783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) r5 = open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001200)={0x2, 0x2, {0x0, 0x0, 0x1f, 0x3, 0x1}}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000001280)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f00000012c0)=0x7f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000001300), &(0x7f0000001340)=0x4) 12:25:07 executing program 0: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) r5 = open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001200)={0x2, 0x2, {0x0, 0x0, 0x1f, 0x3, 0x1}}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000001280)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f00000012c0)=0x7f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000001300), &(0x7f0000001340)=0x4) socket$inet6(0xa, 0xa, 0x7) [ 236.373942] gfs2: invalid mount option: fscontext=user_u [ 236.379824] gfs2: can't parse mount arguments 12:25:07 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) sendto(r3, &(0x7f0000000440), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e20, 0x7fff, @mcast1, 0x1}}, 0x4a6, 0x2, 0x7fff, 0x10000, 0x60}, &(0x7f0000000880)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r4, 0x9}, &(0x7f00000008c0)=0xb1885521) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=r5, @ANYBLOB="ff0200000003"], 0xa) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff}) stat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000500)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getuid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) sendmsg$nl_netfilter(r3, &(0x7f0000001080)={&(0x7f0000000440), 0xc, &(0x7f0000001040)={&(0x7f0000000900)=ANY=[@ANYBLOB="fc0000000902090325bd7000fddbdf250c000001e8008100449a4efe289d249c94f9fe7ddb0fcfec309535d39bb42b50929f6c3b5aaaabe64d9fbf3b7975f7ed200131744c48069b3b5ea711ef5e9bca6ebca0ca5129352039033a17afc71cd0f2cbd6d6b53068ae1d61ce919771ca2c0f01fe514ed69b9179cb0ab38adb5181000093974ea1edc10567db25420e4e4893790a2c5ef58f1c14bd4c7cbc9827c02d368db538f5c2749c2ec9aa229a21ba84f039ff482945f850416a3069868b8d779641decb0a5706c22c32e19297966f4de4ebcb985b5d32d33f37962e31e7d11461e2585299ecbc8fb54d5dfee61e4c327f8fdfe45ca1e3501d820fdbc7cc81dcc1561fc2286b23dcbaaa8596fd41e475dab8d2a0f39f456aaff59bba74bef051d6374bb0a9"], 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r6 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r7 = openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f0000000400)={0x60b, 0x8001}) rmdir(&(0x7f00000000c0)='./file0\x00') r8 = dup2(r6, r7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, r1) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r8, &(0x7f0000000240)={0x4}) 12:25:07 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x0, 0x1711eb2c, 0x1e000000, r3}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000380)={{0x2, @loopback, 0x4e24, 0x3, 'wlc\x00', 0x35, 0x5, 0x7b}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e24, 0x7, 0x1, 0x2, 0x9}}, 0x44) eventfd2(0x66f, 0x1) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000400)={'team_slave_0\x00', 0x1}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000480)={0x5, &(0x7f0000000440)=[{}, {}, {}, {}, {}]}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:07 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) r5 = open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001200)={0x2, 0x2, {0x0, 0x0, 0x1f, 0x3, 0x1}}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000001280)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f00000012c0)=0x7f) [ 236.575844] gfs2: invalid mount option: fscontext=user_u [ 236.628247] gfs2: can't parse mount arguments 12:25:07 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x0, 0x1711eb2c, 0x1e000000, r3}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000380)={{0x2, @loopback, 0x4e24, 0x3, 'wlc\x00', 0x35, 0x5, 0x7b}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e24, 0x7, 0x1, 0x2, 0x9}}, 0x44) eventfd2(0x66f, 0x1) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000400)={'team_slave_0\x00', 0x1}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:07 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000a40)='/dev/input/mouse#\x00', 0x1d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x200000000000000, 0x0, 0xff00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0xff00000000000000) socket$kcm(0x2, 