56318d6ef1929a1619139a79c510656eb"]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r1, r0, 0x0) 13:28:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1223.128601][T31033] IPVS: length: 144 != 8 13:28:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1223.171563][T31041] overlayfs: unrecognized mount option "loÛß" or missing value 13:28:58 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0xffffffff, 0x3, 0x2, 0x9, 0x6, 0xfff, 0x7, 0x2ffafebe, r1}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e20, 0x8000, @mcast2, 0x1}, {0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x3, 0x0}}, 0x8, [0x100000001, 0x8, 0x0, 0x3, 0x1, 0x5, 0x0, 0x9]}, 0x5c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',low|rdir=.:file0']) r2 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r3, r2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000400)=0xc) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x2) 13:28:58 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:58 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1223.272785][T31050] gfs2: Unknown parameter 'measure' 13:28:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:28:58 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:28:58 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1223.395634][T31063] gfs2: Unknown parameter 'measure' [ 1223.414090][T31067] IPVS: length: 144 != 8 13:28:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1223.481272][T31072] overlayfs: unrecognized mount option "low|rdir=.:file0" or missing value 13:28:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:28:58 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:28:58 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1223.580683][T31072] overlayfs: unrecognized mount option "low|rdir=.:file0" or missing value [ 1223.630923][T31079] IPVS: length: 144 != 8 13:28:58 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm-control\x00', 0x2000, 0x0) write$P9_RMKDIR(r0, &(0x7f00000007c0)={0x14, 0x49, 0x2, {0x0, 0x3, 0x2}}, 0x14) r1 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x20a00) ioctl$RTC_UIE_ON(r1, 0x7003) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x18000, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r3, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r5 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x759a}], 0x30}], 0x1, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r5, &(0x7f0000008a00)=[{{0x0, 0xffc99a3b00000000, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x7534}, {&(0x7f0000000680)=""/120, 0xf}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r6, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000600)="c4a18168bd7b4b000066ba410066b8040066ef260f01f864d9f8420f72f001b9800000c00f3235008000000f3048b852000000000000000f23c00f21f835030006000f23f80fbd1d005000000f01cff2456f", 0x52}], 0x1, 0x10, &(0x7f0000000500)=[@flags={0x3, 0x1000}], 0x1) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c6c6fb6c800802300001e83897300000000"]) r7 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r7, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000800)={0x15, 0x7, 0x2, {{0x8, 'overlay\x00'}, 0xffffffff}}, 0x15) getdents(r6, &(0x7f00000006c0)=""/79, 0x4f) sendmmsg$sock(r7, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="456b3824adee6d269df86504890ce2d7ef822b9323af106d649d2a0268bead3d8ee65063acb6668eb6730abb6a3ffd61ed59ab65a7875b48642c0901d92b317389a84eb2a6d01b2e02c887867cc0aec0537964890c5461a15e9f39800f34dca1ee9643bcada7b0f8d2b6e7f0f5d27433315ceec67c3ef3dca30634e01258884761d3ce478bbcf2e4ffe672499d00430dbd66109478667262b6", 0x99}], 0x1, &(0x7f00000000c0)}}, {{&(0x7f0000000300)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)="fe4959999cff6b8e20f3d622b2", 0xd}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="6b81bb4de6b662fcb68b1d8c60278a8e557c5f435931ceccb9248b4d1ae464478550c9a5c74182ae8b9e2939bc7692e7e684d24d26e5ff4650fe12ffb617fcffe1416e02958ee56a27e1f85c2d0e7dca16a627f5dc499bc5c094ad3b92e5e89f6f9246b4c010b89c4527a3ecd8df19755ca680089232f951fb91090b53c234d593078e7332f2fc0461f354e17748bd1a985f5cf4addd5edc2512257bb906507cc7cba34b32489b6f2a167a81ff03261cf137b35361bb030ca35e2d6182ed7c24dd356ddbc6b032dfe059321cb4bfb277ea0d56962663caa06b025f", 0xdb}], 0x3, &(0x7f0000000500)}}], 0x2, 0x10) dup3(0xffffffffffffffff, r7, 0x0) ioctl$PPPIOCSNPMODE(r7, 0x4008744b, &(0x7f0000000680)={0x80fc, 0x3}) [ 1223.654129][T31083] gfs2: Unknown parameter 'measure' [ 1223.685240][T31091] IPVS: length: 144 != 8 13:28:58 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xa00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@fowner_lt={'fowner<', r3}}, {@appraise='appraise'}, {@subj_user={'subj_user'}}, {@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x35, 0x36, 0x39, 0x77, 0x37, 0x3f, 0x37], 0x2d, [0x63, 0x31, 0x37, 0x3f], 0x2d, [0x38, 0x0, 0x62, 0x77], 0x2d, [0x3a, 0x0, 0x32, 0x37], 0x2d, [0x3b, 0x38, 0x0, 0x7b, 0x63, 0x34, 0x7f]}}}]}}) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r4 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r5, r4, 0x0) 13:28:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:28:58 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:28:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:28:59 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:59 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\xd4\xfe\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1223.912538][T31105] fuse: Bad value for 'subtype' [ 1223.918127][T31113] gfs2: Unknown parameter 'measure' [ 1223.937295][T31120] overlayfs: unrecognized mount option "lo¶È" or missing value [ 1223.947366][T31109] IPVS: length: 144 != 8 13:28:59 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:28:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:28:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r1, r0, 0x0) [ 1224.182418][T31131] IPVS: length: 144 != 8 [ 1224.212585][T31135] gfs2: Unknown parameter 'measure' [ 1224.259638][T31142] overlayfs: overlapping lowerdir path 13:28:59 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, @ipv4={[], [], @loopback}, @dev={0xfe, 0x80, [], 0x21}, 0x1000, 0x1, 0xd5, 0x400, 0x6, 0x4000008, r2}) dup3(r1, r0, 0x0) 13:28:59 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x008\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:28:59 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:28:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:28:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r1, r0, 0x0) 13:28:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1224.619980][T31164] gfs2: Unknown parameter 'measure' [ 1224.637370][T31161] overlayfs: overlapping lowerdir path 13:28:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1224.685708][T31163] IPVS: length: 144 != 8 13:28:59 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:28:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r1, r0, 0x0) 13:28:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000280)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) setpgid(r1, r2) r3 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000300)='cgroup.procs\x00', 0x48, 0x0) dup3(r4, r3, 0x0) [ 1224.759127][T31174] gfs2: Unknown parameter 'measure' 13:28:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:28:59 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:28:59 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:28:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1224.959377][T31188] overlayfs: overlapping lowerdir path 13:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) [ 1225.001369][T31195] IPVS: length: 144 != 8 13:29:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1225.057484][T31201] gfs2: Unknown parameter 'measure' 13:29:00 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) mount$9p_virtio(&(0x7f00000006c0)='./cgroup.net/syz1\x00', &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='9p\x00', 0x800, &(0x7f0000000800)={'trans=virtio,', {[{@uname={'uname', 0x3d, '$lwlan0posix_acl_accessnodevem1#keyring&'}}, {@version_u='version=9p2000.u'}, {@privport='privport'}, {@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '#.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7b, 0x30, 0x30, 0x76, 0x30, 0x63, 0x36, 0x64], 0x2d, [0x38, 0x35, 0x37, 0x64], 0x2d, [0x64, 0x73, 0x0, 0x7f], 0x2d, [0x37, 0x0, 0x35, 0x67], 0x2d, [0x63, 0x72, 0x67, 0x33, 0x65, 0x37, 0x0, 0x39]}}}, {@obj_type={'obj_type', 0x3d, 'system'}}, {@seclabel='seclabel'}, {@obj_type={'obj_type'}}, {@uid_gt={'uid>', r0}}, {@obj_user={'obj_user', 0x3d, './cgroup.net/syz1\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) r2 = syz_open_dev$media(&(0x7f00000009c0)='/dev/media#\x00', 0x85, 0x10000) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000a00)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vsock\x00', 0x0, 0x0) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000980)={0x3, @bcast, r0}) r4 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000000480)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @broadcast}]}) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x70, r5, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0xa}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x74}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000680)={r4, &(0x7f0000000580)="565f867b214deefe6776937efe81b11b0a0b2d2fd6b68a5133bf957e35d25f9f8de98b5e960c8b310ecf48e0105f16cdb95aed08da5811652c4a3acca774932d7d11f7499a88974cb4069cb871ae95abf24b4fdfac35be307e7bbf019cb2caf6b621a477ea8b2424fbfc9f32cb67fab7cc8e21d983386243b074b29a87a807dd0a71fb439ac92f8d4b1a7a650adf301f35f2537fd5b9aada0500ecbfbfdbfeb80bc9efe4036dd918fda6a4399e937f41eb4c4a5ab97b70559c3ba47edf1e6b42d7", &(0x7f00000004c0)=""/123}, 0x18) r6 = openat$cgroup_procs(r4, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r6, r4, 0x0) mount(&(0x7f0000000300)=@nullb='/dev/nullb0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='binfmt_misc\x00', 0x800400, &(0x7f00000003c0)='./cgroup.net/syz1\x00') 13:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1225.264410][T31212] overlayfs: overlapping lowerdir path [ 1225.277511][T31216] IPVS: length: 144 != 8 13:29:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:00 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1225.392857][T31222] 9pnet_virtio: no channels available for device ./cgroup.net/syz1 [ 1225.418144][T31228] gfs2: Unknown parameter 'measure' [ 1225.503447][T31222] Unknown ioctl 35298 13:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1225.523719][T31240] IPVS: length: 144 != 8 13:29:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="c460fc4a365eb2bc552fea4d10fb1b54e7666b9cc8fdc5270ec00dee78c48f02c2c32540b9b4bfc61d6e94c14e530e4855a92d8866539f5eaea99a02581a98031e32e305a6fb08ab892f819304bab695deb79398d5cca4fe64592ef2aa0a875f134fb73e176a3f062f8479c1f7c37e35ca936c43b09b817f5046a4e499486e2e0e5011f11036bb1d29ced7d2c3df80fdd61af90d2564719935c0c5cefae89fc350df6a62997de8e9ce6d0b935abebf4f83b82706d5f427f131ea054cbca5621a37aa467bfb6ac13d0dd43e443bf1e739945cea1a151e1076e9389d3191c670ef9efa0a91b05f1d69160c403f2cfe07d9f57e34d1a28c9b94c10747", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1225.548491][T31241] overlayfs: overlapping lowerdir path 13:29:00 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1225.612622][T31222] binfmt_misc: Unknown parameter './cgroup.net/syz1' 13:29:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) mount$9p_virtio(&(0x7f00000006c0)='./cgroup.net/syz1\x00', &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='9p\x00', 0x800, &(0x7f0000000800)={'trans=virtio,', {[{@uname={'uname', 0x3d, '$lwlan0posix_acl_accessnodevem1#keyring&'}}, {@version_u='version=9p2000.u'}, {@privport='privport'}, {@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '#.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7b, 0x30, 0x30, 0x76, 0x30, 0x63, 0x36, 0x64], 0x2d, [0x38, 0x35, 0x37, 0x64], 0x2d, [0x64, 0x73, 0x0, 0x7f], 0x2d, [0x37, 0x0, 0x35, 0x67], 0x2d, [0x63, 0x72, 0x67, 0x33, 0x65, 0x37, 0x0, 0x39]}}}, {@obj_type={'obj_type', 0x3d, 'system'}}, {@seclabel='seclabel'}, {@obj_type={'obj_type'}}, {@uid_gt={'uid>', r0}}, {@obj_user={'obj_user', 0x3d, './cgroup.net/syz1\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) r2 = syz_open_dev$media(&(0x7f00000009c0)='/dev/media#\x00', 0x85, 0x10000) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000a00)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vsock\x00', 0x0, 0x0) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000980)={0x3, @bcast, r0}) r4 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000000480)={0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @broadcast}]}) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x70, r5, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0xa}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x74}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000680)={r4, &(0x7f0000000580)="565f867b214deefe6776937efe81b11b0a0b2d2fd6b68a5133bf957e35d25f9f8de98b5e960c8b310ecf48e0105f16cdb95aed08da5811652c4a3acca774932d7d11f7499a88974cb4069cb871ae95abf24b4fdfac35be307e7bbf019cb2caf6b621a477ea8b2424fbfc9f32cb67fab7cc8e21d983386243b074b29a87a807dd0a71fb439ac92f8d4b1a7a650adf301f35f2537fd5b9aada0500ecbfbfdbfeb80bc9efe4036dd918fda6a4399e937f41eb4c4a5ab97b70559c3ba47edf1e6b42d7", &(0x7f00000004c0)=""/123}, 0x18) r6 = openat$cgroup_procs(r4, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) dup3(r6, r4, 0x0) mount(&(0x7f0000000300)=@nullb='/dev/nullb0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='binfmt_misc\x00', 0x800400, &(0x7f00000003c0)='./cgroup.net/syz1\x00') 13:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1225.720173][T31253] gfs2: Unknown parameter 'measure' [ 1225.758259][T31260] overlayfs: overlapping lowerdir path [ 1225.827047][T31261] IPVS: length: 144 != 8 13:29:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="9fb52340b5e8ee4be4f0e9bd120de92503fe47fd237e0b6e8f39f5b4fde95beab9e2f4ca844b325d1bdce056480a96e002226717dfe91b0908a94415358a801e8673291afb32ab02241cf2f57e4a2bb47a6bb285dd3d281ee0a9aec6710d6da6bf854294e37470ed4cabbde52d68540f8b1c20ecb6f066b061ad2dde149d4937e798b61d64c64ee7c3d2a557210566967515dab7807178d9a3be6d75be389be9889b26341ce7ce5dcc83ae1d79423057b60e78f1e494869bc6d125af08ec2004601dc16bd91d2139b2e40d89b7f86da4e5df2dfeddef0fba24380832da2cc9915abf9d4cfe73a86a1d24624094456503c0a4ec44e3385949174196", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:00 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1225.923357][T31270] 9pnet_virtio: no channels available for device ./cgroup.net/syz1 13:29:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1226.013151][T31270] Unknown ioctl 35298 [ 1226.027985][T31280] gfs2: Unknown parameter 'measure' 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1226.077566][T31282] overlayfs: overlapping lowerdir path [ 1226.096539][T31270] binfmt_misc: Unknown parameter './cgroup.net/syz1' 13:29:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:01 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1226.168563][T31287] IPVS: length: 144 != 8 13:29:01 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1226.256596][T31298] gfs2: Unknown parameter 'measure' 13:29:01 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x9367) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) getdents(r0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) dup3(r1, r0, 0x0) 13:29:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="9fb52340b5e8ee4be4f0e9bd120de92503fe47fd237e0b6e8f39f5b4fde95beab9e2f4ca844b325d1bdce056480a96e002226717dfe91b0908a94415358a801e8673291afb32ab02241cf2f57e4a2bb47a6bb285dd3d281ee0a9aec6710d6da6bf854294e37470ed4cabbde52d68540f8b1c20ecb6f066b061ad2dde149d4937e798b61d64c64ee7c3d2a557210566967515dab7807178d9a3be6d75be389be9889b26341ce7ce5dcc83ae1d79423057b60e78f1e494869bc6d125af08ec2004601dc16bd91d2139b2e40d89b7f86da4e5df2dfeddef0fba24380832da2cc9915abf9d4cfe73a86a1d24624094456503c0a4ec44e3385949174196", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1226.348166][T31309] overlayfs: overlapping lowerdir path [ 1226.455697][T31314] IPVS: length: 144 != 8 13:29:01 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\xff\xff\xff8\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:01 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) [ 1226.621681][T31327] gfs2: Unknown parameter 'measure' 13:29:01 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1226.662617][T31328] overlayfs: overlapping lowerdir path [ 1226.697268][T31336] IPVS: length: 144 != 8 13:29:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="9fb52340b5e8ee4be4f0e9bd120de92503fe47fd237e0b6e8f39f5b4fde95beab9e2f4ca844b325d1bdce056480a96e002226717dfe91b0908a94415358a801e8673291afb32ab02241cf2f57e4a2bb47a6bb285dd3d281ee0a9aec6710d6da6bf854294e37470ed4cabbde52d68540f8b1c20ecb6f066b061ad2dde149d4937e798b61d64c64ee7c3d2a557210566967515dab7807178d9a3be6d75be389be9889b26341ce7ce5dcc83ae1d79423057b60e78f1e494869bc6d125af08ec2004601dc16bd91d2139b2e40d89b7f86da4e5df2dfeddef0fba24380832da2cc9915abf9d4cfe73a86a1d24624094456503c0a4ec44e3385949174196", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:01 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:01 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1226.795411][T31344] gfs2: Unknown parameter 'measure' 13:29:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) 13:29:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="9fb52340b5e8ee4be4f0e9bd120de92503fe47fd237e0b6e8f39f5b4fde95beab9e2f4ca844b325d1bdce056480a96e002226717dfe91b0908a94415358a801e8673291afb32ab02241cf2f57e4a2bb47a6bb285dd3d281ee0a9aec6710d6da6bf854294e37470ed4cabbde52d68540f8b1c20ecb6f066b061ad2dde149d4937e798b61d64c64ee7c3d2a557210566967515dab7807178d9a3be6d75be389be9889b26341ce7ce5dcc83ae1d79423057b60e78f1e494869bc6d125af08ec2004601dc16bd91d2139b2e40d89b7f86da4e5df2dfeddef0fba24380832da2cc9915abf9d4cfe73a86a1d24624094456503c0a4ec44e3385949174196", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1226.929011][T31353] IPVS: length: 144 != 8 [ 1226.964562][T31350] IPVS: length: 144 != 8 13:29:02 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:02 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:02 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) 13:29:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1227.221135][T31377] IPVS: length: 144 != 8 13:29:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1227.294112][T31379] IPVS: length: 144 != 8 13:29:02 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:02 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) ioctl$KDDISABIO(r0, 0x4b37) dup3(r1, r0, 0x0) 13:29:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:02 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1227.525870][T31405] IPVS: length: 144 != 8 13:29:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:02 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="c460fc4a365eb2bc552fea4d10fb1b54e7666b9cc8fdc5270ec00dee78c48f02c2c32540b9b4bfc61d6e94c14e530e4855a92d8866539f5eaea99a02581a98031e32e305a6fb08ab892f819304bab695deb79398d5cca4fe64592ef2aa0a875f134fb73e176a3f062f8479c1f7c37e35ca936c43b09b817f5046a4e499486e2e0e5011f11036bb1d29ced7d2c3df80fdd61af90d2564719935c0c5cefae89fc350df6a62997de8e9ce6d0b935abebf4f83b82706d5f427f131ea054cbca5621a37aa467bfb6ac13d0dd43e443bf1e739945cea1a151e1076e9389d3191c670ef9efa0a91b05f1d69160c403f2cfe07d9f57e34d1a28c9b94c10747", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) 13:29:02 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1227.781017][T31423] IPVS: length: 144 != 8 13:29:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:02 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:03 executing program 4: r0 = socket$packet(0x11, 0x4000000000000a, 0x300) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2d, 0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff008}, {0x80000006}]}, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x200400, 0x0) 13:29:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:03 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1228.118731][T31461] IPVS: length: 144 != 8 13:29:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1228.168619][T31465] overlayfs: overlapping lowerdir path 13:29:03 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1228.236375][T31471] overlayfs: missing 'lowerdir' 13:29:03 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000240)) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') fcntl$getflags(r0, 0x403) lseek(r0, 0x0, 0x3) 13:29:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x3, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1228.467339][T31488] IPVS: length: 144 != 8 13:29:03 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1228.526476][T31494] overlayfs: missing 'lowerdir' 13:29:03 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044326, &(0x7f0000000200)={0x0, 0x0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) recvfrom$unix(r1, &(0x7f0000000080)=""/201, 0xc9, 0x10002, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 13:29:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1228.561525][T31503] overlayfs: overlapping lowerdir path 13:29:03 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000240)) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="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", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="9fb52340b5e8ee4be4f0e9bd120de92503fe47fd237e0b6e8f39f5b4fde95beab9e2f4ca844b325d1bdce056480a96e002226717dfe91b0908a94415358a801e8673291afb32ab02241cf2f57e4a2bb47a6bb285dd3d281ee0a9aec6710d6da6bf854294e37470ed4cabbde52d68540f8b1c20ecb6f066b061ad2dde149d4937e798b61d64c64ee7c3d2a557210566967515dab7807178d9a3be6d75be389be9889b26341ce7ce5dcc83ae1d79423057b60e78f1e494869bc6d125af08ec2004601dc16bd91d2139b2e40d89b7f86da4e5df2dfeddef0fba24380832da2cc9915abf9d4cfe73a86a1d24624094456503c0a4ec44e3385949174196", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:03 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1228.757137][T31515] overlayfs: overlapping lowerdir path [ 1228.791218][T31519] overlayfs: missing 'lowerdir' [ 1228.803866][T31524] gfs2: Unknown parameter 'measure' 13:29:03 executing program 4: r0 = creat(&(0x7f0000000380)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="094f485d266437e7c89716fe62a1bb24598d11f24ff6d2aca49de0af29574fa7db8dede6eccc5a0c751f895f0f6267611017ee8d548d93e9506e89704e5ae0d356c839e80054bdd9453a0f246ecc9a881efcf1915ceb48c2fd3e5f8adc26b3b6ed5910"]) [ 1228.833143][T31523] IPVS: length: 144 != 8 13:29:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000300)="a79a08d8d67e0575475b4892183c50966ca7449befc4c8392f38a55bfea25240ed95a517c5a1f844a4bdf03a95cb6df26bfc4751584f72430ead6cee373de40449d7bddcdf61337a4992d21fa2116617ce3d294b11280cb7b702c329", 0x5c, 0x200}, {&(0x7f0000000380)="5c27a70c185acba3693fb20bf4b22aaa60dac386bcf67f75acecdecc6fec4054b37b009bff376790294cec69dd7ba4c314d0ebb7992e613cc9de312f17408dc7b44cd307d1a3360dbfab6d6672f5f24f1f272361a7284a2dcb50914052f48260ccea11d64df5673c35c724d0d1a338e6bde7e913210889764a7a7dd38345b3378acd", 0x82, 0x10000}, {&(0x7f0000000440)="a9d0aa2f778e2328fb126f99e59a736c665fba7f4afa8e1c37443c2b111fd0a1fcd5b5381b48ba472ea54aad3ff60c037c134e49874ba943d5052f7150af008cdfb02799add36d47567a4f12eacdbb6caa8b60700a2121db13b6e6b535218d308b946d31960b37f4fe11cc5cf8d7c1660c75014b6d81eef0297cd4208c40104075e148836b2df577d08b382f7aad575498190a4a0aa4da20001c5c1dd9bb06acfb4a2674c1ada79f18e6a9aa3e4b4bf980fb6ad25e09850a10159e675e8a3c90af8398b8f76869d1ded18e2786bde3aa47e0e6508459e25915c0ca7f12290c8591f37dee119bf8c2cfdf01c7e2b07a6261c3a47492aaf14dac", 0xf9, 0x6}, {&(0x7f0000000580)="c460fc4a365eb2bc552fea4d10fb1b54e7666b9cc8fdc5270ec00dee78c48f02c2c32540b9b4bfc61d6e94c14e530e4855a92d8866539f5eaea99a02581a98031e32e305a6fb08ab892f819304bab695deb79398d5cca4fe64592ef2aa0a875f134fb73e176a3f062f8479c1f7c37e35ca936c43b09b817f5046a4e499486e2e0e5011f11036bb1d29ced7d2c3df80fdd61af90d2564719935c0c5cefae89fc350df6a62997de8e9ce6d0b935abebf4f83b82706d5f427f131ea054cbca5621a37aa467bfb6ac13d0dd43e443bf1e739945cea1a151e1076e9389d3191c670ef9efa0a91b05f1d69160c403f2cfe07d9f57e34d1a28c9b94c10747", 0xfb, 0xdd}, {&(0x7f0000000680)="886295a9e7da355838df3dc91204edc4ff8331b98ef865f80dbc6881c6dc59bbbbef2126ce370b3ab9c956cf54b746850ca4c6951412d5d0f71678df1af9e213464d3cb37fb633114dd3986b8664e61b8f740286232ae0e97932b4606689e60a27f9f59f10d3f3", 0x67, 0xcaf}, {&(0x7f0000000700)="a686774b6baf8ae1c7647a0a80cb878c6be3b0259bf4e3dba54cea415d9a993cba7a9123583f2882c36b60aefdb4a6e092abc81385d2b09bb6", 0x39, 0xee8}, {&(0x7f0000000740)="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", 0xfb, 0x8}, {&(0x7f0000000840)="787cbb2216689906f068dfc4c2887f18771b04331db9df50349a59948d3a6ca7e3e04691ac1abfa12a06eab80784b990b5b8a90548087814ea05babaa4cca0c7f062", 0x42, 0x800}], 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:03 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:04 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000240)) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1229.045829][T31544] overlayfs: overlapping