_jit_binary_alloc+0x69/0x160 [ 140.749992] ? bpf_error+0x1c/0x1c [ 140.753542] bpf_int_jit_compile+0x27f/0x5fe [ 140.757984] ? do_jit+0x5300/0x5300 [ 140.761619] ? bpf_check+0x7db/0x1830 [ 140.765428] ? __bpf_prog_run64+0xb0/0xb0 [ 140.769577] bpf_prog_select_runtime+0xde/0x4f0 [ 140.774269] bpf_prog_load+0x609/0xe00 [ 140.778167] ? __bpf_prog_charge+0xc0/0xc0 04:13:42 executing program 2 (fault-call:1 fault-nth:21): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:42 executing program 2 (fault-call:1 fault-nth:22): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:42 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:42 executing program 2 (fault-call:1 fault-nth:23): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:43 executing program 2 (fault-call:1 fault-nth:24): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:43 executing program 2 (fault-call:1 fault-nth:25): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) [ 140.782432] ? __might_fault+0x104/0x1b0 [ 140.782447] ? lock_acquire+0x170/0x3f0 [ 140.782456] ? lock_downgrade+0x6e0/0x6e0 [ 140.782469] ? __might_fault+0x177/0x1b0 [ 140.782482] SyS_bpf+0x12b2/0x34e0 [ 140.782494] ? bpf_prog_get+0x20/0x20 [ 140.782504] ? __mutex_unlock_slowpath+0x75/0x780 [ 140.782515] ? wait_for_completion_io+0x10/0x10 [ 140.782526] ? vfs_write+0x319/0x4d0 [ 140.782536] ? fput+0xb/0x140 04:13:43 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) 04:13:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:43 executing program 2 (fault-call:1 fault-nth:26): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:43 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000180)="96037bbd7baa7e6e2808b0271589722f60fbd590c029a4d649f7aadbb618aa17dd72b66c20b161d2dff8583c0a86aeb27088a2e051ffae881f765a591d5d4c547e8f7cdc3aa8497dcd487b61af760766500fed57a9c16cbde0fc3b12d5bb6000d602568d9844a82a9e367b0b02d6a1bb3e0ee385dabc2d82d742391719baab15a5", 0x81, 0x40e1}, {&(0x7f0000000240)="270119d5e5f6f632bdaf6427187d9a58aabae4061543b68673184cc0b653fe31d811009f4aa33f193552926b630d4aac3af427a3d667b7e8b4af85325284c91c3a50c612ec3805328723d44c551aa7e60dbdef968a63e73a301f5185c9a44432217c446de3f9b1a8dae2c75dddafb4e99b2fef090bb74aa349509aa9279175905f5905da3f1bcec7a146ee3fa15d5ce5db21caf1f3e522baa2163122283b02191665d93226ceb621ef1ce9d2a25d5870bf9ca0c15beea44bb32d", 0xba, 0x1}, {&(0x7f0000000300)="531340cf850f512d3f6966954b68eb7d899142c1e88f10f9da72b9ace022446fd9a609911766fb416dcc52ca610200ba6bdbea35a035433c9b1ad36a41d5ea001e897588b2b86f3d976423118df7774a411920721a50d526f3c7e7c35dd0259bac2c6eb06ba2a41821be68ca4cd304bc522571260127068a27943e7d5c5992640d3eed1d8ddf48bb7339d9f39525833653ac9a6f964137309ec7f70a156b5a7cc93cf7e15e2ea3fded5266051daf7144dfe1e5aa1e7c23eb64bb6a5d08c0ac7969a0c83df8", 0xc5, 0xffffffffffffa90d}, {&(0x7f0000000400)="fc4595e444868921f249cb08f9707cb5d89cb8f2461f395d61f00d636ea85fe9754226a3c94a52d4399fd0fe856afb317aad715a5bc90a2ca289bfd6046b12add4a9434b438bfbabad916e45737d75efb8f13e967850399eb0bbb056bbd95c1af0837c488387aca23fab4a22", 0x6c, 0x2}, {&(0x7f0000000480)="d7818643eb23394ac49bf2484c730704058ff3188714316b8deea6ee52a8692f6071f99692b0a8e4fe70a6e0fcac027106f83ae8c04c5d9f4557d5da5d0d6380098701c3b8aa6c80b673734c1023e36799c3d5fa956a1991084f4d855029919065c9fee694c5df75a56d161560d0523b97e5a1", 0x73, 0x3eb}, {&(0x7f0000000500)="7f2c88e938b1757dcf1f78a8b4faa0a00d772ff4e07b460ce021c9f83b17c6ef7ee97d9a17ccaa5d6e476373ef072e6c4b63ff9f2d763f8be22a9451958f25a457583cd8", 0x44, 0x9}, {&(0x7f0000000580)="85e72199ea3b8565bbfda519a5d5c91a356663c5188814c41212e4d1eaeb4fefcb2b4e9f3fe0abd760511b666bc1d8f7b370d23f364c1752326972a39674e109a3935e989c29793a172334b46424", 0x4e, 0x1}, {&(0x7f0000000600)="8c428d1456bc3281edaa7dd4796c307f946951bf706ad4094c5c880743df7f87053e1ad70239a8b51316be90bb1241b5484204b54dc49cdd8b14ad55a17492d685ac962008006d5eb87ba789809a8e9e709cabe03beff1ae7c893d", 0x5b, 0x3ff}, {&(0x7f0000000680)="bddd3bfdc379b378558e080cdaa8b6a62eaff0c3d909bc4d7bd23a1908de8e2a040f3d9bef7fe5d4b7ef7c726a7389ee7fbed2476a7154785dcfcd6bd06b632cc22d422a6391f1e84844c3d96f06890276b8fb3708e8838f1e0e32608b3ab3787d2c518454e8ea05e9f7ab8fd0c15d1df909999b06c434b757e83ca80477db99", 0x80, 0xfffffffffffffffb}, {&(0x7f0000000800)="339cd6f38904dd97a4fdb6a0182fa010b0ac22e8314c91828fe5aeb627d1fa9be1f885e87d5a3d56030385d84a91f465cf65e91b1cb02b4b81106f85f0f451790f1735dddb9734f61238893ee25a63aeb5ae654b044e53a33b6b87d0210e01cb3d099f414eb28695fb3e3117db97fa33e498812a0ea7e8572fa384a9053acaa281563bdd3482a868a2ea343f1c320349c4ea508b382d5e97497120dc62", 0x9d, 0x1ff}], 0x120001, &(0x7f0000000700)=ANY=[@ANYBLOB="696e6f64655f63616368652c636f6d70726573732d666f7263652c6e6f656e6f7370635f64656275672c6d61785f696e6c696e653d34342c6465677265636c6162656c2c00747b758558a250311c408162b74eb4d28f06a55f9ba248be86a346b295fc38dbf44bd967e88af34e1e77b1f5ba710111da3d62dc711f9e2b850c8cbc67b48c746a5d94000000000000"]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) [ 140.782551] ? do_syscall_64+0x4c/0x640 [ 140.782558] ? bpf_prog_get+0x20/0x20 [ 140.782568] do_syscall_64+0x1d5/0x640 [ 140.782583] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 140.782591] RIP: 0033:0x45cba9 [ 140.782596] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.782606] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 140.782611] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 140.782616] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 140.782621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 140.782626] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 140.790314] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 140.790340] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 140.790365] CPU: 1 PID: 9252 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 140.790371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.790375] Call Trace: [ 140.790393] dump_stack+0x1b2/0x283 [ 140.790408] warn_alloc.cold+0x96/0x1af [ 140.790420] ? zone_watermark_ok_safe+0x250/0x250 [ 140.790433] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 140.790444] ? __get_vm_area_node+0xed/0x340 [ 