0x8000000501fffc, 0x2) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x12002, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000400)=0xd000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x40, 0x12) open$dir(&(0x7f0000000940)='./file0\x00', 0x202000, 0xe5) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x8000, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000980)={0x7, 0x7f, 0x1}, 0x7) prctl$PR_SVE_SET_VL(0x32, 0x2d622) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x800) connect(r1, &(0x7f0000000580)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) [ 236.825521] gfs2: invalid mount option: fscontext=user_u 12:25:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x0) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x40000, 0x0, [0x8, 0x2, 0x4, 0x0, 0x0, 0x80, 0x100000000, 0x7fffffff]}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)}], 0x1, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000300)=@nl=@proc, &(0x7f00000002c0)=0xffffffffffffff69, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc5122219818583a12bbe1971b9cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x82}}], 0x1, 0x0) connect(r2, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) [ 236.883355] gfs2: can't parse mount arguments 12:25:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x2903, 0xad}, 'port0\x00', 0x268cc0e8e87708fe, 0x100800, 0x3, 0x3, 0x3, 0x5, 0x8, 0x0, 0x6, 0x5}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000300)=[{0x0, 0x1, 0x0, 0x0, @tick=0xfff, {}, {}, @time=@time={0x77359400}}], 0x30) write$sndseq(r2, &(0x7f0000001400)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, 0x0}}], 0x30) 12:25:07 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001200)={0x2, 0x2, {0x0, 0x0, 0x1f, 0x3, 0x1}}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000001280)) 12:25:07 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x80000001, &(0x7f0000000080)="3820153a438003be59f6e832c839b824e91b801ca31bb1649f948ce0a524c28537792ce98c129bb5481be489fd7abbcce204edf63cceeacfce87aa4458ae0ab9164ffb831f002afa1c44079710ccbd751d3ec28cb52ecbde0531a90103af9a2e61d1ad0f129a20758bbb017b9ed22edb8496440d0ee73b") ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) clone(0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x800454c6, &(0x7f0000000040)) 12:25:07 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x0, 0x1711eb2c, 0x1e000000, r3}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000380)={{0x2, @loopback, 0x4e24, 0x3, 'wlc\x00', 0x35, 0x5, 0x7b}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e24, 0x7, 0x1, 0x2, 0x9}}, 0x44) eventfd2(0x66f, 0x1) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:07 executing program 1: r0 = memfd_create(&(0x7f0000000280)="2700b77f58d12f288406e1efbacb6d143c4ffc6276247acaf46f31abc2c48a88eadbf68989b6ee62e984b24025a8ddeee2109d75bee7dcf4c713cb797650e1a60e1762f12f23920736e5c1f2f0fc89930e7c926a9ee6adce801b7d6c27aaf5f80bb036bf0de3db0b49c581f42619e366333975090b9353cd869e37081137246e14123af88a529d4e5067edc14e93dc3314f425cb04065b0f3f7a268541c272a557862c6289ac23e60ee73454ce5e167a9d26e9d2730f072ed0defc6cdae839f07e1419d5c3af9f023a672d987dd9ecec575e01a9405c47bb48ad293793b611adf4bfcadef6a2e13e7b49bcd77dfe0254e4cbdb2020", 0x3) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x7, 0x8000}) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000000)=0xe5b, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f00000003c0)=0x10004000000, 0x6b90ffe2) sendto$inet6(r1, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 237.151501] gfs2: invalid mount option: fscontext=user_u [ 237.157015] gfs2: can't parse mount arguments 12:25:07 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000a40)='/dev/input/mouse#\x00', 0x1d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x200000000000000, 0x0, 0xff00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0xff00000000000000) socket$kcm(0x2, 0x8000000501fffc, 0x2) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x12002, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000400)=0xd000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x40, 0x12) open$dir(&(0x7f0000000940)='./file0\x00', 0x202000, 0xe5) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x8000, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000980)={0x7, 