lowerdir path [ 1229.065017][T31543] gfs2: Unknown parameter 'measure' [ 1229.070559][T31540] overlayfs: missing 'lowerdir' 13:29:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1229.156326][T31554] IPVS: length: 144 != 8 13:29:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:04 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1229.264977][T31562] overlayfs: overlapping lowerdir path 13:29:04 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:04 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1229.381335][T31571] gfs2: Unknown parameter 'measure' [ 1229.388784][T31573] overlayfs: missing 'lowerdir' [ 1229.544986][T31581] IPVS: length: 144 != 8 13:29:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)=""/165) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000840)="5c4b1954a8b5942460aea199e40e1d8982b98b33a3cc54f12a6fd14de6a1beb3267da9ac15e03241e008182aa02c2b5459144280168dba4a412b96876425c2a245d0a6f8c159e429debdacad3d0afaa523202c3d599c95c5798064631f138c5dcfbf2a7c5e3fefae2159b1e935fcd9b3bebfbee99db2f820745ebb07c59d61eee543ceb1c02a40a95c87b12544b10d2203c46ce7922680479cbde5ac1ebfe32ecaa189a68f50c4453ab6a7bdf71799814a54e121a4532f068da622f00c5f3a6c8ace174b5e356644b864efc684eaa1f2e75143e04bdcada7c5de791158e2", 0xde}, {&(0x7f0000000940)="bb25b86761fe9ec8e419c5d7b0338589596bc3b807e33c8d84a6245d63b696a7e43ed2b81f7b0c90e403eec2146d26730989bceac4", 0x35}], 0x2}}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f00000052c0)='#', 0x1}, {&(0x7f0000005400)='t', 0x1}], 0x2}}], 0x2, 0x0) 13:29:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}, {@loccookie='loccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:04 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:04 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:04 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1229.758336][T31593] overlayfs: overlapping lowerdir path [ 1229.760279][T31590] gfs2: Unknown parameter 'measure' [ 1229.792127][T31601] overlayfs: missing 'lowerdir' [ 1229.795083][T31595] IPVS: length: 144 != 8 13:29:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x4e) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x400) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f00000000c0)=0x1a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7", 0x3) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b700)=[{{&(0x7f00000014c0)=@x25, 0x80, &(0x7f0000000140)=[{&(0x7f0000001540)=""/150, 0x96}, {0x0, 0x343}, {&(0x7f0000001700)=""/4096, 0x1000}, {0x0}, {0x0}], 0x5}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005100)=""/105, 0x69}}], 0x2, 0x0, &(0x7f000000b940)={0x77359400}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x4924924924925ac, 0x48040) 13:29:04 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:05 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x40000005, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x321000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x1) ioctl$sock_SIOCINQ(r0, 0x89e3, &(0x7f0000000040)) [ 1230.033275][T31617] IPVS: length: 144 != 8 13:29:05 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:05 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1230.144780][T31632] overlayfs: missing 'lowerdir' 13:29:05 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffff, 0x8000200040) sysfs$2(0x2, 0x2, &(0x7f0000000080)=""/99) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x113, 0x1) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000200)={0xa4}) [ 1230.180547][T31628] gfs2: not a GFS2 filesystem 13:29:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:05 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:05 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1230.413348][T31652] IPVS: length: 144 != 8 13:29:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x2001) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000540)="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") syz_emit_ethernet(0xfe27, &(0x7f0000000240)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:29:05 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:05 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1230.509952][T31660] overlayfs: missing 'lowerdir' [ 1230.560291][T31663] gfs2: not a GFS2 filesystem 13:29:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:05 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:05 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1230.739370][T31681] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1230.773515][T31684] gfs2: not a GFS2 filesystem [ 1230.789341][T31675] IPVS: length: 144 != 8 [ 1230.854818][T31695] overlayfs: missing 'lowerdir' 13:29:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:05 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:05 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:06 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@norgrplvb='norgrplvb'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1231.053020][T31709] overlayfs: overlapping lowerdir path [ 1231.096517][T31707] IPVS: length: 144 != 8 [ 1231.115246][T31713] overlayfs: unrecognized mount option "lowerdir" or missing value 13:29:06 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1231.141883][T31719] gfs2: Unknown parameter 'measure' 13:29:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1231.182534][T31718] IPVS: length: 144 != 8 13:29:06 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}, {@noloccookie='noloccookie'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x64bb, 0x0, 0x6, 0x8ca, 0x1a, 0x2, 0x100, 0x8c, 0x4, 0xf03}) [ 1231.277355][T31728] overlayfs: overlapping lowerdir path 13:29:06 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:06 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x420002, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettfilter={0x34, 0x2e, 0x0, 0x70bd25, 0x25dfdbff, {0x0, r2, {0x5, 0xa}, {0xd}, {0xe, 0x1}}, [{0x8}, {0x8, 0xb, 0x3ff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x480040, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x2, [0xffffffff, 0x4]}, 0x8) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x3, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) [ 1231.437829][T31741] overlayfs: unrecognized mount option "lowerdir" or missing value [ 1231.486798][T31737] IPVS: length: 144 != 8 [ 1231.503808][T31750] gfs2: Unknown parameter 'measure' 13:29:06 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1231.593187][T31758] overlayfs: overlapping lowerdir path 13:29:06 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:06 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004900002c000000000000000000000000000000000000009078e0000001"], 0x0) 13:29:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:06 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1231.718485][T31769] overlayfs: unrecognized mount option "lowerdir" or missing value 13:29:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x19a, 0x6800000000000000) [ 1231.830497][T31778] gfs2: Unknown parameter 'measure' [ 1231.841147][T31777] IPVS: length: 144 != 8 13:29:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1231.882747][T31785] overlayfs: overlapping lowerdir path 13:29:07 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:07 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:07 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1900000000000000100100000188fa74e486d77712a9c6100e0000007700000000000000"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x201) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) connect(r1, &(0x7f0000000140)=@ethernet={0x306, @remote}, 0x80) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r2) [ 1232.082263][T31797] IPVS: length: 144 != 8 [ 1232.086428][T31799] overlayfs: failed to resolve 'f': -2 [ 1232.102175][T31801] gfs2: Unknown parameter 'measure' 13:29:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:07 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1232.131817][T31804] overlayfs: overlapping lowerdir path 13:29:07 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:07 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x2b0000, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) r1 = socket(0x11, 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) [ 1232.335040][T31817] overlayfs: failed to resolve 'f': -2 [ 1232.394751][T31822] IPVS: length: 144 != 8 [ 1232.413420][T31830] overlayfs: overlapping lowerdir path 13:29:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:07 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1232.469238][T31828] gfs2: Unknown parameter 'measure' 13:29:07 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1232.596470][T31842] overlayfs: failed to resolve 'f': -2 [ 1232.602578][T31845] overlayfs: overlapping lowerdir path [ 1232.603127][T31833] block nbd0: shutting down sockets 13:29:07 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1232.705476][T31852] IPVS: length: 144 != 8 13:29:07 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:07 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x2b0000, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) r1 = socket(0x11, 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) 13:29:07 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1232.855021][T31868] overlayfs: overlapping lowerdir path [ 1232.890260][T31866] gfs2: Unknown parameter 'measure' [ 1232.902810][T31870] overlayfs: failed to resolve 'fil': -2 13:29:08 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1232.992302][T31873] IPVS: length: 144 != 8 13:29:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1233.054475][T31884] overlayfs: failed to resolve 'fil': -2 13:29:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1233.095410][T31874] block nbd0: shutting down sockets 13:29:08 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x0, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:08 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x2b0000, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) r1 = socket(0x11, 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) 13:29:08 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1233.173706][T31892] overlayfs: overlapping lowerdir path [ 1233.193884][T31894] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1233.366882][T31903] IPVS: length: 144 != 8 [ 1233.388081][T31909] overlayfs: failed to resolve 'fil': -2 [ 1233.450446][T31904] block nbd0: shutting down sockets [ 1233.465583][T31913] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:08 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x0, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:08 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1233.687735][T31931] gfs2: quota_quantum mount option requires a positive numeric argument [ 1233.699982][T31933] overlayfs: failed to resolve 'file': -2 13:29:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:08 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1233.772522][T31944] gfs2: quota_quantum mount option requires a positive numeric argument [ 1233.801171][T31939] IPVS: length: 144 != 8 13:29:08 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x0, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}]}) [ 1233.967587][T31954] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:09 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1234.104048][T31970] IPVS: length: 144 != 8 [ 1234.114580][T31973] gfs2: Unknown parameter 'measure' 13:29:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:09 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}]}) [ 1234.283452][T31982] gfs2: quota_quantum mount option requires a positive numeric argument [ 1234.322305][T31988] overlayfs: failed to resolve 'file': -2 13:29:09 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\xff\xff\xff8\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1234.454618][T32002] gfs2: Unknown parameter 'measure' [ 1234.463288][T31999] IPVS: length: 144 != 8 13:29:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}]}) 13:29:09 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:09 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1234.571836][T32011] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1234.736288][T32027] gfs2: Unknown parameter 'measure' 13:29:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:09 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}], [{@measure='measure'}]}) [ 1234.836784][T32034] IPVS: length: 144 != 8 [ 1234.855457][T32039] overlayfs: missing 'lowerdir' 13:29:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:10 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1234.947643][T32042] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:10 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1234.997644][T32050] gfs2: Unknown parameter 'measure' 13:29:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:10 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) [ 1235.122489][T32059] IPVS: length: 144 != 8 [ 1235.212996][T32069] overlayfs: missing 'lowerdir' 13:29:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:10 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(0x0, 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:10 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1235.236639][T32068] gfs2: not a GFS2 filesystem 13:29:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:10 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 13:29:10 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1235.377377][T32077] gfs2: quota_quantum mount option requires a positive numeric argument [ 1235.461283][T32084] IPVS: length: 144 != 8 13:29:10 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:10 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) [ 1235.483638][T32092] overlayfs: missing 'lowerdir' 13:29:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:10 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:10 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(0x0, 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1235.596589][T32102] overlayfs: missing 'lowerdir' 13:29:10 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:10 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1235.737276][T32113] overlayfs: missing 'lowerdir' [ 1235.749807][T32115] FAULT_INJECTION: forcing a failure. [ 1235.749807][T32115] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.771180][T32111] IPVS: length: 144 != 8 [ 1235.787699][T32115] CPU: 1 PID: 32115 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1235.796834][T32115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.796840][T32115] Call Trace: [ 1235.796875][T32115] dump_stack+0x172/0x1f0 [ 1235.796903][T32115] should_fail.cold+0xa/0x15 [ 1235.796924][T32115] ? fault_create_debugfs_attr+0x180/0x180 [ 1235.796944][T32115] ? page_to_nid.part.0+0x20/0x20 [ 1235.796965][T32115] ? ___might_sleep+0x163/0x280 [ 1235.796985][T32115] __should_failslab+0x121/0x190 [ 1235.797004][T32115] should_failslab+0x9/0x14 [ 1235.797018][T32115] __kmalloc+0x2e0/0x770 [ 1235.797035][T32115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1235.797054][T32115] ? fput_many+0x12c/0x1a0 [ 1235.797078][T32115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1235.859211][T32115] ? strnlen_user+0x1ed/0x2e0 [ 1235.859230][T32115] ? __x64_sys_memfd_create+0x13c/0x470 [ 1235.859246][T32115] __x64_sys_memfd_create+0x13c/0x470 [ 1235.859263][T32115] ? switch_fpu_return+0x1fa/0x4f0 13:29:10 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\xd4\xfe\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:10 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1235.859277][T32115] ? memfd_fcntl+0x1580/0x1580 [ 1235.859301][T32115] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1235.875248][T32118] gfs2: quota_quantum mount option requires a positive numeric argument [ 1235.875723][T32115] ? trace_hardirqs_off_caller+0x65/0x230 [ 1235.911159][T32115] ? trace_hardirqs_on+0x67/0x240 [ 1235.916194][T32115] do_syscall_64+0xfa/0x760 [ 1235.920704][T32115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1235.926596][T32115] RIP: 0033:0x459829 13:29:11 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x008\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1235.930524][T32115] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1235.950127][T32115] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1235.958538][T32115] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1235.966507][T32115] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1235.974459][T32115] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:29:11 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1235.982408][T32115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fe5fb06d4 [ 1235.990362][T32115] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:11 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(0x0, 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1236.117016][T32130] overlayfs: missing 'lowerdir' 13:29:11 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1236.195268][T32142] FAULT_INJECTION: forcing a failure. [ 1236.195268][T32142] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.211093][T32144] IPVS: length: 144 != 8 [ 1236.234874][T32147] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 13:29:11 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1236.242047][T32142] CPU: 1 PID: 32142 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1236.252360][T32142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.262412][T32142] Call Trace: [ 1236.265713][T32142] dump_stack+0x172/0x1f0 [ 1236.270054][T32142] should_fail.cold+0xa/0x15 [ 1236.274648][T32142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.280730][T32142] ? fault_create_debugfs_attr+0x180/0x180 [ 1236.286546][T32142] ? page_to_nid.part.0+0x20/0x20 [ 1236.291577][T32142] ? ___might_sleep+0x163/0x280 [ 1236.296445][T32142] __should_failslab+0x121/0x190 [ 1236.301384][T32142] ? shmem_destroy_inode+0x80/0x80 [ 1236.301400][T32142] should_failslab+0x9/0x14 [ 1236.301413][T32142] kmem_cache_alloc+0x2aa/0x710 [ 1236.301450][T32142] ? __alloc_fd+0x487/0x620 [ 1236.320335][T32142] ? __kasan_check_read+0x11/0x20 [ 1236.320353][T32142] ? shmem_destroy_inode+0x80/0x80 [ 1236.320367][T32142] shmem_alloc_inode+0x1c/0x50 [ 1236.320380][T32142] alloc_inode+0x68/0x1e0 [ 1236.320393][T32142] new_inode_pseudo+0x19/0xf0 13:29:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x48, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 1236.320405][T32142] new_inode+0x1f/0x40 [ 1236.320417][T32142] shmem_get_inode+0x84/0x7e0 [ 1236.320442][T32142] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1236.320456][T32142] shmem_file_setup+0x66/0x90 [ 1236.320472][T32142] __x64_sys_memfd_create+0x2a2/0x470 [ 1236.320486][T32142] ? memfd_fcntl+0x1580/0x1580 [ 1236.320501][T32142] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1236.320513][T32142] ? trace_hardirqs_off_caller+0x65/0x230 [ 1236.320524][T32142] ? trace_hardirqs_on+0x67/0x240 [ 1236.320541][T32142] do_syscall_64+0xfa/0x760 13:29:11 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1236.320556][T32142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.320565][T32142] RIP: 0033:0x459829 [ 1236.320578][T32142] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.320585][T32142] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1236.320598][T32142] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:29:11 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1236.320613][T32142] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1236.448312][T32142] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1236.456278][T32142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fe5fb06d4 [ 1236.464314][T32142] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:11 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:11 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1236.566964][T32162] overlayfs: missing 'lowerdir' [ 1236.596807][T32164] FAULT_INJECTION: forcing a failure. [ 1236.596807][T32164] name failslab, interval 1, probability 0, space 0, times 0 13:29:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 1236.666755][T32164] CPU: 1 PID: 32164 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1236.675902][T32164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.685961][T32164] Call Trace: [ 1236.689269][T32164] dump_stack+0x172/0x1f0 [ 1236.693620][T32164] should_fail.cold+0xa/0x15 [ 1236.698224][T32164] ? fault_create_debugfs_attr+0x180/0x180 [ 1236.704039][T32164] ? page_to_nid.part.0+0x20/0x20 [ 1236.709068][T32164] ? ___might_sleep+0x163/0x280 [ 1236.713925][T32164] __should_failslab+0x121/0x190 [ 1236.718869][T32164] should_failslab+0x9/0x14 [ 1236.719072][T32175] IPVS: length: 144 != 8 [ 1236.723370][T32164] kmem_cache_alloc+0x2aa/0x710 [ 1236.723387][T32164] ? lock_acquire+0x190/0x410 [ 1236.723411][T32164] ? current_time+0x6b/0x140 [ 1236.732477][T32164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.732489][T32164] ? timespec64_trunc+0xf0/0x180 [ 1236.732504][T32164] __d_alloc+0x2e/0x8c0 [ 1236.732521][T32164] d_alloc_pseudo+0x1e/0x70 [ 1236.732536][T32164] alloc_file_pseudo+0xe2/0x280 [ 1236.732552][T32164] ? alloc_file+0x4d0/0x4d0 [ 1236.732571][T32164] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1236.748029][T32164] __shmem_file_setup.part.0+0x108/0x2b0 [ 1236.748048][T32164] shmem_file_setup+0x66/0x90 [ 1236.757767][T32176] gfs2: quota_quantum mount option requires a positive numeric argument [ 1236.761598][T32164] __x64_sys_memfd_create+0x2a2/0x470 [ 1236.761614][T32164] ? memfd_fcntl+0x1580/0x1580 [ 1236.761630][T32164] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1236.761644][T32164] ? trace_hardirqs_off_caller+0x65/0x230 [ 1236.761656][T32164] ? trace_hardirqs_on+0x67/0x240 [ 1236.761672][T32164] do_syscall_64+0xfa/0x760 [ 1236.761685][T32164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.761694][T32164] RIP: 0033:0x459829 [ 1236.761709][T32164] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.761724][T32164] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:29:11 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1236.864863][T32164] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1236.872820][T32164] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1236.880781][T32164] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1236.888740][T32164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fe5fb06d4 [ 1236.896706][T32164] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:12 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:12 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1237.071240][T32188] overlayfs: missing 'lowerdir' [ 1237.085357][T32189] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:12 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 1237.112263][T32196] FAULT_INJECTION: forcing a failure. [ 1237.112263][T32196] name failslab, interval 1, probability 0, space 0, times 0 13:29:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1237.166451][T32196] CPU: 0 PID: 32196 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1237.175598][T32196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.185656][T32196] Call Trace: [ 1237.188968][T32196] dump_stack+0x172/0x1f0 [ 1237.193310][T32196] should_fail.cold+0xa/0x15 [ 1237.198035][T32196] ? __kasan_check_read+0x11/0x20 [ 1237.203066][T32196] ? fault_create_debugfs_attr+0x180/0x180 [ 1237.208855][T32196] ? page_to_nid.part.0+0x20/0x20 [ 1237.213861][T32196] ? ___might_sleep+0x163/0x280 [ 1237.218693][T32196] __should_failslab+0x121/0x190 [ 1237.223624][T32196] should_failslab+0x9/0x14 [ 1237.224803][T32204] IPVS: length: 144 != 8 [ 1237.228124][T32196] kmem_cache_alloc+0x2aa/0x710 [ 1237.228140][T32196] ? rwlock_bug.part.0+0x90/0x90 [ 1237.228164][T32196] ? __d_instantiate+0x82/0x470 [ 1237.246949][T32196] ? lock_downgrade+0x920/0x920 [ 1237.251788][T32196] __alloc_file+0x27/0x340 [ 1237.256211][T32196] alloc_empty_file+0x72/0x170 [ 1237.260965][T32196] alloc_file+0x5e/0x4d0 [ 1237.265187][T32196] alloc_file_pseudo+0x189/0x280 [ 1237.270113][T32196] ? alloc_file+0x4d0/0x4d0 [ 1237.274618][T32196] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1237.280898][T32196] __shmem_file_setup.part.0+0x108/0x2b0 [ 1237.286509][T32196] shmem_file_setup+0x66/0x90 [ 1237.291167][T32196] __x64_sys_memfd_create+0x2a2/0x470 [ 1237.296529][T32196] ? memfd_fcntl+0x1580/0x1580 [ 1237.301279][T32196] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1237.307353][T32196] ? trace_hardirqs_off_caller+0x65/0x230 [ 1237.313049][T32196] ? trace_hardirqs_on+0x67/0x240 [ 1237.318066][T32196] do_syscall_64+0xfa/0x760 [ 1237.322570][T32196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1237.328436][T32196] RIP: 0033:0x459829 [ 1237.332310][T32196] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.352255][T32196] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:29:12 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1237.360644][T32196] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1237.368589][T32196] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1237.376536][T32196] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1237.384483][T32196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fe5fb06d4 [ 1237.392427][T32196] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:12 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 1237.547226][T32214] overlayfs: missing 'lowerdir' 13:29:12 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1237.592360][T32218] FAULT_INJECTION: forcing a failure. [ 1237.592360][T32218] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.655354][T32218] CPU: 1 PID: 32218 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1237.664505][T32218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.674563][T32218] Call Trace: [ 1237.674594][T32218] dump_stack+0x172/0x1f0 [ 1237.674616][T32218] should_fail.cold+0xa/0x15 [ 1237.674634][T32218] ? fault_create_debugfs_attr+0x180/0x180 [ 1237.674650][T32218] ? page_to_nid.part.0+0x20/0x20 [ 1237.674677][T32218] ? ___might_sleep+0x163/0x280 [ 1237.686833][T32218] __should_failslab+0x121/0x190 [ 1237.686851][T32218] should_failslab+0x9/0x14 [ 1237.686871][T32218] kmem_cache_alloc+0x2aa/0x710 [ 1237.716735][T32218] ? memcg_kmem_put_cache+0x3e/0x50 [ 1237.721939][T32218] ? kmem_cache_alloc+0x314/0x710 [ 1237.727007][T32218] security_file_alloc+0x39/0x170 [ 1237.732035][T32218] __alloc_file+0xde/0x340 [ 1237.732051][T32218] alloc_empty_file+0x72/0x170 [ 1237.732067][T32218] alloc_file+0x5e/0x4d0 [ 1237.732084][T32218] alloc_file_pseudo+0x189/0x280 [ 1237.732104][T32218] ? alloc_file+0x4d0/0x4d0 [ 1237.742988][T32223] gfs2: quota_quantum mount option requires a positive numeric argument [ 1237.745482][T32218] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1237.745504][T32218] __shmem_file_setup.part.0+0x108/0x2b0 [ 1237.745522][T32218] shmem_file_setup+0x66/0x90 [ 1237.745545][T32218] __x64_sys_memfd_create+0x2a2/0x470 [ 1237.755057][T32218] ? memfd_fcntl+0x1580/0x1580 [ 1237.755074][T32218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1237.755094][T32218] ? trace_hardirqs_off_caller+0x65/0x230 [ 1237.796039][T32218] ? trace_hardirqs_on+0x67/0x240 [ 1237.796058][T32218] do_syscall_64+0xfa/0x760 [ 1237.796078][T32218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1237.796095][T32218] RIP: 0033:0x459829 [ 1237.805156][T32231] overlayfs: unrecognized mount option "lowerdir" or missing value [ 1237.806809][T32218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:29:12 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:12 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1237.806817][T32218] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1237.806831][T32218] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1237.806839][T32218] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1237.806848][T32218] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1237.806856][T32218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fe5fb06d4 [ 1237.806864][T32218] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1237.928740][T32235] IPVS: length: 144 != 8 13:29:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:13 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:13 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1238.092684][T32249] FAULT_INJECTION: forcing a failure. [ 1238.092684][T32249] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.117736][T32247] overlayfs: unrecognized mount option "lowerdir" or missing value [ 1238.126246][T32248] gfs2: quota_quantum mount option requires a positive numeric argument [ 1238.138722][T32249] CPU: 0 PID: 32249 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1238.147845][T32249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.157906][T32249] Call Trace: [ 1238.161246][T32249] dump_stack+0x172/0x1f0 [ 1238.165589][T32249] should_fail.cold+0xa/0x15 [ 1238.170190][T32249] ? fault_create_debugfs_attr+0x180/0x180 [ 1238.175998][T32249] ? unwind_get_return_address+0x61/0xa0 [ 1238.181630][T32249] ? profile_setup.cold+0xbb/0xbb [ 1238.186659][T32249] ? ___might_sleep+0x163/0x280 13:29:13 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1238.191520][T32249] __should_failslab+0x121/0x190 [ 1238.196460][T32249] should_failslab+0x9/0x14 [ 1238.200968][T32249] __kmalloc+0x2e0/0x770 [ 1238.205230][T32249] ? mark_held_locks+0xf0/0xf0 [ 1238.209990][T32249] ? stack_trace_save+0xac/0xe0 [ 1238.214086][T32257] IPVS: length: 144 != 8 [ 1238.214849][T32249] ? stack_trace_consume_entry+0x190/0x190 [ 1238.214866][T32249] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1238.214894][T32249] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1238.236396][T32249] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1238.241920][T32249] ? tomoyo_path_perm+0x1cb/0x430 [ 1238.246928][T32249] tomoyo_path_perm+0x230/0x430 [ 1238.251774][T32249] ? tomoyo_path_perm+0x1cb/0x430 [ 1238.256777][T32249] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1238.262824][T32249] ? __fget+0x35d/0x560 [ 1238.266962][T32249] ? __kasan_check_read+0x11/0x20 [ 1238.271965][T32249] ? __kasan_check_read+0x11/0x20 [ 1238.276968][T32249] ? __fget+0xa3/0x560 [ 1238.281048][T32249] ? lock_acquire+0x190/0x410 [ 1238.285705][T32249] ? do_sys_ftruncate+0x282/0x550 [ 1238.290707][T32249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.296929][T32249] tomoyo_path_truncate+0x1d/0x30 [ 1238.301942][T32249] security_path_truncate+0xf2/0x150 [ 1238.307217][T32249] do_sys_ftruncate+0x3d9/0x550 [ 1238.312051][T32249] __x64_sys_ftruncate+0x59/0x80 [ 1238.317143][T32249] do_syscall_64+0xfa/0x760 [ 1238.321651][T32249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.327529][T32249] RIP: 0033:0x4597f7 [ 1238.331400][T32249] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.351078][T32249] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1238.359469][T32249] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1238.367430][T32249] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1238.375378][T32249] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1238.383325][T32249] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 13:29:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:13 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1238.391271][T32249] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1238.419161][T32249] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:13 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1238.493411][T32249] gfs2: not a GFS2 filesystem 13:29:13 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1238.576634][T32271] overlayfs: unrecognized mount option "lowerdir" or missing value 13:29:13 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:13 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1238.651567][T32277] gfs2: quota_quantum mount option requires a positive numeric argument [ 1238.684747][T32274] IPVS: length: 144 != 8 [ 1238.726193][T32286] FAULT_INJECTION: forcing a failure. [ 1238.726193][T32286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1238.739519][T32286] CPU: 1 PID: 32286 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1238.748621][T32286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.758700][T32286] Call Trace: [ 1238.761993][T32286] dump_stack+0x172/0x1f0 [ 1238.766305][T32286] should_fail.cold+0xa/0x15 [ 1238.770872][T32286] ? fault_create_debugfs_attr+0x180/0x180 [ 1238.776666][T32286] ? is_bpf_text_address+0xac/0x170 [ 1238.781857][T32286] ? __kasan_check_read+0x11/0x20 [ 1238.786861][T32286] should_fail_alloc_page+0x50/0x60 [ 1238.792037][T32286] __alloc_pages_nodemask+0x1a1/0x900 [ 1238.797405][T32286] ? __bpf_address_lookup+0x310/0x310 [ 1238.802758][T32286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1238.808457][T32286] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1238.814154][T32286] ? kernel_text_address+0x73/0xf0 [ 1238.819256][T32286] ? fault_create_debugfs_attr+0x180/0x180 [ 1238.825088][T32286] cache_grow_begin+0x90/0xd20 [ 1238.829850][T32286] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1238.835553][T32286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1238.841793][T32286] __kmalloc+0x6b2/0x770 [ 1238.846017][T32286] ? mark_held_locks+0xf0/0xf0 [ 1238.850762][T32286] ? stack_trace_save+0xac/0xe0 [ 1238.855590][T32286] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1238.861297][T32286] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1238.866831][T32286] ? tomoyo_path_perm+0x1cb/0x430 [ 1238.871832][T32286] tomoyo_path_perm+0x230/0x430 [ 1238.876666][T32286] ? tomoyo_path_perm+0x1cb/0x430 [ 1238.881671][T32286] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1238.887713][T32286] ? __fget+0x35d/0x560 [ 1238.891846][T32286] ? __kasan_check_read+0x11/0x20 [ 1238.896865][T32286] ? __kasan_check_read+0x11/0x20 [ 1238.901888][T32286] ? __fget+0xa3/0x560 [ 1238.905953][T32286] ? lock_acquire+0x190/0x410 [ 1238.910607][T32286] ? do_sys_ftruncate+0x282/0x550 [ 1238.915611][T32286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.921917][T32286] tomoyo_path_truncate+0x1d/0x30 [ 1238.926924][T32286] security_path_truncate+0xf2/0x150 [ 1238.932186][T32286] do_sys_ftruncate+0x3d9/0x550 [ 1238.937014][T32286] __x64_sys_ftruncate+0x59/0x80 [ 1238.941931][T32286] do_syscall_64+0xfa/0x760 [ 1238.946419][T32286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.952292][T32286] RIP: 0033:0x4597f7 [ 1238.956163][T32286] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:29:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\xff\xff\xff8\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1238.975743][T32286] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1238.984132][T32286] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1238.992107][T32286] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1239.000063][T32286] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1239.008023][T32286] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1239.015993][T32286] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:14 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1239.092131][T32286] gfs2: not a GFS2 filesystem [ 1239.111163][T32291] overlayfs: failed to resolve 'f': -2 13:29:14 executing program 1 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:14 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1239.268969][T32301] IPVS: length: 144 != 8 13:29:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:14 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1239.362611][T32310] overlayfs: failed to resolve 'f': -2 [ 1239.376765][T32307] gfs2: quota_quantum mount option requires a positive numeric argument [ 1239.385025][T32316] FAULT_INJECTION: forcing a failure. [ 1239.385025][T32316] name failslab, interval 1, probability 0, space 0, times 0 13:29:14 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1239.458558][T32316] CPU: 0 PID: 32316 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1239.467717][T32316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.479294][T32316] Call Trace: [ 1239.482596][T32316] dump_stack+0x172/0x1f0 [ 1239.486950][T32316] should_fail.cold+0xa/0x15 [ 1239.491544][T32316] ? __kasan_check_read+0x11/0x20 [ 1239.496573][T32316] ? fault_create_debugfs_attr+0x180/0x180 [ 1239.502369][T32316] ? __kasan_check_write+0x14/0x20 13:29:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1239.507465][T32316] ? lock_downgrade+0x920/0x920 [ 1239.512327][T32316] ? ___might_sleep+0x163/0x280 [ 1239.517156][T32316] __should_failslab+0x121/0x190 [ 1239.522073][T32316] should_failslab+0x9/0x14 [ 1239.526552][T32316] __kmalloc+0x2e0/0x770 [ 1239.530776][T32316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.537008][T32316] ? simple_dname+0xd1/0x1f0 [ 1239.541604][T32316] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1239.546967][T32316] tomoyo_encode2.part.0+0xf5/0x400 [ 1239.552209][T32316] tomoyo_encode+0x2b/0x50 [ 1239.556606][T32316] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1239.562234][T32316] ? tomoyo_path_perm+0x1cb/0x430 [ 1239.567238][T32316] tomoyo_path_perm+0x230/0x430 [ 1239.572065][T32316] ? tomoyo_path_perm+0x1cb/0x430 [ 1239.577071][T32316] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1239.582424][T32327] IPVS: length: 144 != 8 [ 1239.583135][T32316] ? __fget+0x35d/0x560 [ 1239.591499][T32316] ? __kasan_check_read+0x11/0x20 [ 1239.596501][T32316] ? __kasan_check_read+0x11/0x20 [ 1239.601505][T32316] ? __fget+0xa3/0x560 [ 1239.605559][T32316] ? lock_acquire+0x190/0x410 [ 1239.610717][T32316] ? do_sys_ftruncate+0x282/0x550 [ 1239.615725][T32316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.627314][T32316] tomoyo_path_truncate+0x1d/0x30 [ 1239.632329][T32316] security_path_truncate+0xf2/0x150 [ 1239.637612][T32316] do_sys_ftruncate+0x3d9/0x550 [ 1239.642466][T32316] __x64_sys_ftruncate+0x59/0x80 [ 1239.647386][T32316] do_syscall_64+0xfa/0x760 [ 1239.651871][T32316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1239.657747][T32316] RIP: 0033:0x4597f7 [ 1239.661632][T32316] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1239.681215][T32316] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1239.689605][T32316] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1239.697553][T32316] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1239.705502][T32316] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1239.713452][T32316] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1239.721399][T32316] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1239.734572][T32316] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1239.782505][T32316] gfs2: not a GFS2 filesystem 13:29:14 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1239.841940][T32340] overlayfs: failed to resolve 'f': -2 13:29:14 executing program 1 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1239.964405][T32342] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:15 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1240.012577][T32348] FAULT_INJECTION: forcing a failure. [ 1240.012577][T32348] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.051137][T32348] CPU: 1 PID: 32348 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1240.060288][T32348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.064104][T32352] IPVS: length: 144 != 8 [ 1240.070345][T32348] Call Trace: [ 1240.070376][T32348] dump_stack+0x172/0x1f0 [ 1240.070399][T32348] should_fail.cold+0xa/0x15 [ 1240.070417][T32348] ? is_bpf_text_address+0xd3/0x170 [ 1240.070444][T32348] ? fault_create_debugfs_attr+0x180/0x180 [ 1240.070471][T32348] ? page_to_nid.part.0+0x20/0x20 [ 1240.102858][T32348] ? ___might_sleep+0x163/0x280 [ 1240.107717][T32348] __should_failslab+0x121/0x190 13:29:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1240.112664][T32348] should_failslab+0x9/0x14 [ 1240.117196][T32348] kmem_cache_alloc+0x2aa/0x710 [ 1240.118262][T32357] overlayfs: failed to resolve 'fil': -2 [ 1240.122054][T32348] ? stack_trace_save+0xac/0xe0 [ 1240.122068][T32348] ? stack_trace_consume_entry+0x190/0x190 [ 1240.122085][T32348] __alloc_file+0x27/0x340 [ 1240.122101][T32348] alloc_empty_file+0x72/0x170 [ 1240.122117][T32348] path_openat+0xef/0x4630 [ 1240.122140][T32348] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1240.157684][T32348] ? kasan_slab_alloc+0xf/0x20 [ 1240.162426][T32348] ? kmem_cache_alloc+0x121/0x710 [ 1240.167427][T32348] ? getname_flags+0xd6/0x5b0 [ 1240.172122][T32348] ? getname+0x1a/0x20 [ 1240.176168][T32348] ? do_sys_open+0x2c9/0x5d0 [ 1240.180792][T32348] ? __x64_sys_open+0x7e/0xc0 [ 1240.185454][T32348] ? do_syscall_64+0xfa/0x760 [ 1240.190112][T32348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.196160][T32348] ? lock_downgrade+0x920/0x920 [ 1240.200992][T32348] ? current_time+0x6b/0x140 [ 1240.205562][T32348] ? __kasan_check_read+0x11/0x20 [ 1240.210569][T32348] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1240.215920][T32348] ? shmem_setattr+0x4c7/0xc80 [ 1240.220663][T32348] ? __kasan_check_read+0x11/0x20 [ 1240.225670][T32348] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1240.231289][T32348] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1240.236988][T32348] do_filp_open+0x1a1/0x280 [ 1240.241474][T32348] ? may_open_dev+0x100/0x100 [ 1240.246137][T32348] ? lock_downgrade+0x920/0x920 [ 1240.250977][T32348] ? rwlock_bug.part.0+0x90/0x90 [ 1240.255898][T32348] ? __alloc_fd+0x35/0x620 [ 1240.260296][T32348] ? __kasan_check_read+0x11/0x20 [ 1240.265302][T32348] ? do_raw_spin_unlock+0x57/0x270 [ 1240.270399][T32348] ? _raw_spin_unlock+0x2d/0x50 [ 1240.275230][T32348] ? __alloc_fd+0x487/0x620 [ 1240.279714][T32348] do_sys_open+0x3fe/0x5d0 [ 1240.284139][T32348] ? filp_open+0x80/0x80 [ 1240.288376][T32348] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1240.294614][T32348] ? fput+0x1b/0x20 [ 1240.298413][T32348] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1240.304533][T32348] __x64_sys_open+0x7e/0xc0 [ 1240.309019][T32348] do_syscall_64+0xfa/0x760 [ 1240.313506][T32348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.319377][T32348] RIP: 0033:0x413711 [ 1240.323248][T32348] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1240.342837][T32348] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1240.351242][T32348] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 13:29:15 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:15 executing program 1 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1240.359198][T32348] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1240.367155][T32348] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1240.375107][T32348] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1240.383066][T32348] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:15 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1240.492533][T32364] FAULT_INJECTION: forcing a failure. [ 1240.492533][T32364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1240.513414][T32364] CPU: 1 PID: 32364 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1240.522530][T32364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.532591][T32364] Call Trace: [ 1240.535900][T32364] dump_stack+0x172/0x1f0 [ 1240.540252][T32364] should_fail.cold+0xa/0x15 [ 1240.544850][T32364] ? fault_create_debugfs_attr+0x180/0x180 [ 1240.550660][T32364] ? rwlock_bug.part.0+0x90/0x90 [ 1240.555604][T32364] ? current_time+0x6b/0x140 [ 1240.560201][T32364] should_fail_alloc_page+0x50/0x60 [ 1240.565410][T32364] __alloc_pages_nodemask+0x1a1/0x900 [ 1240.570790][T32364] ? __kasan_check_read+0x11/0x20 [ 1240.570807][T32364] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1240.570819][T32364] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1240.570831][T32364] ? __kasan_check_read+0x11/0x20 [ 1240.570851][T32364] ? fault_create_debugfs_attr+0x180/0x180 [ 1240.570866][T32364] cache_grow_begin+0x90/0xd20 [ 1240.570879][T32364] ? getname_flags+0xd6/0x5b0 [ 1240.570894][T32364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1240.570916][T32364] kmem_cache_alloc+0x64e/0x710 [ 1240.581643][T32364] ? __kasan_check_write+0x14/0x20 [ 1240.581659][T32364] getname_flags+0xd6/0x5b0 [ 1240.581675][T32364] getname+0x1a/0x20 [ 1240.601116][T32371] gfs2: quota_quantum mount option requires a positive numeric argument [ 1240.602833][T32364] do_sys_open+0x2c9/0x5d0 [ 1240.602853][T32364] ? filp_open+0x80/0x80 [ 1240.646066][T32373] overlayfs: failed to resolve 'fil': -2 [ 1240.648973][T32364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1240.648991][T32364] ? fput+0x1b/0x20 [ 1240.649008][T32364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1240.649022][T32364] __x64_sys_open+0x7e/0xc0 [ 1240.649038][T32364] do_syscall_64+0xfa/0x760 [ 1240.649054][T32364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.649063][T32364] RIP: 0033:0x413711 13:29:15 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 13:29:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1240.649079][T32364] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1240.649094][T32364] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1240.717494][T32364] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1240.725467][T32364] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1240.733445][T32364] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 13:29:15 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1240.741424][T32364] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1240.749412][T32364] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1240.839056][T32364] gfs2: not a GFS2 filesystem [ 1240.876008][T32388] overlayfs: failed to resolve 'fil': -2 13:29:16 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:16 executing program 1 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1240.955050][T32392] IPVS: length: 144 != 8 13:29:16 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 13:29:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:16 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1241.091260][T32394] gfs2: quota_quantum mount option requires a positive numeric argument [ 1241.091859][T32404] FAULT_INJECTION: forcing a failure. [ 1241.091859][T32404] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.144934][T32408] overlayfs: failed to resolve 'file': -2 [ 1241.150919][T32404] CPU: 1 PID: 32404 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1241.160035][T32404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.170102][T32404] Call Trace: [ 1241.173396][T32404] dump_stack+0x172/0x1f0 [ 1241.177730][T32404] should_fail.cold+0xa/0x15 [ 1241.182334][T32404] ? is_bpf_text_address+0xd3/0x170 [ 1241.187542][T32404] ? fault_create_debugfs_attr+0x180/0x180 13:29:16 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 13:29:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1241.193354][T32404] ? page_to_nid.part.0+0x20/0x20 [ 1241.198387][T32404] ? ___might_sleep+0x163/0x280 [ 1241.203249][T32404] __should_failslab+0x121/0x190 [ 1241.208194][T32404] should_failslab+0x9/0x14 [ 1241.212702][T32404] kmem_cache_alloc+0x2aa/0x710 [ 1241.217826][T32404] ? stack_trace_save+0xac/0xe0 [ 1241.222677][T32404] ? stack_trace_consume_entry+0x190/0x190 [ 1241.228479][T32404] __alloc_file+0x27/0x340 [ 1241.232877][T32404] alloc_empty_file+0x72/0x170 [ 1241.237623][T32404] path_openat+0xef/0x4630 [ 1241.242017][T32404] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1241.247797][T32404] ? kasan_slab_alloc+0xf/0x20 [ 1241.252555][T32404] ? kmem_cache_alloc+0x121/0x710 [ 1241.257580][T32404] ? getname_flags+0xd6/0x5b0 [ 1241.262235][T32404] ? getname+0x1a/0x20 [ 1241.266281][T32404] ? do_sys_open+0x2c9/0x5d0 [ 1241.270935][T32404] ? __x64_sys_open+0x7e/0xc0 [ 1241.275600][T32404] ? do_syscall_64+0xfa/0x760 [ 1241.280266][T32404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.286341][T32404] ? __isolate_free_page+0x4c0/0x4c0 [ 1241.291644][T32404] ? __kasan_check_read+0x11/0x20 [ 1241.296664][T32404] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1241.302017][T32404] ? __kasan_check_read+0x11/0x20 [ 1241.307032][T32404] ? __alloc_pages_nodemask+0x578/0x900 [ 1241.312577][T32404] ? cache_grow_end+0xa4/0x190 [ 1241.317323][T32404] ? __kasan_check_read+0x11/0x20 [ 1241.322328][T32404] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1241.328026][T32404] do_filp_open+0x1a1/0x280 [ 1241.332506][T32404] ? may_open_dev+0x100/0x100 [ 1241.337164][T32404] ? lock_downgrade+0x920/0x920 [ 1241.341993][T32404] ? rwlock_bug.part.0+0x90/0x90 [ 1241.346910][T32404] ? __alloc_fd+0x35/0x620 [ 1241.351308][T32404] ? __kasan_check_read+0x11/0x20 [ 1241.356309][T32404] ? do_raw_spin_unlock+0x57/0x270 [ 1241.361665][T32404] ? _raw_spin_unlock+0x2d/0x50 [ 1241.366506][T32404] ? __alloc_fd+0x487/0x620 [ 1241.371010][T32404] do_sys_open+0x3fe/0x5d0 [ 1241.375415][T32404] ? filp_open+0x80/0x80 [ 1241.379663][T32404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1241.385894][T32404] ? fput+0x1b/0x20 [ 1241.389682][T32404] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1241.395728][T32404] __x64_sys_open+0x7e/0xc0 [ 1241.400223][T32404] do_syscall_64+0xfa/0x760 [ 1241.404721][T32404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.410589][T32404] RIP: 0033:0x413711 [ 1241.414464][T32404] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1241.434218][T32404] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:29:16 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1241.442603][T32404] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1241.450561][T32404] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1241.458509][T32404] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1241.466471][T32404] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1241.474957][T32404] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:16 executing program 1 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1241.636189][T32416] IPVS: length: 144 != 8 [ 1241.650528][T32424] overlayfs: failed to resolve 'file': -2 13:29:16 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:16 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, 0x0, 0x0) 