140.790456] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 140.790469] ? __get_vm_area_node+0x27d/0x340 [ 140.790484] __vmalloc_node_range+0x3b2/0x690 [ 140.790504] module_alloc+0x47/0x80 [ 140.790517] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.790528] bpf_jit_binary_alloc+0x69/0x160 [ 140.790539] ? bpf_error+0x1c/0x1c [ 140.790550] bpf_int_jit_compile+0x27f/0x5fe [ 140.790563] ? do_jit+0x5300/0x5300 [ 140.790575] ? bpf_check+0x7db/0x1830 [ 140.790584] ? __bpf_prog_run64+0xb0/0xb0 [ 140.790596] bpf_prog_select_runtime+0xde/0x4f0 [ 140.790612] bpf_prog_load+0x609/0xe00 [ 140.790623] ? __bpf_prog_charge+0xc0/0xc0 [ 140.790634] ? __might_fault+0x104/0x1b0 [ 140.790650] ? lock_acquire+0x170/0x3f0 [ 140.790660] ? lock_downgrade+0x6e0/0x6e0 [ 140.790675] ? __might_fault+0x177/0x1b0 [ 140.790688] SyS_bpf+0x12b2/0x34e0 [ 140.790701] ? bpf_prog_get+0x20/0x20 [ 140.790710] ? __mutex_unlock_slowpath+0x75/0x780 [ 140.790722] ? wait_for_completion_io+0x10/0x10 [ 140.790733] ? vfs_write+0x319/0x4d0 [ 140.790744] ? fput+0xb/0x140 [ 140.790762] ? do_syscall_64+0x4c/0x640 [ 140.790771] ? bpf_prog_get+0x20/0x20 [ 140.790783] do_syscall_64+0x1d5/0x640 [ 140.790799] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 140.790808] RIP: 0033:0x45cba9 [ 140.790814] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.790825] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 140.790831] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 140.790837] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 140.790843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 140.790849] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 140.790866] Mem-Info: [ 140.790891] active_anon:112616 inactive_anon:4048 isolated_anon:0 [ 140.790891] active_file:6952 inactive_file:10486 isolated_file:0 [ 140.790891] unevictable:0 dirty:150 writeback:0 unstable:0 [ 140.790891] slab_reclaimable:16554 slab_unreclaimable:122887 [ 140.790891] mapped:60408 shmem:4464 pagetables:1066 bounce:0 [ 140.790891] free:1258181 free_pcp:243 free_cma:0 [ 140.790911] Node 0 active_anon:450464kB inactive_anon:16192kB active_file:27676kB inactive_file:41944kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241632kB dirty:600kB writeback:0kB shmem:17856kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 391168kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 140.790929] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 140.790933] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 140.790956] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 140.790985] Node 0 DMA32 free:1232656kB min:36296kB low:45368kB high:54440kB active_anon:450464kB inactive_anon:16192kB active_file:27676kB inactive_file:41944kB unevictable:0kB writepending:600kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7648kB pagetables:4264kB bounce:0kB free_pcp:972kB local_pcp:684kB free_cma:0kB [ 140.791010] lowmem_reserve[]: 0 0 0 0 0 [ 140.791030] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 140.791053] lowmem_reserve[]: 0 0 0 0 0 [ 140.791073] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 140.791094] lowmem_reserve[]: 0 0 0 0 0 [ 140.791114] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 140.791191] Node 0 DMA32: 5410*4kB (UE) 4*8kB (UME) 3*16kB (ME) 10*32kB (UME) 7*64kB (UME) 20*128kB (UM) 1*256kB (U) 2*512kB (M) 2*1024kB (UE) 2*2048kB (U) 293*4096kB (UM) = 1232600kB [ 140.791276] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 140.791328] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 140.791427] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 140.791435] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 140.791442] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 140.791450] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 140.791453] 21246 total pagecache pages [ 140.791464] 0 pages in swap cache [ 140.791469] Swap cache stats: add 0, delete 0, find 0/0 [ 140.791473] Free swap = 0kB [ 140.791477] Total swap = 0kB [ 140.791483] 1965979 pages RAM [ 140.791486] 0 pages HighMem/MovableOnly [ 140.791490] 338456 pages reserved [ 140.791494] 0 pages cma reserved [ 140.888446] FAULT_INJECTION: forcing a failure. [ 140.888446] name failslab, interval 1, probability 0, space 0, times 0 [ 140.888460] CPU: 1 PID: 9279 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 140.888467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.888471] Call Trace: [ 140.888502] dump_stack+0x1b2/0x283 [ 140.888522] should_fail.cold+0x10a/0x154 [ 140.888547] should_failslab+0xd6/0x130 [ 140.888562] kmem_cache_alloc_node_trace+0x25a/0x400 [ 140.888579] alloc_vmap_area+0xf0/0x7c0 [ 140.888599] ? purge_vmap_area_lazy+0x40/0x40 [ 140.888611] ? rcu_read_lock_sched_held+0x10a/0x130 [ 140.888621] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 140.888635] __get_vm_area_node+0x126/0x340 [ 140.888650] __vmalloc_node_range+0xa5/0x690 [ 140.888662] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.888682] module_alloc+0x47/0x80 [ 140.888693] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.888705] bpf_jit_binary_alloc+0x69/0x160 [ 140.888717] ? bpf_error+0x1c/0x1c [ 140.888732] bpf_int_jit_compile+0x27f/0x5fe [ 140.888745] ? do_jit+0x5300/0x5300 [ 140.888758] ? bpf_check+0x7db/0x1830 [ 140.888767] ? __bpf_prog_run64+0xb0/0xb0 [ 140.888779] bpf_prog_select_runtime+0xde/0x4f0 [ 140.888794] bpf_prog_load+0x609/0xe00 [ 140.888806] ? __bpf_prog_charge+0xc0/0xc0 [ 140.888820] ? __might_fault+0x104/0x1b0 [ 140.888845] ? lock_acquire+0x170/0x3f0 [ 140.888857] ? lock_downgrade+0x6e0/0x6e0 [ 140.888876] ? __might_fault+0x177/0x1b0 [ 140.888891] SyS_bpf+0x12b2/0x34e0 [ 140.888907] ? bpf_prog_get+0x20/0x20 [ 140.888920] ? __mutex_unlock_slowpath+0x75/0x780 [ 140.888935] ? wait_for_completion_io+0x10/0x10 [ 140.888946] ? vfs_write+0x319/0x4d0 [ 140.888957] ? fput+0xb/0x140 [ 140.888974] ? do_syscall_64+0x4c/0x640 [ 140.888984] ? bpf_prog_get+0x20/0x20 [ 140.888996] do_syscall_64+0x1d5/0x640 [ 140.889011] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 140.889020] RIP: 0033:0x45cba9 [ 