0x7f, 0x1}, 0x7) prctl$PR_SVE_SET_VL(0x32, 0x2d622) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x800) connect(r1, &(0x7f0000000580)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) 12:25:07 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x0, 0x1711eb2c, 0x1e000000, r3}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000380)={{0x2, @loopback, 0x4e24, 0x3, 'wlc\x00', 0x35, 0x5, 0x7b}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e24, 0x7, 0x1, 0x2, 0x9}}, 0x44) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:08 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000980)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000005c0)={0x0, 0x78f3}, &(0x7f0000000600)=0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000640)=0xffffffffffffd801) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) ioctl$KDDISABIO(r2, 0x4b37) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000940)=0x9008000) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) fremovexattr(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="63727ba7000000000000ce7f690025201c0000230000"]) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) pselect6(0x40, &(0x7f0000000580)={0x5, 0x5, 0x2, 0xb0, 0x200, 0x7fff, 0x31e3, 0x80}, &(0x7f0000000680)={0x2, 0x4aa6, 0x200, 0x1, 0x0, 0x3, 0x0, 0xc0}, &(0x7f0000000740)={0x1ff, 0x5, 0x0, 0x0, 0x401, 0x3, 0x8}, &(0x7f0000000780), &(0x7f0000000800)={&(0x7f00000007c0)={0x9}, 0x8}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={r0, 0x7}, &(0x7f0000000380)=0x8) sendfile(r3, r6, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000840)={r0, @in={{0x2, 0x4e24, @multicast1}}, 0x7, 0x200, 0x9, 0x6, 0x82}, &(0x7f0000000900)=0x98) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:25:08 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001200)={0x2, 0x2, {0x0, 0x0, 0x1f, 0x3, 0x1}}) 12:25:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4) r1 = gettid() arch_prctl$ARCH_SET_GS(0x1001, 0x1ff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x2, 0x1, &(0x7f0000000680)=""/229, &(0x7f0000000780)=""/181, &(0x7f0000000840)=""/192, 0x1}) syz_open_procfs(r1, &(0x7f0000000900)='net/ip6_mr_vif\x00') timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}}, 0x0) tkill(r1, 0x1104400000016) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x14, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000280)="0c41582c6d43ec4c226119", 0xb, 0x100000001}, {&(0x7f00000002c0)="6365f539d3c3235a01089fc0c05eb34ac5d60333988f9fbc021a7e9a1b33e36c1f27c05df479816e3fbb701d2fd1bbcd64446a4db15b7c85bec397dd44800c7969f7f4b294c0eac099b8b19d6c2868e14fb856d827405f1a7fd5b52caf5c2e554fa8735a140e0b37356a6775bceca0c0dd582f5c216da977bcddca6aaf1daf0bf9801baf7a892b881bdce1457afed80b3fcf1f4ae63d085088dd6329029bd22d21e3b55bfdf144c0226299d7278f6d1fd9074a0654bf1263eac7c68a8d31af008b35b4c90b5a7b5a3cb58c710c61a1f1842eb465b199e9c441dac95179b4c2d6a8dba3eafd98fe", 0xe7, 0x8000}, {&(0x7f00000003c0)="b4969b86929a78ff6abf33374b81e878beb7814073b7e07f67d86d823945fba4a8991d77721cd3bc878320240aab8a4b706b4f423cf9695e241beed085d96e2f604f689eac7c7b157548c26dbe272dc608fc664be169639dd4ba845017e67f2a7d0f54bef5cd8a16438804478f2d87c5a284e1b2aa2ccdd4ba1e364f65cf726898d0ab31b30af63dff6e238c5fd76d", 0x8f, 0x5}, {&(0x7f0000000480)="f9891de19f4fa2294998980c1bd0f7956db5869597ae277eecce470db9ee186de84ca936e71d3f5196554c210daf7741f8dcd1ef1f0ff56652f9d507d2280c856813679962f5ec5fdebe1226562a55c75cf7f90fe467f6a2a6aeff6b6940b7619feceecec2cd18dcdfe34df4b1324e086a59effe22cd848cd5a2be48aa23f73d4a02314fe15ae45a6cdcb6ccee4ff25ba83e61b266e4239825c416654791256c5ce32dc627e0fc5189971c7e8fa69acda7c8b2cd77", 0xb5, 0x7}, {&(0x7f0000000540)="b8be057f023399c854ceae16539b09f44889acfaa5ab1a63be1cb0ffcde3907349288118278c1fe348c4a642784d9ba6b8794249e9d0ef39b85283483c9190582da0ab357936f9708c525d1aa4d102ce46bbf0783bb84db4bee4cfaea3b38f8cbeb091e155076d383303d690603b869e", 0x70, 0x5d}], 0x808090, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000640)=0x9) 12:25:08 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x0, 0x1711eb2c, 0x1e000000, r3}, 0x10) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 237.594440] gfs2: invalid mount option: fscontext=user_u [ 237.612867] gfs2: can't parse mount arguments [ 