13:29:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1241.720292][T32429] FAULT_INJECTION: forcing a failure. [ 1241.720292][T32429] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.723050][T32427] gfs2: quota_quantum mount option requires a positive numeric argument [ 1241.758969][T32429] CPU: 1 PID: 32429 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 13:29:16 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1241.768104][T32429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.778161][T32429] Call Trace: [ 1241.781484][T32429] dump_stack+0x172/0x1f0 [ 1241.785828][T32429] should_fail.cold+0xa/0x15 [ 1241.790423][T32429] ? fault_create_debugfs_attr+0x180/0x180 [ 1241.796241][T32429] ? ___might_sleep+0x163/0x280 [ 1241.801093][T32429] __should_failslab+0x121/0x190 [ 1241.801111][T32429] should_failslab+0x9/0x14 [ 1241.801124][T32429] __kmalloc+0x2e0/0x770 [ 1241.801140][T32429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.801155][T32429] ? d_absolute_path+0x11b/0x170 [ 1241.801166][T32429] ? __d_path+0x140/0x140 [ 1241.801181][T32429] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1241.801200][T32429] tomoyo_encode2.part.0+0xf5/0x400 [ 1241.814874][T32429] tomoyo_encode+0x2b/0x50 [ 1241.814890][T32429] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1241.814907][T32429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1241.814927][T32429] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1241.830398][T32429] ? tomoyo_path_number_perm+0x520/0x520 13:29:16 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1241.830433][T32429] ? lock_downgrade+0x920/0x920 [ 1241.830455][T32429] ? rwlock_bug.part.0+0x90/0x90 [ 1241.830475][T32429] ? lockref_get+0x16/0x60 [ 1241.841021][T32429] tomoyo_file_open+0xa9/0xd0 [ 1241.841040][T32429] security_file_open+0x71/0x300 [ 1241.841055][T32429] do_dentry_open+0x373/0x1250 [ 1241.841069][T32429] ? match_exception_partial+0x242/0x2d0 [ 1241.841083][T32429] ? chown_common+0x5c0/0x5c0 [ 1241.841100][T32429] ? inode_permission+0xb4/0x560 [ 1241.841118][T32429] vfs_open+0xa0/0xd0 13:29:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1241.905090][T32436] overlayfs: failed to resolve 'file': -2 [ 1241.907602][T32429] path_openat+0x10e9/0x4630 [ 1241.907618][T32429] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1241.907632][T32429] ? kasan_slab_alloc+0xf/0x20 [ 1241.907651][T32429] ? kmem_cache_alloc+0x121/0x710 [ 1241.942368][T32429] ? getname_flags+0xd6/0x5b0 [ 1241.947033][T32429] ? getname+0x1a/0x20 [ 1241.951092][T32429] ? do_sys_open+0x2c9/0x5d0 [ 1241.955669][T32429] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1241.961020][T32429] ? shmem_setattr+0x4c7/0xc80 [ 1241.965766][T32429] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1241.971397][T32429] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1241.977104][T32429] do_filp_open+0x1a1/0x280 [ 1241.981610][T32429] ? may_open_dev+0x100/0x100 [ 1241.986284][T32429] ? __kasan_check_read+0x11/0x20 [ 1241.991288][T32429] ? do_raw_spin_unlock+0x57/0x270 [ 1241.996398][T32429] ? _raw_spin_unlock+0x2d/0x50 [ 1242.001228][T32429] ? __alloc_fd+0x487/0x620 [ 1242.005712][T32429] do_sys_open+0x3fe/0x5d0 [ 1242.010105][T32429] ? filp_open+0x80/0x80 [ 1242.014327][T32429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1242.020546][T32429] ? fput+0x1b/0x20 [ 1242.024359][T32429] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1242.030405][T32429] __x64_sys_open+0x7e/0xc0 [ 1242.034888][T32429] do_syscall_64+0xfa/0x760 [ 1242.039373][T32429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.045244][T32429] RIP: 0033:0x413711 [ 1242.049140][T32429] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1242.068724][T32429] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1242.077115][T32429] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1242.085068][T32429] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1242.093027][T32429] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1242.101011][T32429] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1242.108963][T32429] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1242.117768][T32429] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1242.223687][T32429] gfs2: not a GFS2 filesystem [ 1242.247895][T32440] IPVS: length: 144 != 8 13:29:17 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, 0x0, 0x0) 13:29:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:17 executing program 1 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1242.356322][T32455] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:17 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:17 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r0, 0x0, 0x0) 13:29:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1242.525738][T32468] FAULT_INJECTION: forcing a failure. [ 1242.525738][T32468] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.612214][T32473] IPVS: length: 144 != 8 [ 1242.627574][T32468] CPU: 1 PID: 32468 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1242.636717][T32468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.646778][T32468] Call Trace: [ 1242.650897][T32468] dump_stack+0x172/0x1f0 [ 1242.655247][T32468] should_fail.cold+0xa/0x15 13:29:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1242.659852][T32468] ? fault_create_debugfs_attr+0x180/0x180 [ 1242.665663][T32468] ? kernel_text_address+0x73/0xf0 [ 1242.670785][T32468] ? ___might_sleep+0x163/0x280 [ 1242.675651][T32468] __should_failslab+0x121/0x190 [ 1242.680590][T32468] should_failslab+0x9/0x14 [ 1242.685106][T32468] __kmalloc+0x2e0/0x770 [ 1242.689368][T32468] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1242.695096][T32468] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1242.700641][T32468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1242.706884][T32468] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1242.712778][T32468] ? tomoyo_path_number_perm+0x520/0x520 [ 1242.712812][T32468] ? lock_downgrade+0x920/0x920 [ 1242.712826][T32468] ? rwlock_bug.part.0+0x90/0x90 [ 1242.712839][T32468] ? lockref_get+0x16/0x60 [ 1242.712854][T32468] tomoyo_file_open+0xa9/0xd0 [ 1242.712880][T32468] security_file_open+0x71/0x300 [ 1242.723332][T32468] do_dentry_open+0x373/0x1250 [ 1242.723347][T32468] ? match_exception_partial+0x242/0x2d0 [ 1242.723363][T32468] ? chown_common+0x5c0/0x5c0 [ 1242.723384][T32468] ? inode_permission+0xb4/0x560 13:29:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) [ 1242.754893][T32484] gfs2: quota_quantum mount option requires a positive numeric argument [ 1242.757302][T32468] vfs_open+0xa0/0xd0 [ 1242.757321][T32468] path_openat+0x10e9/0x4630 [ 1242.757336][T32468] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1242.757356][T32468] ? kasan_slab_alloc+0xf/0x20 [ 1242.789665][T32468] ? kmem_cache_alloc+0x121/0x710 [ 1242.794695][T32468] ? getname_flags+0xd6/0x5b0 [ 1242.799367][T32468] ? getname+0x1a/0x20 [ 1242.803462][T32468] ? do_sys_open+0x2c9/0x5d0 [ 1242.808040][T32468] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1242.813394][T32468] ? __alloc_pages_nodemask+0x578/0x900 [ 1242.818925][T32468] ? cache_grow_end+0xa4/0x190 [ 1242.823679][T32468] ? __kasan_check_read+0x11/0x20 [ 1242.828693][T32468] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1242.834421][T32468] do_filp_open+0x1a1/0x280 [ 1242.838927][T32468] ? may_open_dev+0x100/0x100 [ 1242.843596][T32468] ? __kasan_check_read+0x11/0x20 [ 1242.848598][T32468] ? do_raw_spin_unlock+0x57/0x270 [ 1242.853704][T32468] ? _raw_spin_unlock+0x2d/0x50 [ 1242.858533][T32468] ? __alloc_fd+0x487/0x620 [ 1242.863020][T32468] do_sys_open+0x3fe/0x5d0 [ 1242.867417][T32468] ? filp_open+0x80/0x80 [ 1242.871646][T32468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1242.877885][T32468] ? fput+0x1b/0x20 [ 1242.881675][T32468] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1242.887724][T32468] __x64_sys_open+0x7e/0xc0 [ 1242.892209][T32468] do_syscall_64+0xfa/0x760 [ 1242.896698][T32468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.902564][T32468] RIP: 0033:0x413711 [ 1242.906453][T32468] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1242.926052][T32468] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1242.934462][T32468] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1242.942414][T32468] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1242.950369][T32468] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 13:29:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1242.958334][T32468] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1242.966303][T32468] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1242.974933][T32468] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:18 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1243.065053][T32468] gfs2: not a GFS2 filesystem 13:29:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:18 executing program 1 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1243.272194][T32507] IPVS: length: 144 != 8 [ 1243.297744][T32508] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:18 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/214, 0xd6) 13:29:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1243.408772][T32522] FAULT_INJECTION: forcing a failure. [ 1243.408772][T32522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1243.422010][T32522] CPU: 1 PID: 32522 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1243.431117][T32522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.441174][T32522] Call Trace: [ 1243.444486][T32522] dump_stack+0x172/0x1f0 [ 1243.448837][T32522] should_fail.cold+0xa/0x15 [ 1243.453430][T32522] ? fault_create_debugfs_attr+0x180/0x180 [ 1243.459244][T32522] ? lock_downgrade+0x920/0x920 [ 1243.459261][T32522] should_fail_alloc_page+0x50/0x60 [ 1243.459275][T32522] __alloc_pages_nodemask+0x1a1/0x900 [ 1243.459294][T32522] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1243.480893][T32522] ? kernel_text_address+0x73/0xf0 [ 1243.480911][T32522] ? unwind_get_return_address+0x61/0xa0 [ 1243.480931][T32522] ? profile_setup.cold+0xbb/0xbb [ 1243.496674][T32522] ? fault_create_debugfs_attr+0x180/0x180 [ 1243.496700][T32522] cache_grow_begin+0x90/0xd20 [ 1243.507244][T32522] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1243.512973][T32522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1243.519226][T32522] __kmalloc+0x6b2/0x770 [ 1243.523496][T32522] ? mark_held_locks+0xf0/0xf0 [ 1243.528284][T32522] ? kasan_slab_alloc+0xf/0x20 [ 1243.533067][T32522] ? getname_flags+0xd6/0x5b0 [ 1243.537743][T32522] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1243.543473][T32522] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1243.549021][T32522] ? tomoyo_path_number_perm+0x193/0x520 [ 1243.549040][T32522] tomoyo_path_number_perm+0x1dd/0x520 [ 1243.549051][T32522] ? tomoyo_path_number_perm+0x193/0x520 [ 1243.549066][T32522] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1243.549080][T32522] ? __kasan_check_read+0x11/0x20 [ 1243.549099][T32522] ? __kasan_check_read+0x11/0x20 [ 1243.549124][T32522] ? __fget+0x384/0x560 [ 1243.549143][T32522] ? ksys_dup3+0x3e0/0x3e0 [ 1243.571627][T32522] ? do_sys_open+0x31d/0x5d0 [ 1243.571646][T32522] tomoyo_file_ioctl+0x23/0x30 [ 1243.571662][T32522] security_file_ioctl+0x77/0xc0 [ 1243.571677][T32522] ksys_ioctl+0x57/0xd0 13:29:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1243.571692][T32522] __x64_sys_ioctl+0x73/0xb0 [ 1243.571708][T32522] do_syscall_64+0xfa/0x760 [ 1243.571727][T32522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1243.571744][T32522] RIP: 0033:0x459697 [ 1243.594884][T32522] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.594893][T32522] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:29:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) [ 1243.594906][T32522] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1243.594921][T32522] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1243.627989][T32522] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1243.627997][T32522] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1243.628005][T32522] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1243.661812][T32531] IPVS: length: 144 != 8 13:29:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1243.718194][T32522] gfs2: not a GFS2 filesystem [ 1243.733654][T32542] gfs2: quota_quantum mount option requires a positive numeric argument [ 1243.856001][T32555] overlayfs: overlapping lowerdir path 13:29:18 executing program 1 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:18 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) [ 1243.951486][T32560] FAULT_INJECTION: forcing a failure. [ 1243.951486][T32560] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.981000][T32562] gfs2: quota_quantum mount option requires a positive numeric argument [ 1243.989917][T32560] CPU: 0 PID: 32560 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1243.999034][T32560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.009085][T32560] Call Trace: [ 1244.012391][T32560] dump_stack+0x172/0x1f0 [ 1244.016737][T32560] should_fail.cold+0xa/0x15 [ 1244.021337][T32560] ? fault_create_debugfs_attr+0x180/0x180 [ 1244.027149][T32560] ? ___might_sleep+0x163/0x280 [ 1244.032008][T32560] __should_failslab+0x121/0x190 [ 1244.036965][T32560] should_failslab+0x9/0x14 [ 1244.041477][T32560] __kmalloc+0x2e0/0x770 [ 1244.045729][T32560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1244.051983][T32560] ? d_absolute_path+0x11b/0x170 [ 1244.056929][T32560] ? __d_path+0x140/0x140 [ 1244.061275][T32560] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1244.066657][T32560] tomoyo_encode2.part.0+0xf5/0x400 [ 1244.071859][T32560] tomoyo_encode+0x2b/0x50 [ 1244.076278][T32560] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1244.081917][T32560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1244.088260][T32560] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1244.094154][T32560] ? tomoyo_path_number_perm+0x520/0x520 [ 1244.099815][T32560] ? lock_downgrade+0x920/0x920 [ 1244.104692][T32560] ? rwlock_bug.part.0+0x90/0x90 [ 1244.109639][T32560] ? lockref_get+0x16/0x60 [ 1244.113548][T32575] IPVS: length: 144 != 8 [ 1244.114062][T32560] tomoyo_file_open+0xa9/0xd0 [ 1244.114081][T32560] security_file_open+0x71/0x300 [ 1244.114097][T32560] do_dentry_open+0x373/0x1250 [ 1244.114122][T32560] ? match_exception_partial+0x242/0x2d0 [ 1244.138310][T32560] ? chown_common+0x5c0/0x5c0 [ 1244.143021][T32560] ? inode_permission+0xb4/0x560 [ 1244.147971][T32560] vfs_open+0xa0/0xd0 13:29:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/214, 0xd6) 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1244.151969][T32560] path_openat+0x10e9/0x4630 [ 1244.156557][T32560] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1244.162361][T32560] ? kasan_slab_alloc+0xf/0x20 [ 1244.167124][T32560] ? kmem_cache_alloc+0x121/0x710 [ 1244.172151][T32560] ? getname_flags+0xd6/0x5b0 [ 1244.176823][T32560] ? getname+0x1a/0x20 [ 1244.180891][T32560] ? do_sys_open+0x2c9/0x5d0 [ 1244.185494][T32560] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1244.190870][T32560] ? __alloc_pages_nodemask+0x578/0x900 [ 1244.196448][T32560] ? cache_grow_end+0xa4/0x190 13:29:19 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1244.201215][T32560] ? __kasan_check_read+0x11/0x20 [ 1244.206247][T32560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1244.211970][T32560] do_filp_open+0x1a1/0x280 [ 1244.216476][T32560] ? may_open_dev+0x100/0x100 [ 1244.221158][T32560] ? __kasan_check_read+0x11/0x20 [ 1244.226190][T32560] ? do_raw_spin_unlock+0x57/0x270 [ 1244.231307][T32560] ? _raw_spin_unlock+0x2d/0x50 [ 1244.236159][T32560] ? __alloc_fd+0x487/0x620 [ 1244.240669][T32560] do_sys_open+0x3fe/0x5d0 [ 1244.245084][T32560] ? filp_open+0x80/0x80 [ 1244.249331][T32560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1244.255577][T32560] ? fput+0x1b/0x20 [ 1244.259393][T32560] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1244.265458][T32560] __x64_sys_open+0x7e/0xc0 [ 1244.269227][T32583] overlayfs: overlapping lowerdir path [ 1244.269971][T32560] do_syscall_64+0xfa/0x760 [ 1244.269989][T32560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1244.270000][T32560] RIP: 0033:0x413711 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:19 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1244.270015][T32560] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1244.270029][T32560] RSP: 002b:00007f6fe5fafa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1244.317722][T32560] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1244.325693][T32560] RDX: 00007f6fe5fafb0a RSI: 0000000000000002 RDI: 00007f6fe5fafb00 [ 1244.333662][T32560] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1244.341629][T32560] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1244.349600][T32560] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:19 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1244.381022][T32560] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1244.404388][T32590] overlayfs: overlapping lowerdir path [ 1244.515722][T32560] gfs2: not a GFS2 filesystem 13:29:19 executing program 1 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:19 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 1244.597920][T32600] IPVS: length: 144 != 8 13:29:19 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:19 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1244.684621][T32610] overlayfs: overlapping lowerdir path [ 1244.711195][T32608] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 13:29:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1244.804248][T32618] FAULT_INJECTION: forcing a failure. [ 1244.804248][T32618] name failslab, interval 1, probability 0, space 0, times 0 13:29:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1244.903669][T32625] IPVS: length: 144 != 8 13:29:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 1244.947478][T32632] overlayfs: overlapping lowerdir path [ 1244.972729][T32635] gfs2: quota_quantum mount option requires a positive numeric argument [ 1245.020458][T32618] CPU: 0 PID: 32618 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1245.029610][T32618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.039665][T32618] Call Trace: [ 1245.042974][T32618] dump_stack+0x172/0x1f0 [ 1245.047323][T32618] should_fail.cold+0xa/0x15 [ 1245.051948][T32618] ? fault_create_debugfs_attr+0x180/0x180 [ 1245.057762][T32618] ? ___might_sleep+0x163/0x280 [ 1245.062616][T32618] __should_failslab+0x121/0x190 [ 1245.067557][T32618] should_failslab+0x9/0x14 [ 1245.072059][T32618] __kmalloc+0x2e0/0x770 [ 1245.076292][T32618] ? mark_held_locks+0xf0/0xf0 [ 1245.081035][T32618] ? kasan_slab_alloc+0xf/0x20 [ 1245.085777][T32618] ? kmem_cache_alloc+0x121/0x710 [ 1245.090819][T32618] ? getname_flags+0xd6/0x5b0 [ 1245.095472][T32618] ? getname+0x1a/0x20 [ 1245.099520][T32618] ? do_sys_open+0x2c9/0x5d0 [ 1245.104089][T32618] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1245.109789][T32618] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1245.115336][T32618] ? tomoyo_path_number_perm+0x193/0x520 [ 1245.120954][T32618] tomoyo_path_number_perm+0x1dd/0x520 [ 1245.126406][T32618] ? tomoyo_path_number_perm+0x193/0x520 [ 1245.132016][T32618] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1245.137798][T32618] ? __kasan_check_read+0x11/0x20 [ 1245.142819][T32618] ? __kasan_check_read+0x11/0x20 [ 1245.147828][T32618] ? __fget+0x384/0x560 [ 1245.151963][T32618] ? ksys_dup3+0x3e0/0x3e0 [ 1245.156372][T32618] ? do_sys_open+0x31d/0x5d0 [ 1245.160950][T32618] tomoyo_file_ioctl+0x23/0x30 [ 1245.165702][T32618] security_file_ioctl+0x77/0xc0 [ 1245.170617][T32618] ksys_ioctl+0x57/0xd0 [ 1245.174751][T32618] __x64_sys_ioctl+0x73/0xb0 [ 1245.179319][T32618] do_syscall_64+0xfa/0x760 [ 1245.183819][T32618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1245.189685][T32618] RIP: 0033:0x459697 [ 1245.193577][T32618] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1245.213155][T32618] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1245.221540][T32618] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1245.229486][T32618] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1245.237433][T32618] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1245.245384][T32618] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1245.253346][T32618] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1245.267210][T32618] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1245.361387][T32618] gfs2: not a GFS2 filesystem 13:29:20 executing program 1 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:20 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:20 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:20 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 13:29:20 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1245.483647][T32656] overlayfs: overlapping lowerdir path [ 1245.495736][T32664] gfs2: quota_quantum mount option requires a positive numeric argument [ 1245.514778][T32660] IPVS: length: 144 != 8 13:29:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:20 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1245.603294][T32670] FAULT_INJECTION: forcing a failure. [ 1245.603294][T32670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1245.617168][T32670] CPU: 0 PID: 32670 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1245.626264][T32670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.626278][T32670] Call Trace: [ 1245.639625][T32670] dump_stack+0x172/0x1f0 [ 1245.643967][T32670] should_fail.cold+0xa/0x15 [ 1245.648569][T32670] ? fault_create_debugfs_attr+0x180/0x180 [ 1245.654378][T32670] ? lock_downgrade+0x920/0x920 [ 1245.659231][T32670] should_fail_alloc_page+0x50/0x60 [ 1245.665005][T32670] __alloc_pages_nodemask+0x1a1/0x900 [ 1245.670391][T32670] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1245.676107][T32670] ? kernel_text_address+0x73/0xf0 [ 1245.676125][T32670] ? unwind_get_return_address+0x61/0xa0 [ 1245.676146][T32670] ? profile_setup.cold+0xbb/0xbb [ 1245.691875][T32670] ? fault_create_debugfs_attr+0x180/0x180 [ 1245.697688][T32670] cache_grow_begin+0x90/0xd20 13:29:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1245.702458][T32670] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1245.708185][T32670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1245.714429][T32670] __kmalloc+0x6b2/0x770 [ 1245.714445][T32670] ? mark_held_locks+0xf0/0xf0 [ 1245.714459][T32670] ? kasan_slab_alloc+0xf/0x20 [ 1245.714478][T32670] ? getname_flags+0xd6/0x5b0 [ 1245.724972][T32676] IPVS: length: 144 != 8 [ 1245.728215][T32670] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1245.728232][T32670] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1245.728245][T32670] ? tomoyo_path_number_perm+0x193/0x520 [ 1245.728270][T32670] tomoyo_path_number_perm+0x1dd/0x520 [ 1245.748392][T32670] ? tomoyo_path_number_perm+0x193/0x520 [ 1245.748409][T32670] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1245.748430][T32670] ? __kasan_check_read+0x11/0x20 [ 1245.775929][T32670] ? __kasan_check_read+0x11/0x20 [ 1245.780984][T32670] ? __fget+0x384/0x560 [ 1245.785150][T32670] ? ksys_dup3+0x3e0/0x3e0 [ 1245.789566][T32670] ? do_sys_open+0x31d/0x5d0 [ 1245.794162][T32670] tomoyo_file_ioctl+0x23/0x30 [ 1245.798935][T32670] security_file_ioctl+0x77/0xc0 13:29:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1245.803888][T32670] ksys_ioctl+0x57/0xd0 [ 1245.808050][T32670] __x64_sys_ioctl+0x73/0xb0 [ 1245.812647][T32670] do_syscall_64+0xfa/0x760 [ 1245.817154][T32670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1245.823100][T32670] RIP: 0033:0x459697 [ 1245.826998][T32670] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:29:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1245.846603][T32670] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1245.846617][T32670] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1245.846624][T32670] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1245.846631][T32670] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1245.846648][T32670] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1245.870966][T32670] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1245.897748][T32670] gfs2: not a GFS2 filesystem 13:29:21 executing program 1 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clock_settime(0x315947138d9ca769, &(0x7f0000000040)={0x77359400}) 13:29:21 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1245.950704][T32688] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:21 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0000000042f75359b03018608036b6070000000007003f00407d66ad7587f02d45543682fff80000402f508270"]}) 13:29:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1246.161867][T32705] FAULT_INJECTION: forcing a failure. [ 1246.161867][T32705] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.200370][T32701] IPVS: length: 144 != 8 13:29:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:21 