140.889027] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.889038] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 140.889044] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 140.889051] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 140.889057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 140.889064] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 140.891433] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 140.891457] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 140.891482] CPU: 1 PID: 9279 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 140.891489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.891493] Call Trace: [ 140.891506] dump_stack+0x1b2/0x283 [ 140.891524] warn_alloc.cold+0x96/0x1af [ 140.891536] ? zone_watermark_ok_safe+0x250/0x250 [ 140.891546] ? debug_object_activate+0x450/0x450 [ 140.891558] ? kfree+0x1cf/0x260 [ 140.891575] ? __get_vm_area_node+0x27d/0x340 [ 140.891591] __vmalloc_node_range+0x3b2/0x690 [ 140.891610] module_alloc+0x47/0x80 [ 140.891622] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.891634] bpf_jit_binary_alloc+0x69/0x160 [ 140.891644] ? bpf_error+0x1c/0x1c [ 140.891657] bpf_int_jit_compile+0x27f/0x5fe [ 140.891670] ? do_jit+0x5300/0x5300 [ 140.891683] ? bpf_check+0x7db/0x1830 [ 140.891692] ? __bpf_prog_run64+0xb0/0xb0 [ 140.891706] bpf_prog_select_runtime+0xde/0x4f0 [ 140.891723] bpf_prog_load+0x609/0xe00 [ 140.891734] ? __bpf_prog_charge+0xc0/0xc0 [ 140.891744] ? __might_fault+0x104/0x1b0 [ 140.891757] ? lock_acquire+0x170/0x3f0 [ 140.891768] ? lock_downgrade+0x6e0/0x6e0 [ 140.891784] ? __might_fault+0x177/0x1b0 [ 140.891797] SyS_bpf+0x12b2/0x34e0 [ 140.891815] ? bpf_prog_get+0x20/0x20 [ 140.891825] ? __mutex_unlock_slowpath+0x75/0x780 [ 140.891852] ? wait_for_completion_io+0x10/0x10 [ 140.891864] ? vfs_write+0x319/0x4d0 [ 140.891876] ? fput+0xb/0x140 [ 140.891892] ? do_syscall_64+0x4c/0x640 [ 140.891901] ? bpf_prog_get+0x20/0x20 [ 140.891913] do_syscall_64+0x1d5/0x640 [ 140.891930] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 140.891938] RIP: 0033:0x45cba9 [ 140.891943] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.891953] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 140.891960] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 140.891965] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 140.891971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 140.891976] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 140.916249] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 140.916259] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 140.916267] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 140.936070] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 140.937043] EXT4-fs (loop4): get root inode failed [ 140.937050] EXT4-fs (loop4): mount failed [ 140.947797] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 140.947813] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 140.947823] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 140.958516] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 140.958529] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 140.958536] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 140.963152] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 140.963610] EXT4-fs (loop5): get root inode failed [ 140.963617] EXT4-fs (loop5): mount failed [ 140.965859] EXT4-fs error (device loop1): ext4_fill_super:4365: inode #2: comm syz-executor.1: iget: root inode unallocated [ 140.966125] EXT4-fs (loop1): get root inode failed [ 140.966132] EXT4-fs (loop1): mount failed [ 140.976778] FAULT_INJECTION: forcing a failure. [ 140.976778] name failslab, interval 1, probability 0, space 0, times 0 [ 140.976801] CPU: 1 PID: 9294 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 140.976807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.976813] Call Trace: [ 140.976837] dump_stack+0x1b2/0x283 [ 140.976857] should_fail.cold+0x10a/0x154 [ 140.976873] should_failslab+0xd6/0x130 [ 140.976886] kmem_cache_alloc_node_trace+0x25a/0x400 [ 140.976899] __kmalloc_node+0x38/0x70 [ 140.976912] __vmalloc_node_range+0x182/0x690 [ 140.976931] module_alloc+0x47/0x80 [ 140.976945] ? bpf_jit_binary_alloc+0x69/0x160 [ 140.976957] bpf_jit_binary_alloc+0x69/0x160 [ 140.976969] ? bpf_error+0x1c/0x1c [ 140.976983] bpf_int_jit_compile+0x27f/0x5fe [ 140.976996] ? do_jit+0x5300/0x5300 [ 140.977008] ? bpf_check+0x7db/0x1830 [ 140.977017] ? __bpf_prog_run64+0xb0/0xb0 [ 140.977029] bpf_prog_select_runtime+0xde/0x4f0 [ 140.977045] bpf_prog_load+0x609/0xe00 [ 140.977055] ? __bpf_prog_charge+0xc0/0xc0 [ 140.977065] ? __might_fault+0x104/0x1b0 [ 140.977079] ? lock_acquire+0x170/0x3f0 [ 140.977088] ? lock_downgrade+0x6e0/0x6e0 [ 140.977103] ? __might_fault+0x177/0x1b0 [ 140.977116] SyS_bpf+0x12b2/0x34e0 [ 140.977129] ? bpf_prog_get+0x20/0x20 [ 140.977138] ? __mutex_unlock_slowpath+0x75/0x780 [ 140.977150] ? wait_for_completion_io+0x10/0x10 [ 140.977160] ? vfs_write+0x319/0x4d0 [ 140.977171] ? fput+0xb/0x140 [ 140.977187] ? do_syscall_64+0x4c/0x640 [ 140.977195] ? bpf_prog_get+0x20/0x20 [ 140.977207] do_syscall_64+0x1d5/0x640 [ 140.977223] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 140.977231] RIP: 0033:0x45cba9 [ 140.977237] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.977248] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 140.977254] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 140.977260] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 140.977266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 140.977273] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.076326] FAULT_INJECTION: forcing a failure. [ 141.076326] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.076340] CPU: 0 PID: 9304 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.076346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.076351] Call Trace: [ 141.076371] dump_stack+0x1b2/0x283 [ 141.076393] should_fail.cold+0x10a/0x154 [ 141.076419] __alloc_pages_nodemask+0x22b/0x2730 [ 141.076444] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 