237.686251] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.695712] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:25:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x0) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x40000, 0x0, [0x8, 0x2, 0x4, 0x0, 0x0, 0x80, 0x100000000, 0x7fffffff]}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)}], 0x1, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000300)=@nl=@proc, &(0x7f00000002c0)=0xffffffffffffff69, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc5122219818583a12bbe1971b9cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x82}}], 0x1, 0x0) connect(r2, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 12:25:08 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x30, 0x0, 0x328}, &(0x7f0000000300)=0x18) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:08 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) open(&(0x7f00000011c0)='./file0\x00', 0x50100, 0x100) 12:25:08 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000a40)='/dev/input/mouse#\x00', 0x1d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x200000000000000, 0x0, 0xff00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0xff00000000000000) socket$kcm(0x2, 0x8000000501fffc, 0x2) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x12002, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000400)=0xd000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x40, 0x12) open$dir(&(0x7f0000000940)='./file0\x00', 0x202000, 0xe5) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x8000, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000980)={0x7, 0x7f, 0x1}, 0x7) prctl$PR_SVE_SET_VL(0x32, 0x2d622) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x800) connect(r1, &(0x7f0000000580)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) [ 237.895897] gfs2: invalid mount option: fscontext=user_u [ 237.908014] gfs2: can't parse mount arguments 12:25:08 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000280)={0xd, 0x7b6}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 237.971781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:25:08 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) r4 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000001140)={{0x2, 0x6}, {0x10001, 0x7f}, 0x1, 0x1, 0x7fff}) 12:25:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x0) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x40000, 0x0, [0x8, 0x2, 0x4, 0x0, 0x0, 0x80, 0x100000000, 0x7fffffff]}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)}], 0x1, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000300)=@nl=@proc, &(0x7f00000002c0)=0xffffffffffffff69, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc5122219818583a12bbe1971b9cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x82}}], 0x1, 0x0) connect(r2, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 12:25:08 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 238.109400] gfs2: invalid mount option: fscontext=user_u [ 238.141261] gfs2: can't parse mount arguments 12:25:08 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000980)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000005c0)={0x0, 0x78f3}, &(0x7f0000000600)=0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000640)=0xffffffffffffd801) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) ioctl$KDDISABIO(r2, 0x4b37) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000940)=0x9008000) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) fremovexattr(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="63727ba7000000000000ce7f690025201c0000230000"]) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) pselect6(0x40, &(0x7f0000000580)={0x5, 0x5, 0x2, 0xb0, 0x200, 0x7fff, 0x31e3, 0x80}, &(0x7f0000000680)={0x2, 0x4aa6, 0x200, 0x1, 0x0, 0x3, 0x0, 0xc0}, &(0x7f0000000740)={0x1ff, 0x5, 0x0, 0x0, 0x401, 0x3, 0x8}, &(0x7f0000000780), &(0x7f0000000800)={&(0x7f00000007c0)={0x9}, 0x8}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={r0, 0x7}, &(0x7f0000000380)=0x8) sendfile(r3, r6, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000840)={r0, @in={{0x2, 0x4e24, @multicast1}}, 0x7, 0x200, 0x9, 0x6, 0x82}, &(0x7f0000000900)=0x98) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:25:08 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x6ded, 0x800) [ 238.550611] gfs2: invalid mount option: fscontext=user_u [ 238.614828] gfs2: can't parse mount arguments [ 