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1246.215117][T32705] CPU: 0 PID: 32705 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1246.224263][T32705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.234326][T32705] Call Trace: [ 1246.237638][T32705] dump_stack+0x172/0x1f0 [ 1246.241990][T32705] should_fail.cold+0xa/0x15 [ 1246.246586][T32705] ? fault_create_debugfs_attr+0x180/0x180 [ 1246.252393][T32705] ? ___might_sleep+0x163/0x280 [ 1246.252412][T32705] __should_failslab+0x121/0x190 13:29:21 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000140)) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/83, 0x53}], 0x1) [ 1246.252436][T32705] should_failslab+0x9/0x14 [ 1246.266700][T32705] __kmalloc+0x2e0/0x770 [ 1246.270954][T32705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.277196][T32705] ? d_absolute_path+0x11b/0x170 [ 1246.282136][T32705] ? __d_path+0x140/0x140 [ 1246.286469][T32705] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1246.291841][T32705] tomoyo_encode2.part.0+0xf5/0x400 [ 1246.291857][T32705] tomoyo_encode+0x2b/0x50 [ 1246.291878][T32705] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1246.307093][T32705] tomoyo_path_number_perm+0x1dd/0x520 [ 1246.307114][T32705] ? tomoyo_path_number_perm+0x193/0x520 [ 1246.318194][T32705] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1246.324010][T32705] ? __kasan_check_read+0x11/0x20 [ 1246.329045][T32705] ? __kasan_check_read+0x11/0x20 [ 1246.334084][T32705] ? __fget+0x384/0x560 [ 1246.338253][T32705] ? ksys_dup3+0x3e0/0x3e0 [ 1246.342675][T32705] ? do_sys_open+0x31d/0x5d0 [ 1246.347269][T32705] tomoyo_file_ioctl+0x23/0x30 [ 1246.352032][T32705] security_file_ioctl+0x77/0xc0 [ 1246.352048][T32705] ksys_ioctl+0x57/0xd0 [ 1246.352064][T32705] __x64_sys_ioctl+0x73/0xb0 [ 1246.352081][T32705] do_syscall_64+0xfa/0x760 [ 1246.352103][T32705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.365749][T32705] RIP: 0033:0x459697 [ 1246.379994][T32705] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.399599][T32705] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1246.408014][T32705] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 13:29:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1246.415987][T32705] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1246.423959][T32705] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1246.431928][T32705] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1246.439910][T32705] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1246.450040][T32705] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:21 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1246.471995][T32718] gfs2: quota_quantum mount option requires a positive numeric argument [ 1246.472821][T32705] gfs2: not a GFS2 filesystem 13:29:21 executing program 1 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:21 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1246.736199][T32747] IPVS: length: 144 != 8 13:29:21 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1246.786277][T32753] gfs2: quota_quantum mount option requires a positive numeric argument [ 1246.797164][T32756] FAULT_INJECTION: forcing a failure. [ 1246.797164][T32756] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.814935][T32756] CPU: 0 PID: 32756 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1246.824059][T32756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.834111][T32756] Call Trace: [ 1246.837414][T32756] dump_stack+0x172/0x1f0 [ 1246.841754][T32756] should_fail.cold+0xa/0x15 [ 1246.846354][T32756] ? __blkdev_get+0x19b/0x1660 [ 1246.851121][T32756] ? fault_create_debugfs_attr+0x180/0x180 [ 1246.856928][T32756] ? page_to_nid.part.0+0x20/0x20 [ 1246.861962][T32756] ? ___might_sleep+0x163/0x280 [ 1246.866816][T32756] __should_failslab+0x121/0x190 [ 1246.871756][T32756] should_failslab+0x9/0x14 [ 1246.876254][T32756] kmem_cache_alloc_trace+0x2d3/0x790 [ 1246.881625][T32756] ? lockdep_init_map+0x1be/0x6d0 [ 1246.886686][T32756] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1246.892143][T32756] __kthread_create_on_node+0xf2/0x460 [ 1246.897604][T32756] ? lock_acquire+0x190/0x410 [ 1246.902278][T32756] ? __kthread_parkme+0x1c0/0x1c0 [ 1246.907305][T32756] ? loop_set_fd+0xb5/0x10c0 [ 1246.911893][T32756] ? mutex_lock_io_nested+0x1260/0x1260 [ 1246.917435][T32756] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1246.922891][T32756] kthread_create_on_node+0xbb/0xf0 [ 1246.928087][T32756] ? __kthread_create_on_node+0x460/0x460 [ 1246.933810][T32756] ? lockdep_init_map+0x1be/0x6d0 [ 1246.938828][T32756] ? lockdep_init_map+0x1be/0x6d0 [ 1246.943863][T32756] loop_set_fd+0x342/0x10c0 [ 1246.948371][T32756] lo_ioctl+0x1a3/0x1460 [ 1246.952610][T32756] ? trace_hardirqs_on+0x67/0x240 [ 1246.957633][T32756] ? loop_set_fd+0x10c0/0x10c0 [ 1246.962398][T32756] blkdev_ioctl+0xedb/0x1c1a [ 1246.966988][T32756] ? blkpg_ioctl+0xa90/0xa90 [ 1246.971580][T32756] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1246.977384][T32756] ? __kasan_check_read+0x11/0x20 [ 1246.982414][T32756] ? __kasan_check_read+0x11/0x20 [ 1246.987437][T32756] block_ioctl+0xee/0x130 [ 1246.991770][T32756] ? blkdev_fallocate+0x410/0x410 [ 1246.996793][T32756] do_vfs_ioctl+0xdb6/0x13e0 [ 1247.001384][T32756] ? ioctl_preallocate+0x210/0x210 [ 1247.006500][T32756] ? __fget+0x384/0x560 [ 1247.010662][T32756] ? ksys_dup3+0x3e0/0x3e0 [ 1247.015078][T32756] ? do_sys_open+0x31d/0x5d0 [ 1247.019672][T32756] ? tomoyo_file_ioctl+0x23/0x30 [ 1247.024614][T32756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.030856][T32756] ? security_file_ioctl+0x8d/0xc0 [ 1247.035976][T32756] ksys_ioctl+0xab/0xd0 [ 1247.040134][T32756] __x64_sys_ioctl+0x73/0xb0 [ 1247.044718][T32756] do_syscall_64+0xfa/0x760 [ 1247.049203][T32756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.055075][T32756] RIP: 0033:0x459697 [ 1247.058975][T32756] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1247.078574][T32756] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1247.086961][T32756] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1247.094909][T32756] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1247.102855][T32756] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1247.110810][T32756] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1247.118762][T32756] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:22 executing program 1 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1247.152359][T32759] overlayfs: overlapping lowerdir path 13:29:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:22 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:22 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:22 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1247.274946][T32766] FAULT_INJECTION: forcing a failure. [ 1247.274946][T32766] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.316427][T32766] CPU: 1 PID: 32766 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1247.325587][T32766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.335636][T32766] Call Trace: [ 1247.338936][T32766] dump_stack+0x172/0x1f0 [ 1247.343278][T32766] should_fail.cold+0xa/0x15 [ 1247.347868][T32766] ? blkdev_ioctl+0xedb/0x1c1a [ 1247.352631][T32766] ? fault_create_debugfs_attr+0x180/0x180 [ 1247.358439][T32766] ? page_to_nid.part.0+0x20/0x20 [ 1247.363473][T32766] ? ___might_sleep+0x163/0x280 [ 1247.368329][T32766] __should_failslab+0x121/0x190 [ 1247.373270][T32766] should_failslab+0x9/0x14 [ 1247.377773][T32766] kmem_cache_alloc+0x2aa/0x710 [ 1247.382629][T32766] ? kvm_clock_read+0x18/0x30 [ 1247.387302][T32766] ? kvm_sched_clock_read+0x9/0x20 [ 1247.392433][T32766] __kernfs_new_node+0xf0/0x6c0 [ 1247.397292][T32766] ? __kasan_check_read+0x11/0x20 [ 1247.402322][T32766] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1247.407779][T32766] ? x2apic_send_IPI+0xb6/0x110 [ 1247.412632][T32766] ? __enqueue_entity+0x142/0x390 [ 1247.417658][T32766] kernfs_new_node+0x96/0x120 [ 1247.422343][T32766] kernfs_create_dir_ns+0x52/0x160 [ 1247.427481][T32766] internal_create_group+0x7f4/0xc30 [ 1247.432764][T32766] ? bd_set_size+0x3f/0xb0 [ 1247.437190][T32766] ? remove_files.isra.0+0x190/0x190 [ 1247.442486][T32766] ? __down_timeout+0x2d0/0x2d0 [ 1247.447342][T32766] ? __kasan_check_write+0x14/0x20 [ 1247.452455][T32766] ? up_write+0x9d/0x280 [ 1247.456709][T32766] sysfs_create_group+0x20/0x30 [ 1247.461561][T32766] loop_set_fd+0xb3b/0x10c0 [ 1247.466070][T32766] lo_ioctl+0x1a3/0x1460 [ 1247.470314][T32766] ? trace_hardirqs_on+0x67/0x240 [ 1247.476024][T32766] ? loop_set_fd+0x10c0/0x10c0 [ 1247.480795][T32766] blkdev_ioctl+0xedb/0x1c1a [ 1247.485386][T32766] ? blkpg_ioctl+0xa90/0xa90 [ 1247.489980][T32766] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1247.495785][T32766] ? __kasan_check_read+0x11/0x20 [ 1247.500814][T32766] ? __kasan_check_read+0x11/0x20 [ 1247.505841][T32766] block_ioctl+0xee/0x130 [ 1247.510171][T32766] ? blkdev_fallocate+0x410/0x410 [ 1247.515196][T32766] do_vfs_ioctl+0xdb6/0x13e0 [ 1247.519791][T32766] ? ioctl_preallocate+0x210/0x210 [ 1247.524900][T32766] ? __fget+0x384/0x560 [ 1247.529059][T32766] ? ksys_dup3+0x3e0/0x3e0 [ 1247.533476][T32766] ? do_sys_open+0x31d/0x5d0 [ 1247.538065][T32766] ? tomoyo_file_ioctl+0x23/0x30 [ 1247.543004][T32766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.549246][T32766] ? security_file_ioctl+0x8d/0xc0 [ 1247.554359][T32766] ksys_ioctl+0xab/0xd0 [ 1247.558512][T32766] __x64_sys_ioctl+0x73/0xb0 [ 1247.563106][T32766] do_syscall_64+0xfa/0x760 [ 1247.567613][T32766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.573498][T32766] RIP: 0033:0x459697 [ 1247.577393][T32766] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1247.597016][T32766] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1247.605428][T32766] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 13:29:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="c9c3aa93b57f5c68fa38ab15739827d361ea12e58728faef24a24459aa652edc3d44777c558380cd48e555a26711107cfdceada4495673996e5af51095248ca704485687386122baf7cbb6e7a9078fdffc4b54feb042d9e78ef6a9276423cc0743b0f8071cf43bf80ef0f2e05726f3d4f631aa9d5ec4b15ebc78bf3a41547195a53ccb3405c3014ed405857a1d7c63d329e0c24da2817bcdab52b6113e385eaa711a0153c2c7fa3d97128949fd4db553d3bde303cb3ada9496e6769eb72f171cb96468a15cbe18768546afa18343a30362160a1e23e0fd68002c1073f3114490bc2ac34a1eaddfb448bbcf2df51e0fe555fa617c3a05e12e23a0067f4afdc599") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1247.613901][T32766] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1247.621875][T32766] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1247.629860][T32766] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1247.637826][T32766] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1247.668550][T32766] gfs2: not a GFS2 filesystem [ 1247.731483][ T310] overlayfs: overlapping lowerdir path 13:29:22 executing program 1 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:22 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1247.800697][ T313] IPVS: length: 144 != 8 [ 1247.806427][ T309] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:22 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:22 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1247.972913][ T328] FAULT_INJECTION: forcing a failure. [ 1247.972913][ T328] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.985598][ T328] CPU: 1 PID: 328 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1247.994529][ T328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.004586][ T328] Call Trace: [ 1248.007890][ T328] dump_stack+0x172/0x1f0 [ 1248.012243][ T328] should_fail.cold+0xa/0x15 [ 1248.016836][ T328] ? fault_create_debugfs_attr+0x180/0x180 [ 1248.022640][ T328] ? stack_trace_save+0xac/0xe0 [ 1248.027493][ T328] __should_failslab+0x121/0x190 [ 1248.032432][ T328] should_failslab+0x9/0x14 [ 1248.036941][ T328] kmem_cache_alloc+0x47/0x710 [ 1248.041710][ T328] ? save_stack+0x5c/0x90 [ 1248.046033][ T328] ? save_stack+0x23/0x90 [ 1248.050361][ T328] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1248.056166][ T328] ? kasan_slab_alloc+0xf/0x20 [ 1248.060937][ T328] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1248.067263][ T328] idr_get_free+0x48e/0x8c0 13:29:23 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1248.071946][ T328] idr_alloc_u32+0x19e/0x330 [ 1248.076540][ T328] ? __fprop_inc_percpu_max+0x230/0x230 [ 1248.082092][ T328] ? fault_create_debugfs_attr+0x180/0x180 [ 1248.087903][ T328] ? mark_held_locks+0xf0/0xf0 [ 1248.092666][ T328] ? page_to_nid.part.0+0x20/0x20 [ 1248.097692][ T328] idr_alloc_cyclic+0x132/0x270 [ 1248.102803][ T328] ? idr_alloc+0x150/0x150 [ 1248.107232][ T328] __kernfs_new_node+0x172/0x6c0 [ 1248.112179][ T328] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1248.117643][ T328] ? trace_hardirqs_on+0x67/0x240 [ 1248.122673][ T328] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1248.127872][ T328] ? __schedule+0xfc4/0x15b0 [ 1248.132470][ T328] ? __sched_text_start+0x8/0x8 [ 1248.137321][ T328] kernfs_new_node+0x96/0x120 [ 1248.142001][ T328] kernfs_create_dir_ns+0x52/0x160 [ 1248.147115][ T328] internal_create_group+0x7f4/0xc30 [ 1248.152409][ T328] ? bd_set_size+0x3f/0xb0 [ 1248.156836][ T328] ? remove_files.isra.0+0x190/0x190 [ 1248.162121][ T328] ? __down_timeout+0x2d0/0x2d0 [ 1248.166972][ T328] ? __kasan_check_write+0x14/0x20 [ 1248.172086][ T328] ? up_write+0x9d/0x280 [ 1248.176329][ T328] sysfs_create_group+0x20/0x30 [ 1248.181184][ T328] loop_set_fd+0xb3b/0x10c0 [ 1248.185691][ T328] lo_ioctl+0x1a3/0x1460 [ 1248.189965][ T328] ? trace_hardirqs_on+0x67/0x240 [ 1248.194992][ T328] ? loop_set_fd+0x10c0/0x10c0 [ 1248.199759][ T328] blkdev_ioctl+0xedb/0x1c1a [ 1248.204349][ T328] ? blkpg_ioctl+0xa90/0xa90 [ 1248.208942][ T328] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1248.214747][ T328] ? __kasan_check_read+0x11/0x20 13:29:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="c9c3aa93b57f5c68fa38ab15739827d361ea12e58728faef24a24459aa652edc3d44777c558380cd48e555a26711107cfdceada4495673996e5af51095248ca704485687386122baf7cbb6e7a9078fdffc4b54feb042d9e78ef6a9276423cc0743b0f8071cf43bf80ef0f2e05726f3d4f631aa9d5ec4b15ebc78bf3a41547195a53ccb3405c3014ed405857a1d7c63d329e0c24da2817bcdab52b6113e385eaa711a0153c2c7fa3d97128949fd4db553d3bde303cb3ada9496e6769eb72f171cb96468a15cbe18768546afa18343a30362160a1e23e0fd68002c1073f3114490bc2ac34a1eaddfb448bbcf2df51e0fe555fa617c3a05e12e23a0067f4afdc599") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1248.219774][ T328] ? __kasan_check_read+0x11/0x20 [ 1248.224799][ T328] block_ioctl+0xee/0x130 [ 1248.229125][ T328] ? blkdev_fallocate+0x410/0x410 [ 1248.234146][ T328] do_vfs_ioctl+0xdb6/0x13e0 [ 1248.238738][ T328] ? ioctl_preallocate+0x210/0x210 [ 1248.243846][ T328] ? __fget+0x384/0x560 [ 1248.248012][ T328] ? ksys_dup3+0x3e0/0x3e0 [ 1248.252430][ T328] ? do_sys_open+0x31d/0x5d0 [ 1248.257022][ T328] ? tomoyo_file_ioctl+0x23/0x30 [ 1248.261965][ T328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.268210][ T328] ? security_file_ioctl+0x8d/0xc0 [ 1248.273324][ T328] ksys_ioctl+0xab/0xd0 [ 1248.277487][ T328] __x64_sys_ioctl+0x73/0xb0 [ 1248.282072][ T328] do_syscall_64+0xfa/0x760 [ 1248.286579][ T328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.292496][ T328] RIP: 0033:0x459697 [ 1248.296381][ T328] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.315961][ T328] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1248.324347][ T328] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1248.332296][ T328] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1248.340243][ T328] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1248.348190][ T328] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1248.356139][ T328] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1248.409395][ T328] gfs2: not a GFS2 filesystem 13:29:23 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1248.447356][ T338] IPVS: length: 144 != 8 13:29:23 executing program 1 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1248.494813][ T343] overlayfs: overlapping lowerdir path 13:29:23 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:23 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1248.617303][ T357] FAULT_INJECTION: forcing a failure. [ 1248.617303][ T357] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.663613][ T357] CPU: 1 PID: 357 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1248.672579][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.682633][ T357] Call Trace: [ 1248.685940][ T357] dump_stack+0x172/0x1f0 [ 1248.690280][ T357] should_fail.cold+0xa/0x15 [ 1248.694876][ T357] ? fault_create_debugfs_attr+0x180/0x180 [ 1248.700712][ T357] ? page_to_nid.part.0+0x20/0x20 [ 1248.705737][ T357] ? ___might_sleep+0x163/0x280 [ 1248.710588][ T357] __should_failslab+0x121/0x190 [ 1248.715523][ T357] should_failslab+0x9/0x14 [ 1248.720021][ T357] kmem_cache_alloc+0x2aa/0x710 [ 1248.724864][ T357] ? kernfs_activate+0x192/0x1f0 [ 1248.729796][ T357] ? __kasan_check_read+0x11/0x20 [ 1248.734819][ T357] ? __mutex_lock+0x45d/0x13c0 [ 1248.739580][ T357] __kernfs_new_node+0xf0/0x6c0 [ 1248.744425][ T357] ? __mutex_lock+0x45d/0x13c0 [ 1248.749221][ T357] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1248.754708][ T357] ? __kasan_check_write+0x14/0x20 [ 1248.759818][ T357] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1248.765358][ T357] ? wait_for_completion+0x440/0x440 [ 1248.770641][ T357] kernfs_new_node+0x96/0x120 [ 1248.775324][ T357] __kernfs_create_file+0x51/0x33b [ 1248.780434][ T357] sysfs_add_file_mode_ns+0x222/0x560 [ 1248.785809][ T357] internal_create_group+0x359/0xc30 [ 1248.791088][ T357] ? bd_set_size+0x3f/0xb0 [ 1248.795506][ T357] ? remove_files.isra.0+0x190/0x190 [ 1248.800788][ T357] ? __down_timeout+0x2d0/0x2d0 [ 1248.805642][ T357] ? __kasan_check_write+0x14/0x20 [ 1248.810752][ T357] ? up_write+0x9d/0x280 [ 1248.814996][ T357] sysfs_create_group+0x20/0x30 [ 1248.819842][ T357] loop_set_fd+0xb3b/0x10c0 [ 1248.824366][ T357] lo_ioctl+0x1a3/0x1460 [ 1248.828605][ T357] ? trace_hardirqs_on+0x67/0x240 [ 1248.833624][ T357] ? loop_set_fd+0x10c0/0x10c0 [ 1248.838383][ T357] blkdev_ioctl+0xedb/0x1c1a [ 1248.842976][ T357] ? blkpg_ioctl+0xa90/0xa90 [ 1248.847562][ T357] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1248.853366][ T357] ? __kasan_check_read+0x11/0x20 [ 1248.858392][ T357] ? __kasan_check_read+0x11/0x20 [ 1248.863449][ T357] block_ioctl+0xee/0x130 [ 1248.867798][ T357] ? blkdev_fallocate+0x410/0x410 [ 1248.872821][ T357] do_vfs_ioctl+0xdb6/0x13e0 [ 1248.877397][ T357] ? ioctl_preallocate+0x210/0x210 [ 1248.882492][ T357] ? __fget+0x384/0x560 [ 1248.887754][ T357] ? ksys_dup3+0x3e0/0x3e0 [ 1248.892148][ T357] ? do_sys_open+0x31d/0x5d0 [ 1248.896802][ T357] ? tomoyo_file_ioctl+0x23/0x30 [ 1248.901715][ T357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.907934][ T357] ? security_file_ioctl+0x8d/0xc0 [ 1248.913043][ T357] ksys_ioctl+0xab/0xd0 [ 1248.917189][ T357] __x64_sys_ioctl+0x73/0xb0 [ 1248.921758][ T357] do_syscall_64+0xfa/0x760 [ 1248.926236][ T357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.932100][ T357] RIP: 0033:0x459697 [ 1248.935972][ T357] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.955560][ T357] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:29:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1248.963957][ T357] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1248.971912][ T357] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1248.979882][ T357] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1248.987831][ T357] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1248.995781][ T357] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1249.018173][ T357] gfs2: not a GFS2 filesystem 13:29:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1249.040016][ T363] overlayfs: overlapping lowerdir path 13:29:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:24 executing program 1 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1249.192232][ T378] overlayfs: overlapping lowerdir path [ 1249.210123][ T372] IPVS: length: 144 != 8 13:29:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:24 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1249.342790][ T385] FAULT_INJECTION: forcing a failure. [ 1249.342790][ T385] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.356576][ T385] CPU: 1 PID: 385 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1249.365520][ T385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.375572][ T385] Call Trace: [ 1249.378880][ T385] dump_stack+0x172/0x1f0 [ 1249.383220][ T385] should_fail.cold+0xa/0x15 [ 1249.387812][ T385] ? fault_create_debugfs_attr+0x180/0x180 [ 1249.393620][ T385] ? page_to_nid.part.0+0x20/0x20 [ 1249.398645][ T385] ? ___might_sleep+0x163/0x280 [ 1249.403500][ T385] __should_failslab+0x121/0x190 [ 1249.408449][ T385] should_failslab+0x9/0x14 [ 1249.412952][ T385] kmem_cache_alloc+0x2aa/0x710 [ 1249.417803][ T385] ? __mutex_lock+0x45d/0x13c0 [ 1249.422569][ T385] __kernfs_new_node+0xf0/0x6c0 [ 1249.427422][ T385] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1249.432887][ T385] ? wait_for_completion+0x440/0x440 [ 1249.438172][ T385] ? __kasan_check_write+0x14/0x20 [ 1249.443285][ T385] ? mutex_unlock+0xd/0x10 [ 1249.447709][ T385] ? kernfs_activate+0x192/0x1f0 [ 1249.452647][ T385] kernfs_new_node+0x96/0x120 [ 1249.457329][ T385] __kernfs_create_file+0x51/0x33b [ 1249.462440][ T385] sysfs_add_file_mode_ns+0x222/0x560 [ 1249.467817][ T385] internal_create_group+0x359/0xc30 [ 1249.473105][ T385] ? bd_set_size+0x3f/0xb0 [ 1249.478092][ T385] ? remove_files.isra.0+0x190/0x190 [ 1249.483386][ T385] ? __down_timeout+0x2d0/0x2d0 [ 1249.488262][ T385] ? __kasan_check_write+0x14/0x20 [ 1249.493374][ T385] ? up_write+0x9d/0x280 [ 1249.497617][ T385] sysfs_create_group+0x20/0x30 [ 1249.502474][ T385] loop_set_fd+0xb3b/0x10c0 [ 1249.506984][ T385] lo_ioctl+0x1a3/0x1460 [ 1249.511226][ T385] ? trace_hardirqs_on+0x67/0x240 [ 1249.516248][ T385] ? loop_set_fd+0x10c0/0x10c0 [ 1249.521008][ T385] blkdev_ioctl+0xedb/0x1c1a [ 1249.525598][ T385] ? blkpg_ioctl+0xa90/0xa90 [ 1249.530189][ T385] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1249.535992][ T385] ? __kasan_check_read+0x11/0x20 13:29:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\xff\xff\xff8\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1249.541024][ T385] ? __kasan_check_read+0x11/0x20 [ 1249.546052][ T385] block_ioctl+0xee/0x130 [ 1249.550382][ T385] ? blkdev_fallocate+0x410/0x410 [ 1249.555409][ T385] do_vfs_ioctl+0xdb6/0x13e0 [ 1249.560008][ T385] ? ioctl_preallocate+0x210/0x210 [ 1249.565124][ T385] ? __fget+0x384/0x560 [ 1249.569289][ T385] ? ksys_dup3+0x3e0/0x3e0 [ 1249.573712][ T385] ? do_sys_open+0x31d/0x5d0 [ 1249.578303][ T385] ? tomoyo_file_ioctl+0x23/0x30 [ 1249.583240][ T385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1249.589484][ T385] ? security_file_ioctl+0x8d/0xc0 [ 1249.594597][ T385] ksys_ioctl+0xab/0xd0 [ 1249.599101][ T385] __x64_sys_ioctl+0x73/0xb0 [ 1249.603702][ T385] do_syscall_64+0xfa/0x760 [ 1249.609698][ T385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1249.615587][ T385] RIP: 0033:0x459697 [ 1249.619482][ T385] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1249.639088][ T385] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1249.647497][ T385] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1249.655452][ T385] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1249.663976][ T385] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1249.671949][ T385] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1249.679904][ T385] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1249.726695][ T385] gfs2: not a GFS2 filesystem 13:29:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="c9c3aa93b57f5c68fa38ab15739827d361ea12e58728faef24a24459aa652edc3d44777c558380cd48e555a26711107cfdceada4495673996e5af51095248ca704485687386122baf7cbb6e7a9078fdffc4b54feb042d9e78ef6a9276423cc0743b0f8071cf43bf80ef0f2e05726f3d4f631aa9d5ec4b15ebc78bf3a41547195a53ccb3405c3014ed405857a1d7c63d329e0c24da2817bcdab52b6113e385eaa711a0153c2c7fa3d97128949fd4db553d3bde303cb3ada9496e6769eb72f171cb96468a15cbe18768546afa18343a30362160a1e23e0fd68002c1073f3114490bc2ac34a1eaddfb448bbcf2df51e0fe555fa617c3a05e12e23a0067f4afdc599") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1249.776625][ T397] overlayfs: overlapping lowerdir path 13:29:24 executing program 1 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1249.866013][ T401] IPVS: length: 144 != 8 13:29:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:25 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1250.005620][ T416] FAULT_INJECTION: forcing a failure. [ 1250.005620][ T416] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.050069][ T416] CPU: 0 PID: 416 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1250.059035][ T416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.069082][ T416] Call Trace: [ 1250.072381][ T416] dump_stack+0x172/0x1f0 [ 1250.076715][ T416] should_fail.cold+0xa/0x15 [ 1250.081312][ T416] ? fault_create_debugfs_attr+0x180/0x180 [ 1250.087116][ T416] ? page_to_nid.part.0+0x20/0x20 [ 1250.092140][ T416] ? ___might_sleep+0x163/0x280 [ 1250.096996][ T416] __should_failslab+0x121/0x190 [ 1250.101938][ T416] should_failslab+0x9/0x14 [ 1250.106447][ T416] kmem_cache_alloc+0x2aa/0x710 [ 1250.111298][ T416] ? __mutex_lock+0x45d/0x13c0 [ 1250.116064][ T416] __kernfs_new_node+0xf0/0x6c0 [ 1250.120916][ T416] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1250.126376][ T416] ? wait_for_completion+0x440/0x440 [ 1250.131761][ T416] ? __kasan_check_write+0x14/0x20 [ 1250.136875][ T416] ? mutex_unlock+0xd/0x10 [ 1250.141287][ T416] ? kernfs_activate+0x192/0x1f0 [ 1250.146222][ T416] kernfs_new_node+0x96/0x120 [ 1250.150900][ T416] __kernfs_create_file+0x51/0x33b [ 1250.156011][ T416] sysfs_add_file_mode_ns+0x222/0x560 [ 1250.161403][ T416] internal_create_group+0x359/0xc30 [ 1250.166684][ T416] ? bd_set_size+0x3f/0xb0 [ 1250.171105][ T416] ? remove_files.isra.0+0x190/0x190 [ 1250.176389][ T416] ? __down_timeout+0x2d0/0x2d0 [ 1250.181238][ T416] ? __kasan_check_write+0x14/0x20 [ 1250.186345][ T416] ? up_write+0x9d/0x280 [ 1250.190587][ T416] sysfs_create_group+0x20/0x30 [ 1250.195438][ T416] loop_set_fd+0xb3b/0x10c0 [ 1250.199953][ T416] lo_ioctl+0x1a3/0x1460 [ 1250.204191][ T416] ? trace_hardirqs_on+0x67/0x240 [ 1250.209212][ T416] ? loop_set_fd+0x10c0/0x10c0 [ 1250.213976][ T416] blkdev_ioctl+0xedb/0x1c1a [ 1250.218565][ T416] ? blkpg_ioctl+0xa90/0xa90 [ 1250.223155][ T416] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1250.228962][ T416] ? __kasan_check_read+0x11/0x20 [ 1250.233993][ T416] ? __kasan_check_read+0x11/0x20 [ 1250.239009][ T416] block_ioctl+0xee/0x130 [ 1250.243316][ T416] ? blkdev_fallocate+0x410/0x410 [ 1250.248318][ T416] do_vfs_ioctl+0xdb6/0x13e0 [ 1250.252884][ T416] ? ioctl_preallocate+0x210/0x210 [ 1250.257977][ T416] ? __fget+0x384/0x560 [ 1250.262111][ T416] ? ksys_dup3+0x3e0/0x3e0 [ 1250.266504][ T416] ? do_sys_open+0x31d/0x5d0 [ 1250.271075][ T416] ? tomoyo_file_ioctl+0x23/0x30 [ 1250.276104][ T416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1250.282325][ T416] ? security_file_ioctl+0x8d/0xc0 [ 1250.287414][ T416] ksys_ioctl+0xab/0xd0 [ 1250.291551][ T416] __x64_sys_ioctl+0x73/0xb0 [ 1250.296119][ T416] do_syscall_64+0xfa/0x760 [ 1250.300606][ T416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.306473][ T416] RIP: 0033:0x459697 [ 1250.310344][ T416] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1250.329932][ T416] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1250.338325][ T416] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 13:29:25 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1250.346275][ T416] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1250.354222][ T416] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1250.362170][ T416] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1250.370118][ T416] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0xffffffff, 0x4) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1250.423830][ T416] gfs2: not a GFS2 filesystem 13:29:25 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:25 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1250.503216][ T423] overlayfs: overlapping lowerdir path [ 1250.531114][ T438] IPVS: length: 144 != 8 13:29:25 executing program 1 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:25 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1250.722203][ T452] overlayfs: overlapping lowerdir path 13:29:25 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:25 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1250.819795][ T455] FAULT_INJECTION: forcing a failure. [ 1250.819795][ T455] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.838890][ T455] CPU: 1 PID: 455 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1250.847848][ T455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.857900][ T455] Call Trace: [ 1250.861207][ T455] dump_stack+0x172/0x1f0 [ 1250.861586][ T463] IPVS: length: 144 != 8 [ 1250.865572][ T455] should_fail.cold+0xa/0x15 [ 1250.874374][ T455] ? fault_create_debugfs_attr+0x180/0x180 [ 1250.880181][ T455] ? page_to_nid.part.0+0x20/0x20 [ 1250.885203][ T455] ? ___might_sleep+0x163/0x280 [ 1250.890057][ T455] __should_failslab+0x121/0x190 [ 1250.894996][ T455] should_failslab+0x9/0x14 [ 1250.899497][ T455] kmem_cache_alloc+0x2aa/0x710 [ 1250.904348][ T455] ? __mutex_lock+0x45d/0x13c0 [ 1250.909118][ T455] __kernfs_new_node+0xf0/0x6c0 [ 1250.913971][ T455] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1250.919432][ T455] ? wait_for_completion+0x440/0x440 [ 1250.924721][ T455] ? __kasan_check_write+0x14/0x20 [ 1250.929832][ T455] ? mutex_unlock+0xd/0x10 [ 1250.934246][ T455] ? kernfs_activate+0x192/0x1f0 [ 1250.939182][ T455] kernfs_new_node+0x96/0x120 [ 1250.943861][ T455] __kernfs_create_file+0x51/0x33b [ 1250.948973][ T455] sysfs_add_file_mode_ns+0x222/0x560 [ 1250.954350][ T455] internal_create_group+0x359/0xc30 [ 1250.959633][ T455] ? bd_set_size+0x3f/0xb0 [ 1250.964055][ T455] ? remove_files.isra.0+0x190/0x190 [ 1250.969338][ T455] ? __down_timeout+0x2d0/0x2d0 [ 1250.974190][ T455] ? __kasan_check_write+0x14/0x20 [ 1250.979302][ T455] ? up_write+0x9d/0x280 [ 1250.983545][ T455] sysfs_create_group+0x20/0x30 [ 1250.988394][ T455] loop_set_fd+0xb3b/0x10c0 [ 1250.992899][ T455] lo_ioctl+0x1a3/0x1460 [ 1250.997137][ T455] ? trace_hardirqs_on+0x67/0x240 [ 1251.002158][ T455] ? loop_set_fd+0x10c0/0x10c0 [ 1251.006918][ T455] blkdev_ioctl+0xedb/0x1c1a [ 1251.011507][ T455] ? blkpg_ioctl+0xa90/0xa90 [ 1251.016096][ T455] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1251.021904][ T455] ? __kasan_check_read+0x11/0x20 [ 1251.026930][ T455] ? __kasan_check_read+0x11/0x20 [ 1251.031964][ T455] block_ioctl+0xee/0x130 [ 1251.036292][ T455] ? blkdev_fallocate+0x410/0x410 [ 1251.041314][ T455] do_vfs_ioctl+0xdb6/0x13e0 [ 1251.045905][ T455] ? ioctl_preallocate+0x210/0x210 [ 1251.051012][ T455] ? __fget+0x384/0x560 [ 1251.055166][ T455] ? ksys_dup3+0x3e0/0x3e0 [ 1251.059581][ T455] ? do_sys_open+0x31d/0x5d0 [ 1251.064170][ T455] ? tomoyo_file_ioctl+0x23/0x30 [ 1251.069106][ T455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.075346][ T455] ? security_file_ioctl+0x8d/0xc0 [ 1251.080460][ T455] ksys_ioctl+0xab/0xd0 [ 1251.084614][ T455] __x64_sys_ioctl+0x73/0xb0 [ 1251.089202][ T455] do_syscall_64+0xfa/0x760 [ 1251.093707][ T455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.099586][ T455] RIP: 0033:0x459697 [ 1251.103476][ T455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.123073][ T455] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1251.131462][ T455] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1251.139439][ T455] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1251.147400][ T455] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1251.155364][ T455] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1251.163312][ T455] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:26 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1251.241492][ T455] gfs2: not a GFS2 filesystem 13:29:26 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:26 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1251.292493][ T472] overlayfs: overlapping lowerdir path 13:29:26 executing program 1 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1251.455888][ T481] IPVS: length: 144 != 8 13:29:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:26 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:26 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:26 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1251.551922][ T493] FAULT_INJECTION: forcing a failure. [ 1251.551922][ T493] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.575511][ T493] CPU: 0 PID: 493 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1251.584472][ T493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.594528][ T493] Call Trace: [ 1251.597831][ T493] dump_stack+0x172/0x1f0 [ 1251.602169][ T493] should_fail.cold+0xa/0x15 [ 1251.607382][ T493] ? fault_create_debugfs_attr+0x180/0x180 [ 1251.613179][ T493] ? page_to_nid.part.0+0x20/0x20 [ 1251.618205][ T493] ? ___might_sleep+0x163/0x280 [ 1251.623057][ T493] __should_failslab+0x121/0x190 [ 1251.627995][ T493] should_failslab+0x9/0x14 [ 1251.632501][ T493] kmem_cache_alloc+0x2aa/0x710 [ 1251.637349][ T493] ? __mutex_lock+0x45d/0x13c0 [ 1251.642123][ T493] __kernfs_new_node+0xf0/0x6c0 [ 1251.646981][ T493] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1251.652437][ T493] ? wait_for_completion+0x440/0x440 [ 1251.657725][ T493] ? __kasan_check_write+0x14/0x20 [ 1251.662835][ T493] ? mutex_unlock+0xd/0x10 [ 1251.667334][ T493] ? kernfs_activate+0x192/0x1f0 [ 1251.672270][ T493] kernfs_new_node+0x96/0x120 [ 1251.676959][ T493] __kernfs_create_file+0x51/0x33b [ 1251.682074][ T493] sysfs_add_file_mode_ns+0x222/0x560 [ 1251.687452][ T493] internal_create_group+0x359/0xc30 [ 1251.692783][ T493] ? bd_set_size+0x3f/0xb0 [ 1251.697205][ T493] ? remove_files.isra.0+0x190/0x190 [ 1251.702487][ T493] ? __down_timeout+0x2d0/0x2d0 [ 1251.707340][ T493] ? __kasan_check_write+0x14/0x20 [ 1251.712448][ T493] ? up_write+0x9d/0x280 [ 1251.716706][ T493] sysfs_create_group+0x20/0x30 [ 1251.721555][ T493] loop_set_fd+0xb3b/0x10c0 [ 1251.726063][ T493] lo_ioctl+0x1a3/0x1460 [ 1251.730302][ T493] ? trace_hardirqs_on+0x67/0x240 [ 1251.735326][ T493] ? loop_set_fd+0x10c0/0x10c0 [ 1251.740087][ T493] blkdev_ioctl+0xedb/0x1c1a [ 1251.744689][ T493] ? blkpg_ioctl+0xa90/0xa90 [ 1251.749276][ T493] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1251.755080][ T493] ? __kasan_check_read+0x11/0x20 [ 1251.760104][ T493] ? __kasan_check_read+0x11/0x20 [ 1251.765130][ T493] block_ioctl+0xee/0x130 [ 1251.769572][ T493] ? blkdev_fallocate+0x410/0x410 [ 1251.774594][ T493] do_vfs_ioctl+0xdb6/0x13e0 [ 1251.779191][ T493] ? ioctl_preallocate+0x210/0x210 [ 1251.784296][ T493] ? __fget+0x384/0x560 [ 1251.788452][ T493] ? ksys_dup3+0x3e0/0x3e0 [ 1251.792871][ T493] ? do_sys_open+0x31d/0x5d0 [ 1251.797455][ T493] ? tomoyo_file_ioctl+0x23/0x30 [ 1251.802377][ T493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.808599][ T493] ? security_file_ioctl+0x8d/0xc0 [ 1251.813706][ T493] ksys_ioctl+0xab/0xd0 [ 1251.817855][ T493] __x64_sys_ioctl+0x73/0xb0 [ 1251.822424][ T493] do_syscall_64+0xfa/0x760 [ 1251.826911][ T493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.832780][ T493] RIP: 0033:0x459697 [ 1251.836651][ T493] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.856264][ T493] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1251.864659][ T493] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1251.872636][ T493] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1251.880584][ T493] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1251.888548][ T493] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1251.896512][ T493] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1251.950092][ T493] gfs2: not a GFS2 filesystem 13:29:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:27 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\xd4\xfe\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1251.982662][ T503] gfs2: not a GFS2 filesystem 13:29:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1252.015517][ T509] IPVS: length: 144 != 8 13:29:27 executing program 1 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:27 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:27 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x008\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1252.267808][ T526] FAULT_INJECTION: forcing a failure. [ 1252.267808][ T526] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.313184][ T526] CPU: 1 PID: 526 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1252.322154][ T526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.332292][ T526] Call Trace: [ 1252.335595][ T526] dump_stack+0x172/0x1f0 [ 1252.339934][ T526] should_fail.cold+0xa/0x15 [ 1252.344527][ T526] ? fault_create_debugfs_attr+0x180/0x180 [ 1252.350357][ T526] ? page_to_nid.part.0+0x20/0x20 [ 1252.355381][ T526] ? ___might_sleep+0x163/0x280 [ 1252.360239][ T526] __should_failslab+0x121/0x190 [ 1252.365185][ T526] should_failslab+0x9/0x14 [ 1252.369685][ T526] kmem_cache_alloc+0x2aa/0x710 [ 1252.374531][ T526] ? __mutex_lock+0x45d/0x13c0 [ 1252.379302][ T526] __kernfs_new_node+0xf0/0x6c0 [ 1252.384153][ T526] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1252.389613][ T526] ? wait_for_completion+0x440/0x440 [ 1252.394898][ T526] ? __kasan_check_write+0x14/0x20 [ 1252.400038][ T526] ? mutex_unlock+0xd/0x10 [ 1252.404465][ T526] ? kernfs_activate+0x192/0x1f0 [ 1252.409404][ T526] kernfs_new_node+0x96/0x120 [ 1252.414080][ T526] __kernfs_create_file+0x51/0x33b [ 1252.419193][ T526] sysfs_add_file_mode_ns+0x222/0x560 [ 1252.424569][ T526] internal_create_group+0x359/0xc30 [ 1252.429852][ T526] ? bd_set_size+0x3f/0xb0 [ 1252.434270][ T526] ? remove_files.isra.0+0x190/0x190 [ 1252.439553][ T526] ? __down_timeout+0x2d0/0x2d0 [ 1252.444403][ T526] ? __kasan_check_write+0x14/0x20 [ 1252.449516][ T526] ? up_write+0x9d/0x280 [ 1252.453759][ T526] sysfs_create_group+0x20/0x30 [ 1252.458610][ T526] loop_set_fd+0xb3b/0x10c0 [ 1252.463118][ T526] lo_ioctl+0x1a3/0x1460 [ 1252.467359][ T526] ? trace_hardirqs_on+0x67/0x240 [ 1252.472381][ T526] ? loop_set_fd+0x10c0/0x10c0 [ 1252.477144][ T526] blkdev_ioctl+0xedb/0x1c1a [ 1252.481734][ T526] ? blkpg_ioctl+0xa90/0xa90 [ 1252.486329][ T526] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1252.492134][ T526] ? __kasan_check_read+0x11/0x20 [ 1252.497168][ T526] ? __kasan_check_read+0x11/0x20 [ 1252.497917][ T533] IPVS: length: 144 != 8 [ 1252.502197][ T526] block_ioctl+0xee/0x130 [ 1252.502211][ T526] ? blkdev_fallocate+0x410/0x410 [ 1252.502225][ T526] do_vfs_ioctl+0xdb6/0x13e0 [ 1252.502240][ T526] ? ioctl_preallocate+0x210/0x210 [ 1252.502260][ T526] ? __fget+0x384/0x560 [ 1252.530014][ T526] ? ksys_dup3+0x3e0/0x3e0 [ 1252.534437][ T526] ? do_sys_open+0x31d/0x5d0 [ 1252.539065][ T526] ? tomoyo_file_ioctl+0x23/0x30 [ 1252.544007][ T526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1252.550246][ T526] ? security_file_ioctl+0x8d/0xc0 [ 1252.555359][ T526] ksys_ioctl+0xab/0xd0 [ 1252.559518][ T526] __x64_sys_ioctl+0x73/0xb0 [ 1252.564110][ T526] do_syscall_64+0xfa/0x760 [ 1252.568619][ T526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.574513][ T526] RIP: 0033:0x459697 [ 1252.578401][ T526] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.597985][ T526] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1252.606377][ T526] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 13:29:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1252.614365][ T526] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1252.622323][ T526] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1252.630285][ T526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1252.638235][ T526] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1252.683216][ T526] gfs2: not a GFS2 filesystem [ 1252.691403][ T529] gfs2: not a GFS2 filesystem 13:29:27 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd104"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:29:27 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:27 executing program 1 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1252.944972][ T559] FAULT_INJECTION: forcing a failure. [ 1252.944972][ T559] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.968542][ T559] CPU: 1 PID: 559 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1252.977519][ T559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.987574][ T559] Call Trace: [ 1252.990877][ T559] dump_stack+0x172/0x1f0 [ 1252.995216][ T559] should_fail.cold+0xa/0x15 [ 1252.999812][ T559] ? fault_create_debugfs_attr+0x180/0x180 [ 1253.005618][ T559] ? page_to_nid.part.0+0x20/0x20 [ 1253.010645][ T559] ? ___might_sleep+0x163/0x280 [ 1253.015502][ T559] __should_failslab+0x121/0x190 [ 1253.020453][ T559] should_failslab+0x9/0x14 [ 1253.024956][ T559] kmem_cache_alloc_trace+0x2d3/0x790 [ 1253.030337][ T559] kobject_uevent_env+0x387/0x1023 [ 1253.035460][ T559] ? __kasan_check_write+0x14/0x20 [ 1253.040573][ T559] ? up_write+0x9d/0x280 [ 1253.044817][ T559] kobject_uevent+0x20/0x26 [ 1253.049323][ T559] loop_set_fd+0xbcc/0x10c0 [ 1253.053830][ T559] lo_ioctl+0x1a3/0x1460 [ 1253.058070][ T559] ? trace_hardirqs_on+0x67/0x240 [ 1253.063091][ T559] ? loop_set_fd+0x10c0/0x10c0 [ 1253.067855][ T559] blkdev_ioctl+0xedb/0x1c1a [ 1253.072452][ T559] ? blkpg_ioctl+0xa90/0xa90 [ 1253.077043][ T559] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1253.082846][ T559] ? __kasan_check_read+0x11/0x20 [ 1253.087876][ T559] ? __kasan_check_read+0x11/0x20 [ 1253.092901][ T559] block_ioctl+0xee/0x130 [ 1253.097226][ T559] ? blkdev_fallocate+0x410/0x410 [ 1253.102250][ T559] do_vfs_ioctl+0xdb6/0x13e0 [ 1253.106840][ T559] ? ioctl_preallocate+0x210/0x210 [ 1253.111956][ T559] ? __fget+0x384/0x560 [ 1253.116122][ T559] ? ksys_dup3+0x3e0/0x3e0 [ 1253.120544][ T559] ? do_sys_open+0x31d/0x5d0 [ 1253.125142][ T559] ? tomoyo_file_ioctl+0x23/0x30 [ 1253.130083][ T559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.136326][ T559] ? security_file_ioctl+0x8d/0xc0 [ 1253.141449][ T559] ksys_ioctl+0xab/0xd0 [ 1253.145633][ T559] __x64_sys_ioctl+0x73/0xb0 [ 1253.150251][ T559] do_syscall_64+0xfa/0x760 [ 1253.154771][ T559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1253.160655][ T559] RIP: 0033:0x459697 [ 1253.164561][ T559] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1253.184162][ T559] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:29:28 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1253.192567][ T559] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1253.200544][ T559] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1253.208509][ T559] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1253.216479][ T559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1253.224453][ T559] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1253.237411][ T569] IPVS: length: 144 != 8 13:29:28 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd104"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1253.272383][ T559] gfs2: not a GFS2 filesystem [ 1253.287892][ T563] gfs2: not a GFS2 filesystem 13:29:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="c9c3aa93b57f5c68fa38ab15739827d361ea12e58728faef24a24459aa652edc3d44777c558380cd48e555a26711107cfdceada4495673996e5af51095248ca704485687386122baf7cbb6e7a9078fdffc4b54feb042d9e78ef6a9276423cc0743b0f8071cf43bf80ef0f2e05726f3d4f631aa9d5ec4b15ebc78bf3a41547195a53ccb3405c3014ed405857a1d7c63d329e0c24da2817bcdab52b6113e385eaa711a0153c2c7fa3d97128949fd4db553d3bde303cb3ada9496e6769eb72f171cb96468a15cbe18768546afa18343a30362160a1e23e0fd68002c1073f3114490bc2ac34a1eaddfb448bbcf2df51e0fe555fa617c3a05e12e23a0067f4afdc599") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:28 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:28 executing program 1 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1253.500563][ T581] IPVS: length: 144 != 8 [ 1253.571366][ T593] gfs2: Unknown parameter 'measure' [ 1253.578247][ T597] overlayfs: missing 'lowerdir' [ 1253.625590][ T601] FAULT_INJECTION: forcing a failure. [ 1253.625590][ T601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1253.638823][ T601] CPU: 0 PID: 601 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1253.647753][ T601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.657804][ T601] Call Trace: [ 1253.661112][ T601] dump_stack+0x172/0x1f0 [ 1253.665462][ T601] should_fail.cold+0xa/0x15 [ 1253.670060][ T601] ? rwlock_bug.part.0+0x90/0x90 [ 1253.675006][ T601] ? fault_create_debugfs_attr+0x180/0x180 [ 1253.680815][ T601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.687052][ T601] ? debug_smp_processor_id+0x3c/0x214 [ 1253.692511][ T601] should_fail_alloc_page+0x50/0x60 [ 1253.697710][ T601] __alloc_pages_nodemask+0x1a1/0x900 [ 1253.703086][ T601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.709324][ T601] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1253.715036][ T601] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1253.720669][ T601] ? __kasan_check_read+0x11/0x20 [ 1253.725700][ T601] ? fault_create_debugfs_attr+0x180/0x180 [ 1253.731504][ T601] cache_grow_begin+0x90/0xd20 [ 1253.736269][ T601] ? kobject_uevent_env+0x387/0x1023 [ 1253.741552][ T601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1253.747791][ T601] kmem_cache_alloc_trace+0x6b3/0x790 [ 1253.753171][ T601] kobject_uevent_env+0x387/0x1023 [ 1253.758281][ T601] ? __kasan_check_write+0x14/0x20 [ 1253.763394][ T601] ? up_write+0x9d/0x280 [ 1253.767637][ T601] kobject_uevent+0x20/0x26 [ 1253.772141][ T601] loop_set_fd+0xbcc/0x10c0 [ 1253.776644][ T601] lo_ioctl+0x1a3/0x1460 [ 1253.780897][ T601] ? trace_hardirqs_on+0x67/0x240 [ 1253.785920][ T601] ? loop_set_fd+0x10c0/0x10c0 [ 1253.790690][ T601] blkdev_ioctl+0xedb/0x1c1a [ 1253.795280][ T601] ? blkpg_ioctl+0xa90/0xa90 [ 1253.799871][ T601] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1253.805674][ T601] ? __kasan_check_read+0x11/0x20 [ 1253.810700][ T601] ? __kasan_check_read+0x11/0x20 [ 1253.815724][ T601] block_ioctl+0xee/0x130 [ 1253.820050][ T601] ? blkdev_fallocate+0x410/0x410 [ 1253.825071][ T601] do_vfs_ioctl+0xdb6/0x13e0 [ 1253.829663][ T601] ? ioctl_preallocate+0x210/0x210 [ 1253.834768][ T601] ? __fget+0x384/0x560 [ 1253.838935][ T601] ? ksys_dup3+0x3e0/0x3e0 [ 1253.843353][ T601] ? do_sys_open+0x31d/0x5d0 [ 1253.847951][ T601] ? tomoyo_file_ioctl+0x23/0x30 [ 1253.852889][ T601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.859126][ T601] ? security_file_ioctl+0x8d/0xc0 [ 1253.864232][ T601] ksys_ioctl+0xab/0xd0 [ 1253.868386][ T601] __x64_sys_ioctl+0x73/0xb0 13:29:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:28 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd104"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:28 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1253.872983][ T601] do_syscall_64+0xfa/0x760 [ 1253.877487][ T601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1253.883372][ T601] RIP: 0033:0x459697 [ 1253.887263][ T601] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1253.906869][ T601] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1253.915281][ T601] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1253.923251][ T601] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1253.931240][ T601] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1253.939211][ T601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1253.947159][ T601] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1253.998681][ T601] gfs2: not a GFS2 filesystem [ 1254.070119][ T605] IPVS: length: 144 != 8 13:29:29 executing program 1 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:29 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1254.097414][ T607] gfs2: Unknown parameter 'measure' [ 1254.106679][ T615] overlayfs: missing 'lowerdir' 13:29:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="c9c3aa93b57f5c68fa38ab15739827d361ea12e58728faef24a24459aa652edc3d44777c558380cd48e555a26711107cfdceada4495673996e5af51095248ca704485687386122baf7cbb6e7a9078fdffc4b54feb042d9e78ef6a9276423cc0743b0f8071cf43bf80ef0f2e05726f3d4f631aa9d5ec4b15ebc78bf3a41547195a53ccb3405c3014ed405857a1d7c63d329e0c24da2817bcdab52b6113e385eaa711a0153c2c7fa3d97128949fd4db553d3bde303cb3ada9496e6769eb72f171cb96468a15cbe18768546afa18343a30362160a1e23e0fd68002c1073f3114490bc2ac34a1eaddfb448bbcf2df51e0fe555fa617c3a05e12e23a0067f4afdc599") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:29 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 13:29:29 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1254.237091][ T627] FAULT_INJECTION: forcing a failure. [ 1254.237091][ T627] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.263391][ T627] CPU: 0 PID: 627 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1254.272363][ T627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.282417][ T627] Call Trace: [ 1254.285719][ T627] dump_stack+0x172/0x1f0 [ 1254.290060][ T627] should_fail.cold+0xa/0x15 [ 1254.294659][ T627] ? fault_create_debugfs_attr+0x180/0x180 [ 1254.300463][ T627] ? page_to_nid.part.0+0x20/0x20 [ 1254.305494][ T627] ? ___might_sleep+0x163/0x280 [ 1254.310353][ T627] __should_failslab+0x121/0x190 [ 1254.315298][ T627] should_failslab+0x9/0x14 [ 1254.319803][ T627] __kmalloc+0x2e0/0x770 [ 1254.324055][ T627] ? kasan_kmalloc+0x9/0x10 [ 1254.328576][ T627] ? kobject_get_path+0xc4/0x1b0 [ 1254.333515][ T627] kobject_get_path+0xc4/0x1b0 [ 1254.338285][ T627] kobject_uevent_env+0x3ab/0x1023 [ 1254.343390][ T627] ? __kasan_check_write+0x14/0x20 [ 1254.348480][ T627] ? up_write+0x9d/0x280 [ 1254.352722][ T627] kobject_uevent+0x20/0x26 [ 1254.357227][ T627] loop_set_fd+0xbcc/0x10c0 [ 1254.361722][ T627] lo_ioctl+0x1a3/0x1460 [ 1254.365976][ T627] ? trace_hardirqs_on+0x67/0x240 [ 1254.370978][ T627] ? loop_set_fd+0x10c0/0x10c0 [ 1254.375720][ T627] blkdev_ioctl+0xedb/0x1c1a [ 1254.380344][ T627] ? blkpg_ioctl+0xa90/0xa90 [ 1254.384918][ T627] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1254.390719][ T627] ? __kasan_check_read+0x11/0x20 [ 1254.395723][ T627] ? __kasan_check_read+0x11/0x20 [ 1254.400726][ T627] block_ioctl+0xee/0x130 [ 1254.405049][ T627] ? blkdev_fallocate+0x410/0x410 [ 1254.410052][ T627] do_vfs_ioctl+0xdb6/0x13e0 [ 1254.414621][ T627] ? ioctl_preallocate+0x210/0x210 [ 1254.419709][ T627] ? __fget+0x384/0x560 [ 1254.423851][ T627] ? ksys_dup3+0x3e0/0x3e0 [ 1254.428246][ T627] ? do_sys_open+0x31d/0x5d0 [ 1254.432832][ T627] ? tomoyo_file_ioctl+0x23/0x30 [ 1254.437750][ T627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.443971][ T627] ? security_file_ioctl+0x8d/0xc0 [ 1254.449060][ T627] ksys_ioctl+0xab/0xd0 [ 1254.453193][ T627] __x64_sys_ioctl+0x73/0xb0 [ 1254.457764][ T627] do_syscall_64+0xfa/0x760 [ 1254.462248][ T627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1254.468115][ T627] RIP: 0033:0x459697 [ 1254.471986][ T627] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1254.491586][ T627] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1254.499990][ T627] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1254.507940][ T627] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1254.515907][ T627] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1254.529643][ T627] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:29:29 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1254.537630][ T627] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1254.550173][ T627] gfs2: not a GFS2 filesystem 13:29:29 executing program 1 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1254.678338][ T638] gfs2: Unknown parameter 'measure' 13:29:29 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1254.712103][ T650] overlayfs: missing 'lowerdir' [ 1254.729466][ T642] IPVS: length: 144 != 8 13:29:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:29 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}, {@uid_eq={'uid'}}]}) 13:29:29 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1254.842854][ T657] FAULT_INJECTION: forcing a failure. [ 1254.842854][ T657] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.884233][ T657] CPU: 0 PID: 657 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1254.893191][ T657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.903245][ T657] Call Trace: [ 1254.906543][ T657] dump_stack+0x172/0x1f0 [ 1254.910881][ T657] should_fail.cold+0xa/0x15 [ 1254.915481][ T657] ? fault_create_debugfs_attr+0x180/0x180 [ 1254.921280][ T657] ? page_to_nid.part.0+0x20/0x20 [ 1254.926372][ T657] ? ___might_sleep+0x163/0x280 [ 1254.931203][ T657] __should_failslab+0x121/0x190 [ 1254.936132][ T657] should_failslab+0x9/0x14 [ 1254.940612][ T657] kmem_cache_alloc_node+0x268/0x740 [ 1254.945870][ T657] ? vprintk_default+0x28/0x30 [ 1254.950626][ T657] ? netlink_has_listeners+0x23b/0x3f0 [ 1254.956058][ T657] ? __kasan_check_read+0x11/0x20 [ 1254.961065][ T657] __alloc_skb+0xd5/0x5e0 [ 1254.965369][ T657] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1254.970457][ T657] ? netlink_has_listeners+0x6e/0x3f0 [ 1254.975848][ T657] alloc_uevent_skb+0x83/0x1e2 [ 1254.980593][ T657] kobject_uevent_env+0xaa3/0x1023 [ 1254.985684][ T657] kobject_uevent+0x20/0x26 [ 1254.990164][ T657] loop_set_fd+0xbcc/0x10c0 [ 1254.994660][ T657] lo_ioctl+0x1a3/0x1460 [ 1254.998884][ T657] ? trace_hardirqs_on+0x67/0x240 [ 1255.003900][ T657] ? loop_set_fd+0x10c0/0x10c0 [ 1255.008646][ T657] blkdev_ioctl+0xedb/0x1c1a [ 1255.013222][ T657] ? blkpg_ioctl+0xa90/0xa90 [ 1255.017788][ T657] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1255.023570][ T657] ? __kasan_check_read+0x11/0x20 [ 1255.028590][ T657] ? __kasan_check_read+0x11/0x20 [ 1255.033597][ T657] block_ioctl+0xee/0x130 [ 1255.037901][ T657] ? blkdev_fallocate+0x410/0x410 [ 1255.042902][ T657] do_vfs_ioctl+0xdb6/0x13e0 [ 1255.047470][ T657] ? ioctl_preallocate+0x210/0x210 [ 1255.052578][ T657] ? __fget+0x384/0x560 [ 1255.056711][ T657] ? ksys_dup3+0x3e0/0x3e0 [ 1255.061105][ T657] ? do_sys_open+0x31d/0x5d0 [ 1255.065668][ T657] ? tomoyo_file_ioctl+0x23/0x30 [ 1255.070582][ T657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.076796][ T657] ? security_file_ioctl+0x8d/0xc0 [ 1255.081881][ T657] ksys_ioctl+0xab/0xd0 [ 1255.086010][ T657] __x64_sys_ioctl+0x73/0xb0 [ 1255.090575][ T657] do_syscall_64+0xfa/0x760 [ 1255.095161][ T657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.101026][ T657] RIP: 0033:0x459697 [ 1255.104938][ T657] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1255.124535][ T657] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:29:30 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1255.132923][ T657] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1255.140871][ T657] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1255.148816][ T657] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1255.156773][ T657] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1255.164719][ T657] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1255.225407][ T657] gfs2: not a GFS2 filesystem [ 1255.275026][ T675] overlayfs: missing 'lowerdir' 13:29:30 executing program 1 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:30 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:30 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1255.332607][ T668] gfs2: quota_quantum mount option requires a positive numeric argument [ 1255.356768][ T674] IPVS: length: 144 != 8 13:29:30 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}, {@subj_type={'subj_type', 0x3d, './cgroup.net/syz1\x00'}}]}) [ 1255.469385][ T686] FAULT_INJECTION: forcing a failure. [ 1255.469385][ T686] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.505348][ T690] overlayfs: missing 'lowerdir' [ 1255.512085][ T686] CPU: 1 PID: 686 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1255.521034][ T686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.531089][ T686] Call Trace: [ 1255.534399][ T686] dump_stack+0x172/0x1f0 [ 1255.538746][ T686] should_fail.cold+0xa/0x15 [ 1255.543342][ T686] ? fault_create_debugfs_attr+0x180/0x180 [ 1255.549150][ T686] ? page_to_nid.part.0+0x20/0x20 [ 1255.554176][ T686] ? ___might_sleep+0x163/0x280 [ 1255.559035][ T686] __should_failslab+0x121/0x190 [ 1255.563975][ T686] should_failslab+0x9/0x14 13:29:30 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:30 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff8\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1255.568485][ T686] kmem_cache_alloc_node_trace+0x274/0x750 [ 1255.574294][ T686] ? kasan_unpoison_shadow+0x35/0x50 [ 1255.579578][ T686] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1255.585408][ T686] __kmalloc_node_track_caller+0x3d/0x70 [ 1255.591048][ T686] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1255.596422][ T686] __alloc_skb+0x10b/0x5e0 [ 1255.600849][ T686] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1255.605972][ T686] ? netlink_has_listeners+0x6e/0x3f0 [ 1255.612870][ T686] alloc_uevent_skb+0x83/0x1e2 [ 1255.617655][ T686] kobject_uevent_env+0xaa3/0x1023 [ 1255.622772][ T686] kobject_uevent+0x20/0x26 [ 1255.627280][ T686] loop_set_fd+0xbcc/0x10c0 [ 1255.631790][ T686] lo_ioctl+0x1a3/0x1460 [ 1255.636034][ T686] ? trace_hardirqs_on+0x67/0x240 [ 1255.641059][ T686] ? loop_set_fd+0x10c0/0x10c0 [ 1255.645821][ T686] blkdev_ioctl+0xedb/0x1c1a [ 1255.650418][ T686] ? blkpg_ioctl+0xa90/0xa90 [ 1255.655013][ T686] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1255.660815][ T686] ? __kasan_check_read+0x11/0x20 [ 1255.665843][ T686] ? __kasan_check_read+0x11/0x20 [ 1255.670871][ T686] block_ioctl+0xee/0x130 [ 1255.675217][ T686] ? blkdev_fallocate+0x410/0x410 [ 1255.680243][ T686] do_vfs_ioctl+0xdb6/0x13e0 [ 1255.684843][ T686] ? ioctl_preallocate+0x210/0x210 [ 1255.689950][ T686] ? __fget+0x384/0x560 [ 1255.694109][ T686] ? ksys_dup3+0x3e0/0x3e0 [ 1255.698523][ T686] ? do_sys_open+0x31d/0x5d0 [ 1255.703112][ T686] ? tomoyo_file_ioctl+0x23/0x30 [ 1255.708048][ T686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.714287][ T686] ? security_file_ioctl+0x8d/0xc0 [ 1255.719400][ T686] ksys_ioctl+0xab/0xd0 [ 1255.723556][ T686] __x64_sys_ioctl+0x73/0xb0 [ 1255.728146][ T686] do_syscall_64+0xfa/0x760 [ 1255.732652][ T686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.738536][ T686] RIP: 0033:0x459697 [ 1255.742432][ T686] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1255.762048][ T686] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:29:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1255.770470][ T686] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1255.778439][ T686] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1255.786420][ T686] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1255.794400][ T686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1255.802374][ T686] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1255.814193][ T686] gfs2: not a GFS2 filesystem [ 1255.946008][ T701] gfs2: quota_quantum mount option requires a positive numeric argument [ 1255.959337][ T695] IPVS: length: 144 != 8 13:29:31 executing program 1 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1255.993807][ T709] overlayfs: missing 'lowerdir' 13:29:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'eth1'}}]}) 13:29:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:31 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c7090570"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1256.141483][ T715] FAULT_INJECTION: forcing a failure. [ 1256.141483][ T715] name failslab, interval 1, probability 0, space 0, times 0 [ 1256.206263][ T715] CPU: 0 PID: 715 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1256.215230][ T715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.225283][ T715] Call Trace: [ 1256.228582][ T715] dump_stack+0x172/0x1f0 [ 1256.232926][ T715] should_fail.cold+0xa/0x15 [ 1256.237566][ T715] ? __kasan_check_read+0x11/0x20 [ 1256.242598][ T715] ? fault_create_debugfs_attr+0x180/0x180 [ 1256.248420][ T715] ? page_to_nid.part.0+0x20/0x20 [ 1256.253453][ T715] ? ___might_sleep+0x163/0x280 [ 1256.258314][ T715] __should_failslab+0x121/0x190 [ 1256.263266][ T715] should_failslab+0x9/0x14 [ 1256.267787][ T715] kmem_cache_alloc+0x2aa/0x710 [ 1256.272640][ T715] ? __fget+0x384/0x560 [ 1256.276798][ T715] getname_flags+0xd6/0x5b0 [ 1256.281298][ T715] do_mkdirat+0xa0/0x2a0 [ 1256.285537][ T715] ? __ia32_sys_mknod+0xb0/0xb0 [ 1256.290387][ T715] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1256.296449][ T715] ? trace_hardirqs_off_caller+0x65/0x230 [ 1256.302172][ T715] __x64_sys_mkdir+0x5c/0x80 [ 1256.306767][ T715] do_syscall_64+0xfa/0x760 [ 1256.311275][ T715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1256.317158][ T715] RIP: 0033:0x458c47 [ 1256.321049][ T715] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1256.340651][ T715] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1256.349061][ T715] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 13:29:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1256.357119][ T715] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1256.365097][ T715] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1256.373066][ T715] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1256.381035][ T715] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1256.428230][ T729] overlayfs: missing 'lowerdir' [ 1256.430303][ T722] IPVS: length: 144 != 8 [ 1256.458400][ T725] gfs2: quota_quantum mount option requires a positive numeric argument 13:29:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}], [{@measure='measure'}]}) 13:29:31 executing program 1 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:31 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c7090570"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1256.700866][ T743] overlayfs: missing 'lowerdir' 13:29:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1256.721039][ T750] gfs2: quota_quantum mount option requires a positive numeric argument [ 1256.790258][ T755] FAULT_INJECTION: forcing a failure. [ 1256.790258][ T755] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1256.803500][ T755] CPU: 0 PID: 755 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1256.812440][ T755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.822521][ T755] Call Trace: [ 1256.825837][ T755] dump_stack+0x172/0x1f0 [ 1256.830190][ T755] should_fail.cold+0xa/0x15 [ 1256.834791][ T755] ? fault_create_debugfs_attr+0x180/0x180 13:29:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\xd4\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1256.840596][ T755] ? loop_set_fd+0x10c0/0x10c0 [ 1256.845370][ T755] should_fail_alloc_page+0x50/0x60 [ 1256.850564][ T755] __alloc_pages_nodemask+0x1a1/0x900 [ 1256.855926][ T755] ? __kasan_check_read+0x11/0x20 [ 1256.860952][ T755] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1256.866651][ T755] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1256.872272][ T755] ? __kasan_check_read+0x11/0x20 [ 1256.875759][ T764] IPVS: length: 144 != 8 [ 1256.877303][ T755] ? fault_create_debugfs_attr+0x180/0x180 [ 1256.877321][ T755] cache_grow_begin+0x90/0xd20 [ 1256.877334][ T755] ? getname_flags+0xd6/0x5b0 [ 1256.877359][ T755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1256.903004][ T755] kmem_cache_alloc+0x64e/0x710 [ 1256.907841][ T755] ? __fget+0x384/0x560 [ 1256.911979][ T755] getname_flags+0xd6/0x5b0 [ 1256.916464][ T755] do_mkdirat+0xa0/0x2a0 [ 1256.920699][ T755] ? __ia32_sys_mknod+0xb0/0xb0 [ 1256.925546][ T755] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1256.931601][ T755] ? trace_hardirqs_off_caller+0x65/0x230 [ 1256.937300][ T755] __x64_sys_mkdir+0x5c/0x80 [ 1256.941883][ T755] do_syscall_64+0xfa/0x760 [ 1256.946388][ T755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1256.952254][ T755] RIP: 0033:0x458c47 [ 1256.956126][ T755] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1256.975715][ T755] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1256.984114][ T755] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1256.992119][ T755] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1257.000080][ T755] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1257.008035][ T755] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1257.015989][ T755] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1257.070171][ T755] gfs2: not a GFS2 filesystem 13:29:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum'}}]}) 13:29:32 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1257.197003][ T775] overlayfs: missing 'lowerdir' 13:29:32 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c7090570"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:32 executing program 1 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1257.313301][ T779] gfs2: quota_quantum mount option requires a positive numeric argument [ 1257.394184][ T792] overlayfs: unrecognized mount option "lowerdir" or missing value [ 1257.426493][ T790] FAULT_INJECTION: forcing a failure. [ 1257.426493][ T790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1257.439816][ T790] CPU: 0 PID: 790 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1257.448745][ T790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1257.458797][ T790] Call Trace: [ 1257.462108][ T790] dump_stack+0x172/0x1f0 [ 1257.466484][ T790] should_fail.cold+0xa/0x15 [ 1257.471086][ T790] ? fault_create_debugfs_attr+0x180/0x180 [ 1257.478387][ T790] ? is_bpf_text_address+0xac/0x170 [ 1257.483578][ T790] ? __kasan_check_read+0x11/0x20 [ 1257.488587][ T790] ? __brelse+0x95/0xb0 13:29:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1257.492756][ T790] should_fail_alloc_page+0x50/0x60 [ 1257.497960][ T790] __alloc_pages_nodemask+0x1a1/0x900 [ 1257.503338][ T790] ? __bpf_address_lookup+0x310/0x310 [ 1257.508710][ T790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1257.514430][ T790] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1257.520155][ T790] ? fault_create_debugfs_attr+0x180/0x180 [ 1257.525967][ T790] ? __kernel_text_address+0xd/0x40 [ 1257.531169][ T790] cache_grow_begin+0x90/0xd20 [ 1257.535934][ T790] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1257.541660][ T790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1257.547900][ T790] __kmalloc+0x6b2/0x770 [ 1257.552144][ T790] ? mark_held_locks+0xf0/0xf0 [ 1257.556912][ T790] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1257.562639][ T790] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1257.568181][ T790] ? tomoyo_path_number_perm+0x193/0x520 [ 1257.573816][ T790] tomoyo_path_number_perm+0x1dd/0x520 [ 1257.579270][ T790] ? tomoyo_path_number_perm+0x193/0x520 [ 1257.584902][ T790] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1257.590715][ T790] ? __kasan_check_write+0x14/0x20 [ 1257.595838][ T790] ? quarantine_put+0x11c/0x1c0 [ 1257.600689][ T790] ? trace_hardirqs_on+0x67/0x240 [ 1257.605713][ T790] ? putname+0xef/0x130 [ 1257.610440][ T790] ? kmem_cache_free+0x1a7/0x320 [ 1257.615379][ T790] tomoyo_path_mkdir+0xaa/0xf0 [ 1257.620143][ T790] ? tomoyo_file_ioctl+0x30/0x30 [ 1257.625076][ T790] ? kern_path_mountpoint+0x40/0x40 [ 1257.630273][ T790] ? strncpy_from_user+0x2b4/0x400 [ 1257.635389][ T790] security_path_mkdir+0x113/0x170 [ 1257.640497][ T790] do_mkdirat+0x160/0x2a0 [ 1257.644828][ T790] ? __ia32_sys_mknod+0xb0/0xb0 [ 1257.649679][ T790] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1257.655746][ T790] ? trace_hardirqs_off_caller+0x65/0x230 [ 1257.661464][ T790] __x64_sys_mkdir+0x5c/0x80 [ 1257.666059][ T790] do_syscall_64+0xfa/0x760 [ 1257.670573][ T790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1257.676457][ T790] RIP: 0033:0x458c47 13:29:32 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1257.680355][ T790] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1257.699963][ T790] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1257.708378][ T790] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1257.716347][ T790] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1257.716364][ T790] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1257.732297][ T790] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1257.740290][ T790] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:32 executing program 4: setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) r0 = semget$private(0x0, 0x800000001, 0x2) semctl$GETPID(r0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) io_setup(0x6, &(0x7f0000000200)=0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x48401, 0x0) io_cancel(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f0000000240), 0x0, 0x7, 0x0, 0x1, r4}, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r6 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000480), &(0x7f0000000040)=0x8b558ec783610c62) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x44800) sendto$inet(r2, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bind$rds(r6, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f0000000380)="db54541dce322b6b575e64ebc66168d01bada9a38f122ffa0103a457093f1495ddfb9f1cc88145f8c511ac28fef55a68eb3ecaf141c24e4a89e2056b6d1ecb44a61a9405f71af38638554cfcc17caf6908433571c21551da1fdd9efb56d62e6e", 0x60, 0x7}], 0x100000, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(r6, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r5, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) r13 = getgid() getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x2}, [{0x2, 0x5, r8}], {0x4, 0x1}, [{0x8, 0x6, r9}, {0x8, 0x1}, {0x8, 0x7, r10}, {0x8, 0x4, r11}, {0x8, 0x1, r12}, {0x8, 0x5, r13}, {0x8, 0x4, r14}], {0x10, 0x5}, {0x20, 0x5}}, 0x64, 0x3) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) 13:29:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r4, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:32 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x02\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1257.771376][ T793] IPVS: length: 144 != 8 [ 1257.783630][ T790] gfs2: not a GFS2 filesystem 13:29:32 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:32 executing program 1 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1257.902276][ T805] overlayfs: unrecognized mount option "lowerdir" or missing value 13:29:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:33 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1258.107394][ T826] IPVS: length: 144 != 8 [ 1258.166321][ T825] FAULT_INJECTION: forcing a failure. [ 1258.166321][ T825] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.203829][ T834] overlayfs: unrecognized mount option "lowerdir" or missing value [ 1258.241783][ T825] CPU: 1 PID: 825 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1258.250752][ T825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1258.260806][ T825] Call Trace: [ 1258.264110][ T825] dump_stack+0x172/0x1f0 [ 1258.268460][ T825] should_fail.cold+0xa/0x15 [ 1258.273062][ T825] ? fault_create_debugfs_attr+0x180/0x180 [ 1258.278867][ T825] ? __kernel_text_address+0xd/0x40 [ 1258.284075][ T825] ? unwind_get_return_address+0x61/0xa0 [ 1258.289706][ T825] ? profile_setup.cold+0xbb/0xbb [ 1258.294726][ T825] ? ___might_sleep+0x163/0x280 [ 1258.299586][ T825] __should_failslab+0x121/0x190 [ 1258.304531][ T825] should_failslab+0x9/0x14 [ 1258.309039][ T825] __kmalloc+0x2e0/0x770 [ 1258.313283][ T825] ? mark_held_locks+0xf0/0xf0 [ 1258.318048][ T825] ? stack_trace_save+0xac/0xe0 [ 1258.322903][ T825] ? stack_trace_consume_entry+0x190/0x190 [ 1258.328707][ T825] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1258.328722][ T825] tomoyo_realpath_from_path+0xcd/0x7b0 13:29:33 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:33 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x04\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1258.328734][ T825] ? tomoyo_path_number_perm+0x193/0x520 [ 1258.328749][ T825] tomoyo_path_number_perm+0x1dd/0x520 [ 1258.328761][ T825] ? tomoyo_path_number_perm+0x193/0x520 [ 1258.328781][ T825] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1258.340117][ T825] ? __kasan_check_write+0x14/0x20 [ 1258.340142][ T825] ? quarantine_put+0x11c/0x1c0 [ 1258.340158][ T825] ? trace_hardirqs_on+0x67/0x240 [ 1258.340172][ T825] ? putname+0xef/0x130 [ 1258.340183][ T825] ? kmem_cache_free+0x1a7/0x320 [ 1258.340198][ T825] tomoyo_path_mkdir+0xaa/0xf0 [ 1258.340210][ T825] ? tomoyo_file_ioctl+0x30/0x30 [ 1258.340222][ T825] ? kern_path_mountpoint+0x40/0x40 [ 1258.340235][ T825] ? strncpy_from_user+0x2b4/0x400 [ 1258.340258][ T825] security_path_mkdir+0x113/0x170 [ 1258.411737][ T825] do_mkdirat+0x160/0x2a0 [ 1258.416069][ T825] ? __ia32_sys_mknod+0xb0/0xb0 [ 1258.420929][ T825] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1258.426998][ T825] ? trace_hardirqs_off_caller+0x65/0x230 [ 1258.432726][ T825] __x64_sys_mkdir+0x5c/0x80 [ 1258.437324][ T825] do_syscall_64+0xfa/0x760 [ 1258.441839][ T825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1258.447731][ T825] RIP: 0033:0x458c47 [ 1258.451625][ T825] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1258.471233][ T825] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1258.473757][ T843] IPVS: length: 144 != 8 [ 1258.479643][ T825] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1258.479652][ T825] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1258.479660][ T825] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1258.479668][ T825] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1258.479676][ T825] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 13:29:33 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 13:29:33 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1258.621627][ T847] overlayfs: failed to resolve 'f': -2 13:29:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1258.678883][ T825] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1258.698889][ T825] gfs2: not a GFS2 filesystem [ 1258.738124][ T855] sysfs: Unknown parameter 'fscontext' [ 1258.751210][ T856] sysfs: Unknown parameter 'fscontext' 13:29:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r3, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:33 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:33 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1258.875031][ T863] overlayfs: failed to resolve 'f': -2 13:29:34 executing program 1 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") syz_emit_ethernet(0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e98f58c34dc1b7d3700140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000498a51c397866e86f06d90c92b7cf3ef7efaa16db580333a566685133737921ce4bba19653621ac550d56d930a296d49b2391ae74c70990563562793d723a970e125e095b4fa55b33f6d28f53bb5095208b194095549cbc0a4852cea3a380643cc8faa8a14f593377b18bcd85c1088ed38e7f7cbce6d33948673457c38a40c9e03c0adc72a5ac0b1286b0d9193ef793f2d29eea22b15f1f0bc9dc0f7cf8a1ecb782e46843c90a23a88286a3c52c75f15a1ce446462da2ab74fd464", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 