141.076466] ? module_alloc+0x47/0x80 [ 141.076482] ? bpf_jit_binary_alloc+0x69/0x160 [ 141.076494] ? bpf_int_jit_compile+0x27f/0x5fe [ 141.076506] ? bpf_prog_select_runtime+0xde/0x4f0 [ 141.076515] ? bpf_prog_load+0x609/0xe00 [ 141.076528] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.076542] ? lock_acquire+0x170/0x3f0 [ 141.076553] ? lock_downgrade+0x6e0/0x6e0 [ 141.076569] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 141.076579] ? _raw_spin_unlock+0x29/0x40 [ 141.076590] ? fs_reclaim_acquire+0x10/0x10 [ 141.076616] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 141.076629] ? kasan_unpoison_shadow+0x30/0x40 [ 141.076644] alloc_pages_current+0xe7/0x1e0 [ 141.076660] __vmalloc_node_range+0x3f9/0x690 [ 141.076682] module_alloc+0x47/0x80 [ 141.076696] ? bpf_jit_binary_alloc+0x69/0x160 [ 141.076708] bpf_jit_binary_alloc+0x69/0x160 [ 141.076719] ? bpf_error+0x1c/0x1c [ 141.076734] bpf_int_jit_compile+0x27f/0x5fe [ 141.076749] ? do_jit+0x5300/0x5300 [ 141.076765] ? bpf_check+0x7db/0x1830 [ 141.076775] ? __bpf_prog_run64+0xb0/0xb0 [ 141.076789] bpf_prog_select_runtime+0xde/0x4f0 [ 141.076808] bpf_prog_load+0x609/0xe00 [ 141.076819] ? __bpf_prog_charge+0xc0/0xc0 [ 141.076834] ? __might_fault+0x104/0x1b0 [ 141.076850] ? lock_acquire+0x170/0x3f0 [ 141.076863] ? lock_downgrade+0x6e0/0x6e0 [ 141.076877] ? __might_fault+0x177/0x1b0 [ 141.076893] SyS_bpf+0x12b2/0x34e0 [ 141.076909] ? bpf_prog_get+0x20/0x20 [ 141.076918] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.076933] ? wait_for_completion_io+0x10/0x10 [ 141.076947] ? vfs_write+0x319/0x4d0 [ 141.076960] ? fput+0xb/0x140 [ 141.076982] ? do_syscall_64+0x4c/0x640 [ 141.076993] ? bpf_prog_get+0x20/0x20 [ 141.077007] do_syscall_64+0x1d5/0x640 [ 141.077027] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.077037] RIP: 0033:0x45cba9 [ 141.077043] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.077057] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.077065] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.077072] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.077080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.077087] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.084682] syz-executor.2: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 141.084711] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 141.085561] CPU: 0 PID: 9304 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.085568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.085572] Call Trace: [ 141.085593] dump_stack+0x1b2/0x283 [ 141.085612] warn_alloc.cold+0x96/0x1af [ 141.085626] ? zone_watermark_ok_safe+0x250/0x250 [ 141.085646] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 141.085663] ? kasan_unpoison_shadow+0x30/0x40 [ 141.085684] __vmalloc_node_range+0x47c/0x690 [ 141.085706] module_alloc+0x47/0x80 [ 141.085722] ? bpf_jit_binary_alloc+0x69/0x160 [ 141.085735] bpf_jit_binary_alloc+0x69/0x160 [ 141.085746] ? bpf_error+0x1c/0x1c [ 141.085759] bpf_int_jit_compile+0x27f/0x5fe [ 141.085774] ? do_jit+0x5300/0x5300 [ 141.085789] ? bpf_check+0x7db/0x1830 [ 141.085797] ? __bpf_prog_run64+0xb0/0xb0 [ 141.085810] bpf_prog_select_runtime+0xde/0x4f0 [ 141.085828] bpf_prog_load+0x609/0xe00 [ 141.085842] ? __bpf_prog_charge+0xc0/0xc0 [ 141.085854] ? __might_fault+0x104/0x1b0 [ 141.085870] ? lock_acquire+0x170/0x3f0 [ 141.085881] ? lock_downgrade+0x6e0/0x6e0 [ 141.085897] ? __might_fault+0x177/0x1b0 [ 141.085911] SyS_bpf+0x12b2/0x34e0 [ 141.085924] ? bpf_prog_get+0x20/0x20 [ 141.085935] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.085949] ? wait_for_completion_io+0x10/0x10 [ 141.085963] ? vfs_write+0x319/0x4d0 [ 141.085974] ? fput+0xb/0x140 [ 141.085990] ? do_syscall_64+0x4c/0x640 [ 141.086001] ? bpf_prog_get+0x20/0x20 [ 141.086014] do_syscall_64+0x1d5/0x640 [ 141.086032] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.086041] RIP: 0033:0x45cba9 [ 141.086046] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.086059] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.086066] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.086073] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.086080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.086087] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.127760] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 141.127771] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 141.127779] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 141.142158] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: root inode unallocated [ 141.142645] EXT4-fs (loop4): get root inode failed [ 141.142652] EXT4-fs (loop4): mount failed [ 141.159074] FAULT_INJECTION: forcing a failure. [ 141.159074] name failslab, interval 1, probability 0, space 0, times 0 [ 141.159088] CPU: 0 PID: 9312 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.159094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.159099] Call Trace: [ 141.159118] dump_stack+0x1b2/0x283 [ 141.159139] should_fail.cold+0x10a/0x154 [ 141.159159] should_failslab+0xd6/0x130 [ 141.159173] kmem_cache_alloc_node_trace+0x25a/0x400 [ 141.159192] __get_vm_area_node+0xed/0x340 [ 141.159210] __vmalloc_node_range+0xa5/0x690 [ 141.159223] ? module_alloc+0x5e/0x80 [ 141.159246] ? __vmalloc_node_range+0x3b7/0x690 [ 141.159266] kasan_module_alloc+0x5c/0x90 [ 141.159276] ? module_alloc+0x5e/0x80 [ 141.159288] module_alloc+0x5e/0x80 [ 141.159305] bpf_jit_binary_alloc+0x69/0x160 [ 141.159326] ? bpf_error+0x1c/0x1c [ 141.159345] bpf_int_jit_compile+0x27f/0x5fe [ 141.159361] ? do_jit+0x5300/0x5300 [ 141.159376] ? bpf_check+0x7db/0x1830 [ 141.159387] ? __bpf_prog_run64+0xb0/0xb0 [ 141.159402] bpf_prog_select_runtime+0xde/0x4f0 [ 141.159420] bpf_prog_load+0x609/0xe00 [ 141.159433] ? __bpf_prog_charge+0xc0/0xc0 [ 141.159445] ? __might_fault+0x104/0x1b0 [ 141.159458] ? lock_acquire+0x170/0x3f0 [ 141.159467] ? lock_downgrade+0x6e0/0x6e0 [ 141.159482] ? __might_fault+0x177/0x1b0 [ 141.159498] SyS_bpf+0x12b2/0x34e0 [ 141.159512] ? bpf_prog_get+0x20/0x20 [ 141.159522] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.159536] ? wait_for_completion_io+0x10/0x10 [ 141.159547] ? vfs_write+0x319/0x4d0 [ 141.159559] ? fput+0xb/0x140 [ 141.159575] ? do_syscall_64+0x4c/0x640 [ 141.159584] ? bpf_prog_get+0x20/0x20 [ 141.159597] do_syscall_64+0x1d5/0x640 [ 141.159615] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.159625] RIP: 0033:0x45cba9 [ 141.159631] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.159644] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.159652] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.159659] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.159666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.159673] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.161191] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 141.161218] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 141.161243] CPU: 0 PID: 9312 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.161250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.161254] Call Trace: [ 141.161270] dump_stack+0x1b2/0x283 [ 141.161288] warn_alloc.cold+0x96/0x1af [ 141.161300] ? zone_watermark_ok_safe+0x250/0x250 [ 141.161315] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 141.161336] ? __get_vm_area_node+0xed/0x340 [ 141.161350] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 141.161365] ? __get_vm_area_node+0x27d/0x340 [ 141.161382] __vmalloc_node_range+0x3b2/0x690 [ 141.161394] ? __vmalloc_node_range+0x3b7/0x690 [ 141.161415] kasan_module_alloc+0x5c/0x90 [ 141.161425] ? module_alloc+0x5e/0x80 [ 141.161435] module_alloc+0x5e/0x80 [ 141.161448] bpf_jit_binary_alloc+0x69/0x160 [ 141.161459] ? bpf_error+0x1c/0x1c [ 141.161474] bpf_int_jit_compile+0x27f/0x5fe [ 141.161489] ? do_jit+0x5300/0x5300 [ 141.161503] ? bpf_check+0x7db/0x1830 [ 141.161513] ? __bpf_prog_run64+0xb0/0xb0 [ 141.161529] bpf_prog_select_runtime+0xde/0x4f0 [ 141.161554] bpf_prog_load+0x609/0xe00 [ 141.161567] ? __bpf_prog_charge+0xc0/0xc0 [ 141.161579] ? __might_fault+0x104/0x1b0 [ 141.161595] ? lock_acquire+0x170/0x3f0 [ 141.161607] ? lock_downgrade+0x6e0/0x6e0 [ 141.161624] ? __might_fault+0x177/0x1b0 [ 141.161639] SyS_bpf+0x12b2/0x34e0 [ 141.161655] ? bpf_prog_get+0x20/0x20 [ 141.161666] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.161680] ? wait_for_completion_io+0x10/0x10 [ 141.161692] ? vfs_write+0x319/0x4d0 [ 141.161705] ? fput+0xb/0x140 [ 141.161719] ? do_syscall_64+0x4c/0x640 [ 141.161728] ? bpf_prog_get+0x20/0x20 [ 141.161741] do_syscall_64+0x1d5/0x640 [ 141.161759] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.161769] RIP: 0033:0x45cba9 [ 141.161774] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.161788] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.161795] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.161802] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.161810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.161817] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.239590] FAULT_INJECTION: forcing a failure. [ 141.239590] name failslab, interval 1, probability 0, space 0, times 0 [ 141.239603] CPU: 1 PID: 9316 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.239609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.239613] Call Trace: [ 141.239632] dump_stack+0x1b2/0x283 [ 141.239651] should_fail.cold+0x10a/0x154 [ 141.239668] should_failslab+0xd6/0x130 [ 141.239681] kmem_cache_alloc_node_trace+0x25a/0x400 [ 141.239696] alloc_vmap_area+0xf0/0x7c0 [ 141.239714] ? purge_vmap_area_lazy+0x40/0x40 [ 141.239723] ? rcu_read_lock_sched_held+0x10a/0x130 [ 141.239735] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 141.239762] __get_vm_area_node+0x126/0x340 [ 141.239778] __vmalloc_node_range+0xa5/0x690 [ 141.239791] ? module_alloc+0x5e/0x80 [ 141.239802] ? __vmalloc_node_range+0x3b7/0x690 [ 141.239821] kasan_module_alloc+0x5c/0x90 [ 141.239832] ? module_alloc+0x5e/0x80 [ 141.239842] module_alloc+0x5e/0x80 [ 141.239854] bpf_jit_binary_alloc+0x69/0x160 [ 141.239863] ? bpf_error+0x1c/0x1c [ 141.239876] bpf_int_jit_compile+0x27f/0x5fe [ 141.239898] ? do_jit+0x5300/0x5300 [ 141.239913] ? bpf_check+0x7db/0x1830 [ 141.239922] ? __bpf_prog_run64+0xb0/0xb0 [ 141.239936] bpf_prog_select_runtime+0xde/0x4f0 [ 141.239951] bpf_prog_load+0x609/0xe00 [ 141.239963] ? __bpf_prog_charge+0xc0/0xc0 [ 141.239974] ? __might_fault+0x104/0x1b0 [ 141.239988] ? lock_acquire+0x170/0x3f0 [ 141.239997] ? lock_downgrade+0x6e0/0x6e0 [ 141.240012] ? __might_fault+0x177/0x1b0 [ 141.240024] SyS_bpf+0x12b2/0x34e0 [ 141.240037] ? bpf_prog_get+0x20/0x20 [ 141.240047] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.240059] ? wait_for_completion_io+0x10/0x10 [ 141.240072] ? vfs_write+0x319/0x4d0 [ 141.240083] ? fput+0xb/0x140 [ 141.240099] ? do_syscall_64+0x4c/0x640 [ 141.240106] ? bpf_prog_get+0x20/0x20 [ 141.240117] do_syscall_64+0x1d5/0x640 [ 141.240132] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.240141] RIP: 0033:0x45cba9 [ 141.240147] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.240157] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.240163] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.240168] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.240173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.240179] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.243531] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 141.243557] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 141.243582] CPU: 1 PID: 9316 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.243588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.243593] Call Trace: [ 141.243610] dump_stack+0x1b2/0x283 [ 141.243626] warn_alloc.cold+0x96/0x1af [ 141.243638] ? zone_watermark_ok_safe+0x250/0x250 [ 141.243650] ? debug_object_activate+0x450/0x450 [ 141.243660] ? kfree+0x1cf/0x260 [ 141.243677] ? __get_vm_area_node+0x27d/0x340 [ 141.243693] __vmalloc_node_range+0x3b2/0x690 [ 141.243705] ? __vmalloc_node_range+0x3b7/0x690 [ 141.243723] kasan_module_alloc+0x5c/0x90 [ 141.243734] ? module_alloc+0x5e/0x80 [ 141.243749] module_alloc+0x5e/0x80 [ 141.243763] bpf_jit_binary_alloc+0x69/0x160 [ 