238.676656] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:25:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="03002d0270700000000000") socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x6) listen(r1, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @local}, 0x3, 0x2, 0x4}}, 0x26) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r3 = accept(r1, &(0x7f0000000140)=@can, &(0x7f0000000080)=0x80) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000240)={0x81, 0x400, 0x1}) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000200)=0x400, 0x4) sched_setscheduler(r2, 0x2, &(0x7f0000000100)=0xffffffffffffffe1) 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:11 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') setsockopt$inet6_buf(r2, 0x29, 0x1b, &(0x7f0000001000)="1c70e7a98d7c002843130989c35c717304d496a910ecd80dd139c0dde85c9fd6b988c498765c87baab4a82943b1cdb496fc50300686de717b7778023505407a61e9dc4442f7c9e4029688f7ae09bb7c23783527a4ef7ce425dbc9c818b5cb0bc57ba8402f7e15efabb1faee3a511e9ac9fb4d76592dce3a51f5c279c7bb666efda0e5a648e60a143bad4b16eafbb8d824ec8e3c03dea6af8f276598bbd89cf20ce30f8bdc711169aee1317e0854ed25d2a3684f54257ec9964b18b52c2e39eeb09ada7f9b89722597845602ebaf448ff814a588e4e203fecdb0f8cd4918b6b7dba", 0xe1) 12:25:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x45, @mcast1, 0x7fff}}, 0x8001, 0x2, 0x81, 0x6, 0x26}, 0x98) 12:25:11 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000980)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000005c0)={0x0, 0x78f3}, &(0x7f0000000600)=0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000640)=0xffffffffffffd801) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) ioctl$KDDISABIO(r2, 0x4b37) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000940)=0x9008000) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) fremovexattr(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="63727ba7000000000000ce7f690025201c0000230000"]) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) pselect6(0x40, &(0x7f0000000580)={0x5, 0x5, 0x2, 0xb0, 0x200, 0x7fff, 0x31e3, 0x80}, &(0x7f0000000680)={0x2, 0x4aa6, 0x200, 0x1, 0x0, 0x3, 0x0, 0xc0}, &(0x7f0000000740)={0x1ff, 0x5, 0x0, 0x0, 0x401, 0x3, 0x8}, &(0x7f0000000780), &(0x7f0000000800)={&(0x7f00000007c0)={0x9}, 0x8}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={r0, 0x7}, &(0x7f0000000380)=0x8) sendfile(r3, r6, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000840)={r0, @in={{0x2, 0x4e24, @multicast1}}, 0x7, 0x200, 0x9, 0x6, 0x82}, &(0x7f0000000900)=0x98) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:25:11 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x90000, 0x4) sched_getattr(r0, &(0x7f0000000300), 0x30, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="31aed06dd7f1f7638a6e5d251e2c32d6ed2449664481974b5d201a7af9a6f173762e3312e7f9de"], &(0x7f0000000100)=0x39) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e24, 0x2, @empty, 0x6ca9}}}, &(0x7f0000000240)=0x84) clock_nanosleep(0xc, 0x2, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 240.631861] gfs2: invalid mount option: fscontext=user_u [ 240.671815] gfs2: can't parse mount arguments 12:25:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x4c) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x8, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 12:25:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x200, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xe2f2, 0x5, [0x4b, 0xbf6, 0x7ff, 0x101, 0xffffffffffffff81]}, &(0x7f0000000140)=0x12) 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000200)) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:11 executing program 3: mkdir(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000080)={0x33, 0x30ef, 0x9, 0x1f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r2, 0x4) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3c}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) [ 240.788400] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:25:11 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000fc0)='wlan0vboxnet0%\x00') 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 240.941405] gfs2: invalid mount option: fscontext=user_u [ 240.947628] gfs2: can't parse mount arguments 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) prctl$PR_GET_SECCOMP(0x15) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:11 