13:29:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:f']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1258.951365][ T868] IPVS: length: 144 != 8 13:29:34 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:34 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socket$packet(0x11, 0x3, 0x300) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0045878) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x4000, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000440)=""/196, 0xc4}, {0x0}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000280)=""/21, 0x15}], 0x6) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x80000, 0x0) r3 = semget$private(0x0, 0x1, 0x100) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000780)=""/4096) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 1259.099069][ T881] FAULT_INJECTION: forcing a failure. [ 1259.099069][ T881] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.123264][ T879] overlayfs: failed to resolve 'f': -2 [ 1259.152801][ T889] IPVS: length: 144 != 8 [ 1259.176143][ T881] CPU: 0 PID: 881 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1259.185281][ T881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1259.195331][ T881] Call Trace: [ 1259.195361][ T881] dump_stack+0x172/0x1f0 [ 1259.195384][ T881] should_fail.cold+0xa/0x15 [ 1259.195408][ T881] ? fault_create_debugfs_attr+0x180/0x180 [ 1259.213366][ T881] ? __kernel_text_address+0xd/0x40 [ 1259.218568][ T881] ? unwind_get_return_address+0x61/0xa0 [ 1259.224202][ T881] ? profile_setup.cold+0xbb/0xbb [ 1259.229228][ T881] ? ___might_sleep+0x163/0x280 [ 1259.234086][ T881] __should_failslab+0x121/0x190 [ 1259.239035][ T881] should_failslab+0x9/0x14 [ 1259.243542][ T881] __kmalloc+0x2e0/0x770 [ 1259.247787][ T881] ? mark_held_locks+0xf0/0xf0 [ 1259.247802][ T881] ? stack_trace_save+0xac/0xe0 [ 1259.247822][ T881] ? stack_trace_consume_entry+0x190/0x190 [ 1259.263197][ T881] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1259.268915][ T881] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1259.268929][ T881] ? tomoyo_path_number_perm+0x193/0x520 [ 1259.268946][ T881] tomoyo_path_number_perm+0x1dd/0x520 [ 1259.268966][ T881] ? tomoyo_path_number_perm+0x193/0x520 [ 1259.268986][ T881] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1259.297004][ T881] ? __kasan_check_write+0x14/0x20 [ 1259.302130][ T881] ? quarantine_put+0x11c/0x1c0 [ 1259.306995][ T881] ? trace_hardirqs_on+0x67/0x240 [ 1259.312027][ T881] ? putname+0xef/0x130 [ 1259.316188][ T881] ? kmem_cache_free+0x1a7/0x320 [ 1259.321136][ T881] tomoyo_path_mkdir+0xaa/0xf0 [ 1259.325905][ T881] ? tomoyo_file_ioctl+0x30/0x30 [ 1259.330845][ T881] ? kern_path_mountpoint+0x40/0x40 [ 1259.336041][ T881] ? strncpy_from_user+0x2b4/0x400 [ 1259.341157][ T881] security_path_mkdir+0x113/0x170 [ 1259.346266][ T881] do_mkdirat+0x160/0x2a0 [ 1259.350596][ T881] ? __ia32_sys_mknod+0xb0/0xb0 [ 1259.355449][ T881] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1259.361517][ T881] ? trace_hardirqs_off_caller+0x65/0x230 [ 1259.367235][ T881] __x64_sys_mkdir+0x5c/0x80 [ 1259.371830][ T881] do_syscall_64+0xfa/0x760 [ 1259.376338][ T881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1259.382228][ T881] RIP: 0033:0x458c47 [ 1259.386122][ T881] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1259.405728][ T881] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1259.414139][ T881] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 13:29:34 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1259.422106][ T881] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1259.430072][ T881] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1259.438037][ T881] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1259.446005][ T881] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1259.458955][ T881] ERROR: Out of memory at tomoyo_realpath_from_path. 13:29:34 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1259.497832][ T881] gfs2: not a GFS2 filesystem [ 1259.556587][ T902] overlayfs: failed to resolve 'fil': -2 13:29:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r3, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:34 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x88\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) 13:29:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:34 executing program 1 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) [ 1259.682877][ T905] IPVS: length: 144 != 8 13:29:34 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) syz_open_procfs(0x0, 0x0) 13:29:34 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r4, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1259.752498][ T914] overlayfs: failed to resolve 'fil': -2 [ 1259.810125][ T917] FAULT_INJECTION: forcing a failure. [ 1259.810125][ T917] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.822980][ T917] CPU: 0 PID: 917 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1259.831930][ T917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1259.841987][ T917] Call Trace: [ 1259.845289][ T917] dump_stack+0x172/0x1f0 [ 1259.849629][ T917] should_fail.cold+0xa/0x15 [ 1259.854227][ T917] ? fault_create_debugfs_attr+0x180/0x180 [ 1259.860053][ T917] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1259.865690][ T917] ? save_stack+0x5c/0x90 [ 1259.870026][ T917] __should_failslab+0x121/0x190 [ 1259.874976][ T917] should_failslab+0x9/0x14 [ 1259.879484][ T917] kmem_cache_alloc+0x47/0x710 [ 1259.884254][ T917] ? __es_shrink+0xad0/0xad0 [ 1259.888849][ T917] ? do_raw_write_lock+0x124/0x290 [ 1259.893968][ T917] __es_insert_extent+0x2cc/0xf20 [ 1259.899004][ T917] ext4_es_insert_extent+0x2d0/0xa70 [ 1259.904295][ T917] ? ext4_es_scan_clu+0x50/0x50 13:29:34 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:fil']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1259.909150][ T917] ? __es_find_extent_range+0x361/0x490 [ 1259.914715][ T917] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1259.920967][ T917] ? ext4_es_find_extent_range+0x131/0x660 [ 1259.926779][ T917] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1259.932328][ T917] ? ext4_rereserve_cluster+0x240/0x240 [ 1259.937871][ T917] ? ext4_find_extent+0x76e/0x9d0 [ 1259.942903][ T917] ? ext4_find_extent+0x6a6/0x9d0 [ 1259.947937][ T917] ext4_ext_map_blocks+0x20c4/0x5040 [ 1259.953230][ T917] ? ext4_ext_release+0x10/0x10 13:29:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1259.958083][ T917] ? __kasan_check_write+0x14/0x20 [ 1259.963192][ T917] ? down_read+0x10a/0x3f0 [ 1259.967609][ T917] ? down_read_killable+0x460/0x460 [ 1259.972815][ T917] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1259.979064][ T917] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 1259.984531][ T917] ext4_map_blocks+0xdc5/0x17f0 [ 1259.989392][ T917] ? ext4_issue_zeroout+0x190/0x190 [ 1259.994611][ T917] ? ext4_set_acl+0x4f0/0x4f0 [ 1259.999305][ T917] ? __kasan_check_write+0x14/0x20 [ 1260.004419][ T917] ext4_getblk+0xc4/0x570 13:29:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @timestamp], 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1260.008754][ T917] ? ext4_iomap_begin+0x1000/0x1000 [ 1260.013973][ T917] ext4_bread+0x93/0x270 [ 1260.018223][ T917] ? ext4_getblk+0x570/0x570 [ 1260.022823][ T917] ext4_append+0x155/0x370 [ 1260.027250][ T917] ext4_mkdir+0x632/0xe20 [ 1260.031593][ T917] ? ext4_init_dot_dotdot+0x520/0x520 [ 1260.036976][ T917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.043222][ T917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.049469][ T917] ? security_inode_permission+0xcb/0x100 [ 1260.054934][ T932] IPVS: length: 144 != 8 [ 1260.055191][ T917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.055205][ T917] ? security_inode_mkdir+0xe4/0x120 [ 1260.055224][ T917] vfs_mkdir+0x42e/0x670 [ 1260.055246][ T917] do_mkdirat+0x234/0x2a0 [ 1260.075213][ T917] ? __ia32_sys_mknod+0xb0/0xb0 [ 1260.084362][ T917] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1260.084378][ T917] ? trace_hardirqs_off_caller+0x65/0x230 [ 1260.084396][ T917] __x64_sys_mkdir+0x5c/0x80 [ 1260.100724][ T917] do_syscall_64+0xfa/0x760 [ 1260.105239][ T917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.111129][ T917] RIP: 0033:0x458c47 [ 1260.115030][ T917] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1260.134635][ T917] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1260.143059][ T917] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1260.151033][ T917] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 13:29:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000796cff0130000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000217000000892f0700636f6e6e6c6162656c00000000008ef5d8e0520ecd5d00000000000020000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000e70000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e64300000000000000000e81d0074650900300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080003697a1012a317c7dfa5e47cfb59"]}, 0x2a8) [ 1260.155890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1260.159003][ T917] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1260.159011][ T917] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1260.159019][ T917] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1260.163636][ T917] gfs2: not a GFS2 filesystem 13:29:35 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) [ 1260.297693][ T946] overlayfs: failed to resolve 'fil': -2 [ 1260.369059][ T950] IPVS: length: 144 != 8 13:29:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r3, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 13:29:35 executing program 1 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@quota_quantum={'quota_quantum', 0x3d, 0x1}}]}) 13:29:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:35 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) 13:29:35 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000840)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r5 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r5, 0x3, 0xc, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) 13:29:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 1260.602023][ T955] overlayfs: failed to resolve 'file': -2 [ 1260.617763][ T959] FAULT_INJECTION: forcing a failure. [ 1260.617763][ T959] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.643835][ T958] IPVS: length: 144 != 8 [ 1260.672669][ T959] CPU: 0 PID: 959 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1260.681633][ T959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.691682][ T959] Call Trace: [ 1260.694989][ T959] dump_stack+0x172/0x1f0 [ 1260.699329][ T959] should_fail.cold+0xa/0x15 [ 1260.703930][ T959] ? fault_create_debugfs_attr+0x180/0x180 [ 1260.709746][ T959] ? ___might_sleep+0x163/0x280 [ 1260.714598][ T959] __should_failslab+0x121/0x190 [ 1260.719537][ T959] should_failslab+0x9/0x14 [ 1260.724035][ T959] __kmalloc+0x2e0/0x770 [ 1260.728277][ T959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.734516][ T959] ? d_absolute_path+0x11b/0x170 [ 1260.739461][ T959] ? __d_path+0x140/0x140 [ 1260.743793][ T959] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1260.749171][ T959] tomoyo_encode2.part.0+0xf5/0x400 [ 1260.754375][ T959] tomoyo_encode+0x2b/0x50 [ 1260.758796][ T959] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1260.764437][ T959] tomoyo_path_number_perm+0x1dd/0x520 [ 1260.769894][ T959] ? tomoyo_path_number_perm+0x193/0x520 [ 1260.775526][ T959] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1260.781340][ T959] ? __kasan_check_write+0x14/0x20 [ 1260.786463][ T959] ? quarantine_put+0x11c/0x1c0 [ 1260.791319][ T959] ? trace_hardirqs_on+0x67/0x240 [ 1260.796350][ T959] ? putname+0xef/0x130 [ 1260.800508][ T959] ? kmem_cache_free+0x1a7/0x320 [ 1260.805450][ T959] tomoyo_path_mkdir+0xaa/0xf0 [ 1260.810219][ T959] ? tomoyo_file_ioctl+0x30/0x30 [ 1260.815156][ T959] ? kern_path_mountpoint+0x40/0x40 [ 1260.820351][ T959] ? strncpy_from_user+0x2b4/0x400 [ 1260.825468][ T959] security_path_mkdir+0x113/0x170 [ 1260.830582][ T959] do_mkdirat+0x160/0x2a0 [ 1260.834915][ T959] ? __ia32_sys_mknod+0xb0/0xb0 [ 1260.839772][ T959] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1260.845843][ T959] ? trace_hardirqs_off_caller+0x65/0x230 [ 1260.851570][ T959] __x64_sys_mkdir+0x5c/0x80 [ 1260.856165][ T959] do_syscall_64+0xfa/0x760 [ 1260.860676][ T959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.866569][ T959] RIP: 0033:0x458c47 [ 1260.870467][ T959] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1260.890079][ T959] RSP: 002b:00007f6fe5fafa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1260.898499][ T959] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1260.906476][ T959] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 1260.914454][ T959] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 13:29:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file']) r0 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x48, 0x0) read$eventfd(r1, 0x0, 0x0) [ 1260.922435][ T959] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1260.930416][ T959] R13: 00000000004c8962 R14: 00000000004df740 R15: 0000000000000004 [ 1260.944881][ T959] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1260.953384][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:29:36 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 13:29:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x10, "2b7fe8e63cc9567c2eba68cb7753f8b7"}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x2, 0xdd, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000003a00)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000680)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000140)) sendto$inet(r3, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 1261.014319][ T959] gfs2: not a GFS2 filesystem [ 1261.024604][ T973] overlayfs: failed to resolve 'file': -2 [ 1263.113059][ T937] ================================================================== [ 1263.121181][ T937] BUG: KASAN: use-after-free in tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.128890][ T937] Read of size 1 at addr ffff888093160d14 by task syz-executor.4/937 [ 1263.136932][ T937] [ 1263.139271][ T937] CPU: 1 PID: 937 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1263.148188][ T937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.158231][ T937] Call Trace: [ 1263.161525][ T937] dump_stack+0x172/0x1f0 [ 1263.165855][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.171225][ T937] print_address_description.cold+0xd4/0x306 [ 1263.177198][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.182563][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.187929][ T937] __kasan_report.cold+0x1b/0x36 [ 1263.192863][ T937] ? lock_downgrade+0x8b0/0x920 [ 1263.197708][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.203077][ T937] kasan_report+0x12/0x17 [ 1263.207404][ T937] __asan_report_load1_noabort+0x14/0x20 [ 1263.213033][ T937] tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.218230][ T937] ? wait_on_pending_writer+0x420/0x420 [ 1263.223770][ T937] ? trace_hardirqs_on+0x67/0x240 [ 1263.228801][ T937] ? drain_stock.isra.0+0x1cb/0x240 [ 1263.233995][ T937] tls_sk_proto_unhash+0x90/0x3f0 [ 1263.239016][ T937] tcp_set_state+0x5b9/0x7d0 [ 1263.243607][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1263.249842][ T937] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 1263.255642][ T937] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 1263.261098][ T937] ? __sk_mem_reclaim+0x55/0x70 [ 1263.265947][ T937] ? tcp_write_queue_purge+0x5d8/0x1310 [ 1263.271484][ T937] ? tcp_write_xmit+0x13f0/0x56d0 [ 1263.276527][ T937] ? lock_downgrade+0x920/0x920 [ 1263.281374][ T937] tcp_done+0xe2/0x320 [ 1263.285440][ T937] tcp_reset+0x132/0x500 [ 1263.289682][ T937] tcp_validate_incoming+0xa2d/0x1660 [ 1263.295057][ T937] tcp_rcv_established+0x6b5/0x1e70 [ 1263.300257][ T937] ? __release_sock+0xca/0x390 [ 1263.305018][ T937] ? tcp_data_queue+0x4860/0x4860 [ 1263.310040][ T937] ? lock_downgrade+0x920/0x920 [ 1263.314889][ T937] tcp_v6_do_rcv+0x41e/0x12c0 [ 1263.319564][ T937] __release_sock+0x129/0x390 [ 1263.324237][ T937] release_sock+0x59/0x1c0 [ 1263.328645][ T937] sk_stream_wait_memory+0x65a/0xfc0 [ 1263.333929][ T937] ? sk_stream_kill_queues+0x520/0x520 [ 1263.339389][ T937] ? prepare_to_wait_exclusive+0x320/0x320 [ 1263.345188][ T937] ? __phys_addr+0xa4/0x120 [ 1263.349687][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1263.355922][ T937] ? tls_get_rec+0x4a1/0x590 [ 1263.360509][ T937] tls_sw_sendmsg+0x673/0x17b0 [ 1263.365278][ T937] ? tx_work_handler+0x180/0x180 [ 1263.370208][ T937] ? retint_kernel+0x2b/0x2b [ 1263.374800][ T937] inet6_sendmsg+0x9e/0xe0 [ 1263.379210][ T937] ? inet6_ioctl+0x1c0/0x1c0 [ 1263.383793][ T937] sock_sendmsg+0xd7/0x130 [ 1263.388205][ T937] __sys_sendto+0x262/0x380 [ 1263.392707][ T937] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1263.398084][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1263.404317][ T937] ? put_timespec64+0xda/0x140 [ 1263.409075][ T937] ? nsecs_to_jiffies+0x30/0x30 [ 1263.413926][ T937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1263.420159][ T937] ? __x64_sys_clock_gettime+0x16d/0x240 [ 1263.425789][ T937] __x64_sys_sendto+0xe1/0x1a0 [ 1263.430551][ T937] do_syscall_64+0xfa/0x760 [ 1263.435051][ T937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.440932][ T937] RIP: 0033:0x459829 [ 1263.444822][ T937] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1263.464421][ T937] RSP: 002b:00007f8a5caf8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1263.472852][ T937] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 1263.480815][ T937] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1263.488781][ T937] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1263.496749][ T937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a5caf96d4 [ 1263.504725][ T937] R13: 00000000004c77c1 R14: 00000000004dcf38 R15: 00000000ffffffff [ 1263.512698][ T937] [ 1263.515017][ T937] Allocated by task 939: [ 1263.519254][ T937] save_stack+0x23/0x90 [ 1263.523403][ T937] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1263.529024][ T937] kasan_kmalloc+0x9/0x10 [ 1263.533344][ T937] kmem_cache_alloc_trace+0x158/0x790 [ 1263.538706][ T937] create_ctx+0x46/0x260 [ 1263.542962][ T937] tls_init+0x134/0x560 [ 1263.547115][ T937] tcp_set_ulp+0x330/0x640 [ 1263.551523][ T937] do_tcp_setsockopt.isra.0+0x363/0x24f0 [ 1263.557145][ T937] tcp_setsockopt+0xbe/0xe0 [ 1263.561641][ T937] sock_common_setsockopt+0x94/0xd0 [ 1263.566830][ T937] __sys_setsockopt+0x261/0x4c0 [ 1263.571677][ T937] __x64_sys_setsockopt+0xbe/0x150 [ 1263.576783][ T937] do_syscall_64+0xfa/0x760 [ 1263.581283][ T937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.587155][ T937] [ 1263.589477][ T937] Freed by task 29412: [ 1263.593546][ T937] save_stack+0x23/0x90 [ 1263.597692][ T937] __kasan_slab_free+0x102/0x150 [ 1263.602619][ T937] kasan_slab_free+0xe/0x10 [ 1263.607575][ T937] kfree+0x10a/0x2c0 [ 1263.611471][ T937] tls_ctx_free.part.0+0x3a/0x40 [ 1263.616402][ T937] tls_ctx_free_deferred+0x9f/0x130 [ 1263.621593][ T937] process_one_work+0x9af/0x1740 [ 1263.626526][ T937] worker_thread+0x98/0xe40 [ 1263.631022][ T937] kthread+0x361/0x430 [ 1263.635083][ T937] ret_from_fork+0x24/0x30 [ 1263.639479][ T937] [ 1263.641798][ T937] The buggy address belongs to the object at ffff888093160d00 [ 1263.641798][ T937] which belongs to the cache kmalloc-512 of size 512 [ 1263.655868][ T937] The buggy address is located 20 bytes inside of [ 1263.655868][ T937] 512-byte region [ffff888093160d00, ffff888093160f00) [ 1263.669048][ T937] The buggy address belongs to the page: [ 1263.674697][ T937] page:ffffea00024c5800 refcount:1 mapcount:0 mapping:ffff8880aa400a80 index:0x0 [ 1263.683804][ T937] flags: 0x1fffc0000000200(slab) [ 1263.688770][ T937] raw: 01fffc0000000200 ffffea00022bc288 ffffea00022b6848 ffff8880aa400a80 [ 1263.697360][ T937] raw: 0000000000000000 ffff888093160080 0000000100000006 0000000000000000 [ 1263.705932][ T937] page dumped because: kasan: bad access detected [ 1263.712331][ T937] [ 1263.714648][ T937] Memory state around the buggy address: [ 1263.720272][ T937] ffff888093160c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1263.728325][ T937] ffff888093160c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1263.736378][ T937] >ffff888093160d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1263.744426][ T937] ^ [ 1263.749013][ T937] ffff888093160d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1263.757067][ T937] ffff888093160e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1263.765114][ T937] ================================================================== [ 1263.780438][ T937] Kernel panic - not syncing: panic_on_warn set ... [ 1263.787072][ T937] CPU: 1 PID: 937 Comm: syz-executor.4 Tainted: G B 5.3.0-rc1-next-20190726 #53 [ 1263.797386][ T937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.807434][ T937] Call Trace: [ 1263.810736][ T937] dump_stack+0x172/0x1f0 [ 1263.815073][ T937] panic+0x2dc/0x755 [ 1263.818968][ T937] ? add_taint.cold+0x16/0x16 [ 1263.823641][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.829011][ T937] ? preempt_schedule+0x4b/0x60 [ 1263.833854][ T937] ? ___preempt_schedule+0x16/0x20 [ 1263.838956][ T937] ? trace_hardirqs_on+0x5e/0x240 [ 1263.843975][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.849367][ T937] end_report+0x47/0x4f [ 1263.853518][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.858884][ T937] __kasan_report.cold+0xe/0x36 [ 1263.863735][ T937] ? lock_downgrade+0x8b0/0x920 [ 1263.868580][ T937] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.873951][ T937] kasan_report+0x12/0x17 [ 1263.878281][ T937] __asan_report_load1_noabort+0x14/0x20 [ 1263.883909][ T937] tls_sk_proto_cleanup+0x37f/0x3e0 [ 1263.889103][ T937] ? wait_on_pending_writer+0x420/0x420 [ 1263.894729][ T937] ? trace_hardirqs_on+0x67/0x240 [ 1263.899748][ T937] ? drain_stock.isra.0+0x1cb/0x240 [ 1263.904941][ T937] tls_sk_proto_unhash+0x90/0x3f0 [ 1263.909961][ T937] tcp_set_state+0x5b9/0x7d0 [ 1263.914551][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1263.920789][ T937] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 1263.926589][ T937] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 1263.932040][ T937] ? __sk_mem_reclaim+0x55/0x70 [ 1263.936885][ T937] ? tcp_write_queue_purge+0x5d8/0x1310 [ 1263.942426][ T937] ? tcp_write_xmit+0x13f0/0x56d0 [ 1263.947448][ T937] ? lock_downgrade+0x920/0x920 [ 1263.952302][ T937] tcp_done+0xe2/0x320 [ 1263.956367][ T937] tcp_reset+0x132/0x500 [ 1263.960604][ T937] tcp_validate_incoming+0xa2d/0x1660 [ 1263.965974][ T937] tcp_rcv_established+0x6b5/0x1e70 [ 1263.971169][ T937] ? __release_sock+0xca/0x390 [ 1263.975928][ T937] ? tcp_data_queue+0x4860/0x4860 [ 1263.980957][ T937] ? lock_downgrade+0x920/0x920 [ 1263.985830][ T937] tcp_v6_do_rcv+0x41e/0x12c0 [ 1263.990506][ T937] __release_sock+0x129/0x390 [ 1263.995181][ T937] release_sock+0x59/0x1c0 [ 1263.999591][ T937] sk_stream_wait_memory+0x65a/0xfc0 [ 1264.004879][ T937] ? sk_stream_kill_queues+0x520/0x520 [ 1264.010336][ T937] ? prepare_to_wait_exclusive+0x320/0x320 [ 1264.016141][ T937] ? __phys_addr+0xa4/0x120 [ 1264.020642][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1264.026873][ T937] ? tls_get_rec+0x4a1/0x590 [ 1264.031461][ T937] tls_sw_sendmsg+0x673/0x17b0 [ 1264.036230][ T937] ? tx_work_handler+0x180/0x180 [ 1264.041161][ T937] ? retint_kernel+0x2b/0x2b [ 1264.045756][ T937] inet6_sendmsg+0x9e/0xe0 [ 1264.050165][ T937] ? inet6_ioctl+0x1c0/0x1c0 [ 1264.054748][ T937] sock_sendmsg+0xd7/0x130 [ 1264.059159][ T937] __sys_sendto+0x262/0x380 [ 1264.063658][ T937] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1264.069036][ T937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1264.075278][ T937] ? put_timespec64+0xda/0x140 [ 1264.080034][ T937] ? nsecs_to_jiffies+0x30/0x30 [ 1264.084885][ T937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.091118][ T937] ? __x64_sys_clock_gettime+0x16d/0x240 [ 1264.096748][ T937] __x64_sys_sendto+0xe1/0x1a0 [ 1264.101508][ T937] do_syscall_64+0xfa/0x760 [ 1264.106013][ T937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.111892][ T937] RIP: 0033:0x459829 [ 1264.115783][ T937] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1264.135380][ T937] RSP: 002b:00007f8a5caf8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1264.143794][ T937] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 1264.151765][ T937] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1264.159732][ T937] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1264.167694][ T937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a5caf96d4 [ 1264.175657][ T937] R13: 00000000004c77c1 R14: 00000000004dcf38 R15: 00000000ffffffff [ 1264.184545][ T937] Kernel Offset: disabled [ 1264.188919][ T937] Rebooting in 86400 seconds..