141.243772] ? bpf_error+0x1c/0x1c [ 141.243784] bpf_int_jit_compile+0x27f/0x5fe [ 141.243795] ? do_jit+0x5300/0x5300 [ 141.243807] ? bpf_check+0x7db/0x1830 [ 141.243815] ? __bpf_prog_run64+0xb0/0xb0 [ 141.243827] bpf_prog_select_runtime+0xde/0x4f0 [ 141.243841] bpf_prog_load+0x609/0xe00 [ 141.243851] ? __bpf_prog_charge+0xc0/0xc0 [ 141.243861] ? __might_fault+0x104/0x1b0 [ 141.243874] ? lock_acquire+0x170/0x3f0 [ 141.243883] ? lock_downgrade+0x6e0/0x6e0 [ 141.243907] ? __might_fault+0x177/0x1b0 [ 141.243921] SyS_bpf+0x12b2/0x34e0 [ 141.243935] ? bpf_prog_get+0x20/0x20 [ 141.243944] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.243955] ? wait_for_completion_io+0x10/0x10 [ 141.243966] ? vfs_write+0x319/0x4d0 [ 141.243978] ? fput+0xb/0x140 [ 141.243997] ? do_syscall_64+0x4c/0x640 [ 141.244009] ? bpf_prog_get+0x20/0x20 [ 141.244022] do_syscall_64+0x1d5/0x640 [ 141.244043] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.244052] RIP: 0033:0x45cba9 [ 141.244058] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.244070] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.244076] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.244082] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.244089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.244095] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.716056] FAULT_INJECTION: forcing a failure. [ 141.716056] name failslab, interval 1, probability 0, space 0, times 0 [ 141.716068] CPU: 1 PID: 9337 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 141.716074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.716078] Call Trace: [ 141.716106] dump_stack+0x1b2/0x283 [ 141.716125] should_fail.cold+0x10a/0x154 [ 141.716141] should_failslab+0xd6/0x130 [ 141.716152] kmem_cache_alloc_node_trace+0x25a/0x400 [ 141.716164] __kmalloc_node+0x38/0x70 [ 141.716178] __vmalloc_node_range+0x182/0x690 [ 141.716187] ? __vmalloc_node_range+0x3b7/0x690 [ 141.716203] kasan_module_alloc+0x5c/0x90 [ 141.716215] ? module_alloc+0x5e/0x80 [ 141.716224] module_alloc+0x5e/0x80 [ 141.716240] bpf_jit_binary_alloc+0x69/0x160 [ 141.716249] ? bpf_error+0x1c/0x1c [ 141.716263] bpf_int_jit_compile+0x27f/0x5fe [ 141.716277] ? do_jit+0x5300/0x5300 [ 141.716293] ? bpf_check+0x7db/0x1830 [ 141.716302] ? __bpf_prog_run64+0xb0/0xb0 [ 141.716316] bpf_prog_select_runtime+0xde/0x4f0 [ 141.716332] bpf_prog_load+0x609/0xe00 [ 141.716344] ? __bpf_prog_charge+0xc0/0xc0 [ 141.716356] ? __might_fault+0x104/0x1b0 [ 141.716372] ? lock_acquire+0x170/0x3f0 [ 141.716382] ? lock_downgrade+0x6e0/0x6e0 [ 141.716399] ? __might_fault+0x177/0x1b0 [ 141.716414] SyS_bpf+0x12b2/0x34e0 [ 141.716430] ? bpf_prog_get+0x20/0x20 [ 141.716442] ? __mutex_unlock_slowpath+0x75/0x780 [ 141.716455] ? wait_for_completion_io+0x10/0x10 [ 141.716466] ? vfs_write+0x319/0x4d0 [ 141.716479] ? fput+0xb/0x140 [ 141.716498] ? do_syscall_64+0x4c/0x640 [ 141.716508] ? bpf_prog_get+0x20/0x20 [ 141.716522] do_syscall_64+0x1d5/0x640 [ 141.716542] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 141.716551] RIP: 0033:0x45cba9 [ 141.716558] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.716571] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 141.716577] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 141.716583] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 141.716589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 141.716596] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 141.806649] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 142.091524] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 04:13:46 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:13:46 executing program 2 (fault-call:1 fault-nth:27): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:46 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) 04:13:46 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) 04:13:46 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 144.893424] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 144.909269] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:13:46 executing program 2 (fault-call:1 fault-nth:28): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) 04:13:46 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x180cd0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 144.938132] EXT4-fs: failed to create workqueue [ 144.938146] EXT4-fs (loop1): mount failed [ 144.949088] FAULT_INJECTION: forcing a failure. [ 144.949088] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.949111] CPU: 0 PID: 9375 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 144.949118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.949123] Call Trace: [ 144.949160] dump_stack+0x1b2/0x283 [ 144.949196] should_fail.cold+0x10a/0x154 [ 144.949227] __alloc_pages_nodemask+0x22b/0x2730 [ 144.949247] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 144.949262] ? kasan_module_alloc+0x5c/0x90 [ 144.949279] ? module_alloc+0x5e/0x80 [ 144.949297] ? bpf_jit_binary_alloc+0x69/0x160 [ 144.949311] ? bpf_int_jit_compile+0x27f/0x5fe [ 144.949324] ? bpf_prog_select_runtime+0xde/0x4f0 [ 144.949341] ? do_syscall_64+0x1d5/0x640 [ 144.949360] ? lock_acquire+0x170/0x3f0 [ 144.949373] ? lock_downgrade+0x6e0/0x6e0 [ 144.949391] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 144.949408] ? _raw_spin_unlock+0x29/0x40 [ 144.949420] ? fs_reclaim_acquire+0x10/0x10 [ 144.949446] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 144.949459] ? kasan_unpoison_shadow+0x30/0x40 [ 144.949474] alloc_pages_current+0xe7/0x1e0 [ 144.949501] __vmalloc_node_range+0x3f9/0x690 [ 144.949526] kasan_module_alloc+0x5c/0x90 [ 144.949544] ? module_alloc+0x5e/0x80 [ 144.949556] module_alloc+0x5e/0x80 [ 144.949570] bpf_jit_binary_alloc+0x69/0x160 [ 144.949579] ? bpf_error+0x1c/0x1c [ 144.949593] bpf_int_jit_compile+0x27f/0x5fe [ 144.949605] ? do_jit+0x5300/0x5300 [ 144.949615] ? bpf_check+0x7db/0x1830 [ 144.949621] ? __bpf_prog_run64+0xb0/0xb0 [ 144.949631] bpf_prog_select_runtime+0xde/0x4f0 [ 144.949642] bpf_prog_load+0x609/0xe00 [ 144.949650] ? __bpf_prog_charge+0xc0/0xc0 [ 144.949660] ? __might_fault+0x104/0x1b0 [ 144.949670] ? lock_acquire+0x170/0x3f0 [ 144.949677] ? lock_downgrade+0x6e0/0x6e0 [ 144.949689] ? __might_fault+0x177/0x1b0 [ 144.949698] SyS_bpf+0x12b2/0x34e0 [ 144.949708] ? bpf_prog_get+0x20/0x20 [ 144.949715] ? __mutex_unlock_slowpath+0x75/0x780 [ 144.949723] ? wait_for_completion_io+0x10/0x10 [ 144.949731] ? vfs_write+0x319/0x4d0 [ 144.949738] ? fput+0xb/0x140 [ 144.949749] ? do_syscall_64+0x4c/0x640 [ 144.949769] ? bpf_prog_get+0x20/0x20 [ 144.949786] do_syscall_64+0x1d5/0x640 [ 144.949806] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 144.949815] RIP: 0033:0x45cba9 [ 144.949823] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.949837] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 144.949845] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 144.949853] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 144.949860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 144.949867] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 144.953880] syz-executor.2: vmalloc: allocation failure, allocated 0 of 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 144.953941] syz-executor.2 cpuset=/ mems_allowed=0-1 [ 144.953976] CPU: 0 PID: 9375 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 144.953989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.953995] Call Trace: [ 144.954019] dump_stack+0x1b2/0x283 [ 144.954042] warn_alloc.cold+0x96/0x1af [ 144.954059] ? zone_watermark_ok_safe+0x250/0x250 [ 144.954091] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 144.954107] ? kasan_unpoison_shadow+0x30/0x40 [ 144.954134] __vmalloc_node_range+0x47c/0x690 [ 144.954154] kasan_module_alloc+0x5c/0x90 [ 144.954170] ? module_alloc+0x5e/0x80 [ 144.954183] module_alloc+0x5e/0x80 [ 144.954198] bpf_jit_binary_alloc+0x69/0x160 [ 144.954212] ? bpf_error+0x1c/0x1c [ 144.954226] bpf_int_jit_compile+0x27f/0x5fe [ 144.954243] ? do_jit+0x5300/0x5300 [ 144.954260] ? bpf_check+0x7db/0x1830 [ 144.954268] ? __bpf_prog_run64+0xb0/0xb0 [ 144.954282] bpf_prog_select_runtime+0xde/0x4f0 [ 144.954298] bpf_prog_load+0x609/0xe00 [ 144.954308] ? __bpf_prog_charge+0xc0/0xc0 [ 144.954327] ? __might_fault+0x104/0x1b0 [ 144.954339] ? lock_acquire+0x170/0x3f0 [ 144.954347] ? lock_downgrade+0x6e0/0x6e0 [ 144.954359] ? __might_fault+0x177/0x1b0 [ 144.954370] SyS_bpf+0x12b2/0x34e0 [ 144.954382] ? bpf_prog_get+0x20/0x20 [ 144.954393] ? __mutex_unlock_slowpath+0x75/0x780 [ 144.954409] ? wait_for_completion_io+0x10/0x10 [ 144.954425] ? vfs_write+0x319/0x4d0 [ 144.954437] ? fput+0xb/0x140 [ 144.954457] ? do_syscall_64+0x4c/0x640 [ 144.954468] ? bpf_prog_get+0x20/0x20 [ 144.954482] do_syscall_64+0x1d5/0x640 [ 144.954497] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 144.954508] RIP: 0033:0x45cba9 [ 144.954515] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.954531] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 144.954537] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 144.954545] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 144.954554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 144.954563] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 144.954598] warn_alloc_show_mem: 4 callbacks suppressed [ 144.954605] Mem-Info: [ 144.954645] active_anon:111071 inactive_anon:4303 isolated_anon:0 [ 144.954645] active_file:6967 inactive_file:10527 isolated_file:0 [ 144.954645] unevictable:0 dirty:193 writeback:0 unstable:0 [ 144.954645] slab_reclaimable:16501 slab_unreclaimable:123573 [ 144.954645] mapped:60436 shmem:4460 pagetables:1047 bounce:0 [ 144.954645] free:1258905 free_pcp:218 free_cma:0 [ 144.954671] Node 0 active_anon:444284kB inactive_anon:17212kB active_file:27736kB inactive_file:42108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241744kB dirty:772kB writeback:0kB shmem:17840kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 393216kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 144.954693] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 144.954697] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 144.954726] lowmem_reserve[]: 0 2559 2559 2559 2559 [ 144.954747] Node 0 DMA32 free:1235552kB min:36296kB low:45368kB high:54440kB active_anon:444284kB inactive_anon:17212kB active_file:27736kB inactive_file:42108kB unevictable:0kB writepending:772kB present:3129332kB managed:2623992kB mlocked:0kB kernel_stack:7488kB pagetables:4188kB bounce:0kB free_pcp:840kB local_pcp:696kB free_cma:0kB [ 144.954767] lowmem_reserve[]: 0 0 0 0 0 [ 144.954785] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 144.954802] lowmem_reserve[]: 0 0 0 0 0 [ 144.954822] Node 1 Normal free:3784160kB min:53592kB low:66988kB high:80384kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 144.954851] lowmem_reserve[]: 0 0 0 0 0 [ 144.954868] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 144.954972] Node 0 DMA32: 5654*4kB (UME) 233*8kB (UME) 30*16kB (UME) 26*32kB (UME) 19*64kB (UME) 10*128kB (UM) 2*256kB (U) 3*512kB (UM) 1*1024kB (E) 2*2048kB (UM) 293*4096kB (UM) = 1235584kB [ 144.955084] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 144.955146] Node 1 Normal: 58*4kB (UE) 365*8kB (U) 281*16kB (UM) 68*32kB (UME) 20*64kB (UME) 9*128kB (UM) 8*256kB (UM) 1*512kB (U) 1*1024kB (M) 4*2048kB (ME) 918*4096kB (M) = 3784160kB [ 144.955249] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 144.955262] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 144.955271] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 144.955279] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 144.955284] 21284 total pagecache pages [ 144.955297] 0 pages in swap cache [ 144.955309] Swap cache stats: add 0, delete 0, find 0/0 [ 144.955313] Free swap = 0kB [ 144.955316] Total swap = 0kB [ 144.955324] 1965979 pages RAM [ 144.955328] 0 pages HighMem/MovableOnly [ 144.955342] 338456 pages reserved [ 144.955345] 0 pages cma reserved [ 145.045834] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 145.065003] FAULT_INJECTION: forcing a failure. [ 145.065003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.065019] CPU: 0 PID: 9393 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 145.065025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.065029] Call Trace: [ 145.065050] dump_stack+0x1b2/0x283 [ 145.065071] should_fail.cold+0x10a/0x154 [ 145.065091] __alloc_pages_nodemask+0x22b/0x2730 [ 145.065107] ? __lock_acquire+0x655/0x42a0 [ 145.065125] ? trace_hardirqs_on+0x10/0x10 [ 145.065136] ? __change_page_attr_set_clr+0x1902/0x2290 [ 145.065150] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 145.065160] ? lock_acquire+0x170/0x3f0 [ 145.065171] ? lock_downgrade+0x6e0/0x6e0 [ 145.065182] ? lookup_address_in_pgd+0x3b0/0x480 [ 145.065194] ? do_raw_spin_unlock+0x164/0x250 [ 145.065205] ? __change_page_attr_set_clr+0x316/0x2290 [ 145.065215] ? lock_acquire+0x170/0x3f0 [ 145.065224] ? lock_downgrade+0x6e0/0x6e0 [ 145.065240] alloc_pages_current+0xe7/0x1e0 [ 145.065252] ? do_raw_spin_unlock+0x164/0x250 [ 145.065265] __change_page_attr_set_clr+0x322/0x2290 [ 145.065293] ? _lookup_address_cpa.isra.0+0xb0/0xb0 [ 145.065308] ? __change_page_attr_set_clr+0x1902/0x2290 [ 145.065323] ? lock_acquire+0x170/0x3f0 [ 145.065334] ? lock_downgrade+0x6e0/0x6e0 [ 145.065344] ? lookup_address_in_pgd+0x3b0/0x480 [ 145.065360] __change_page_attr_set_clr+0x19fd/0x2290 [ 145.065376] ? vm_unmap_aliases+0x353/0x3f0 [ 145.065398] ? _lookup_address_cpa.isra.0+0xb0/0xb0 [ 145.065415] ? __mutex_unlock_slowpath+0x75/0x780 [ 145.065428] ? wait_for_completion_io+0x10/0x10 [ 145.065445] ? vm_unmap_aliases+0x353/0x3f0 [ 145.065460] change_page_attr_set_clr+0x2a2/0xa40 [ 145.065473] ? __change_page_attr_set_clr+0x2290/0x2290 [ 145.065486] ? debug_object_activate+0x450/0x450 [ 145.065496] ? kfree+0x1cf/0x260 [ 145.065508] ? bpf_int_jit_compile+0x4e2/0x5fe [ 145.065530] set_memory_ro+0x68/0x80 [ 145.065541] ? _set_memory_wb+0x80/0x80 [ 145.065554] ? __bpf_prog_run64+0xb0/0xb0 [ 145.065568] bpf_prog_select_runtime+0x140/0x4f0 [ 145.065585] bpf_prog_load+0x609/0xe00 [ 145.065598] ? __bpf_prog_charge+0xc0/0xc0 [ 145.065610] ? __might_fault+0x104/0x1b0 [ 145.065626] ? lock_acquire+0x170/0x3f0 [ 145.065636] ? lock_downgrade+0x6e0/0x6e0 [ 145.065651] ? __might_fault+0x177/0x1b0 [ 145.065665] SyS_bpf+0x12b2/0x34e0 [ 145.065679] ? bpf_prog_get+0x20/0x20 [ 145.065689] ? __mutex_unlock_slowpath+0x75/0x780 [ 145.065702] ? wait_for_completion_io+0x10/0x10 [ 145.065714] ? vfs_write+0x319/0x4d0 [ 145.065727] ? fput+0xb/0x140 [ 145.065744] ? do_syscall_64+0x4c/0x640 [ 145.065753] ? bpf_prog_get+0x20/0x20 [ 145.065766] do_syscall_64+0x1d5/0x640 [ 145.065784] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 145.065792] RIP: 0033:0x45cba9 [ 145.065799] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.065812] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 145.065821] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 145.065829] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 145.065835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 145.065843] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 145.066023] ------------[ cut here ]------------ [ 145.066041] WARNING: CPU: 0 PID: 9393 at include/linux/filter.h:612 bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066047] Kernel panic - not syncing: panic_on_warn set ... [ 145.066047] [ 145.066059] CPU: 0 PID: 9393 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 145.066065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.066069] Call Trace: [ 145.066083] dump_stack+0x1b2/0x283 [ 145.066099] panic+0x1f9/0x42d [ 145.066111] ? add_taint.cold+0x16/0x16 [ 145.066130] ? bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066142] ? __warn.cold+0x14/0x30 [ 145.066159] ? bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066168] __warn.cold+0x2f/0x30 [ 145.066183] ? ist_end_non_atomic+0x10/0x10 [ 145.066197] ? bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066211] report_bug+0x20a/0x248 [ 145.066226] do_error_trap+0x195/0x2d0 [ 145.066240] ? math_error+0x2d0/0x2d0 [ 145.066256] ? __change_page_attr_set_clr+0x2290/0x2290 [ 145.066268] ? debug_object_activate+0x450/0x450 [ 145.066285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 145.066305] invalid_op+0x1b/0x40 [ 145.066319] RIP: 0010:bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066326] RSP: 0018:ffff88804fc1fbe8 EFLAGS: 00010212 [ 145.066338] RAX: 0000000000040000 RBX: ffffffff81640980 RCX: ffffc90006e8e000 [ 145.066345] RDX: 0000000000010c74 RSI: ffffffff8163a241 RDI: 0000000000000001 [ 145.066351] RBP: ffffc90005a68002 R08: 0000000000000001 R09: 0000000000000000 [ 145.066358] R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90005a68000 [ 145.066364] R13: ffff88808907ea00 R14: 0000000000000001 R15: ffffffff8718b900 [ 145.066377] ? __bpf_prog_run64+0xb0/0xb0 [ 145.066396] ? bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066413] ? bpf_prog_select_runtime+0x3f1/0x4f0 [ 145.066430] bpf_prog_load+0x609/0xe00 [ 145.066444] ? __bpf_prog_charge+0xc0/0xc0 [ 145.066454] ? __might_fault+0x104/0x1b0 [ 145.066468] ? lock_acquire+0x170/0x3f0 [ 145.066477] ? lock_downgrade+0x6e0/0x6e0 [ 145.066493] ? __might_fault+0x177/0x1b0 [ 145.066505] SyS_bpf+0x12b2/0x34e0 [ 145.066518] ? bpf_prog_get+0x20/0x20 [ 145.066529] ? __mutex_unlock_slowpath+0x75/0x780 [ 145.066542] ? wait_for_completion_io+0x10/0x10 [ 145.066553] ? vfs_write+0x319/0x4d0 [ 145.066564] ? fput+0xb/0x140 [ 145.066577] ? do_syscall_64+0x4c/0x640 [ 145.066586] ? bpf_prog_get+0x20/0x20 [ 145.066598] do_syscall_64+0x1d5/0x640 [ 145.066616] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 145.066624] RIP: 0033:0x45cba9 [ 145.066630] RSP: 002b:00007f1742b51c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.066641] RAX: ffffffffffffffda RBX: 00000000004db900 RCX: 000000000045cba9 [ 145.066649] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000005 [ 145.066656] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 145.066662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 145.066669] R13: 0000000000000070 R14: 00000000004c34d0 R15: 00007f1742b526d4 [ 145.068076] Kernel Offset: disabled [ 146.522182] Rebooting in 86400 seconds..