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000f80)={0x57, 0x8, 0x8, {0x5, 0x7}, {0x3, 0x7}, @period={0x5f, 0x8, 0x101, 0xff, 0xffffffff, {0x101, 0x9, 0x7fffffff, 0x3}, 0x4, &(0x7f0000000f40)=[0xf6, 0x7f, 0x3, 0x10001]}}) 12:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) sync_file_range(r1, 0x5, 0x8, 0x4) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 241.201707] gfs2: invalid mount option: fscontext=user_u [ 241.239641] gfs2: can't parse mount arguments 12:25:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x200, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xe2f2, 0x5, [0x4b, 0xbf6, 0x7ff, 0x101, 0xffffffffffffff81]}, &(0x7f0000000140)=0x12) 12:25:12 executing program 3: mkdir(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000080)={0x33, 0x30ef, 0x9, 0x1f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r2, 0x4) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3c}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 12:25:12 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value={0x0}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e00)={r3, @in6={{0xa, 0x4e22, 0x4, @loopback, 0xd9}}, [0x4, 0xfffffffffffffffb, 0x7f, 0x401, 0xffffffffffffa366, 0x5, 0x3f, 0x82e5, 0xfff, 0xfff, 0x0, 0x2, 0x101, 0x100000001, 0x5]}, &(0x7f0000000f00)=0x100) 12:25:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x4c) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x8, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 12:25:12 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x4c) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x8, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 12:25:12 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 241.712945] gfs2: invalid mount option: fscontext=user_u [ 241.734138] gfs2: can't parse mount arguments 12:25:12 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000d80)=@assoc_value, &(0x7f0000000dc0)=0x8) 12:25:12 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) dup3(r0, r0, 0x80000) pipe2$9p(&(0x7f00000000c0), 0x80800) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:12 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) dup3(r0, r0, 0x80000) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 241.927550] gfs2: invalid mount option: fscontext=user_u [ 241.938735] gfs2: can't parse mount arguments 12:25:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x200, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xe2f2, 0x5, [0x4b, 0xbf6, 0x7ff, 0x101, 0xffffffffffffff81]}, &(0x7f0000000140)=0x12) 12:25:12 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000800)={0x2, 0x5, 0x1, 0x80, 0x7, [{0x1, 0x6a, 0x7987, 0x0, 0x0, 0x280}, {0x6, 0x9, 0x480000000000, 0x0, 0x0, 0x404}, {0x81, 0x7, 0xec, 0x0, 0x0, 0x3987}, {0x87f5, 0x10000, 0x9, 0x0, 0x0, 0x208}, {0x100000001, 0x20, 0x1, 0x0, 0x0, 0x2002}, {0x3, 0x1, 0x3, 0x0, 0x0, 0xa86}, {0x1eb3, 0xffffffffffff8000, 0xfff}]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:12 executing program 5: mkdir(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000080)={0x33, 0x30ef, 0x9, 0x1f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r2, 0x4) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3c}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) [ 242.201752] gfs2: invalid mount option: fscontext=user_u [ 242.207274] gfs2: can't parse mount arguments 12:25:15 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x7f, 0xfffffffffffffe5d) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000980)=ANY=[@ANYRESOCT=r2], 0x0, &(0x7f00000001c0)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r4, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x5, 0x85) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={r9, 0x0, &(0x7f00000014c0)}, &(0x7f0000000100)=0xd) io_submit(r8, 0x1, &(0x7f0000000780)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x2, r4, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x4000000001, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r3) memfd_create(&(0x7f0000000640), 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r3, r7, &(0x7f0000000380), 0x2000005) 12:25:15 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 12:25:15 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000007c0)={0x0, 0x1, [0x90, 0x19, 0x83c4, 0x5, 0xfffffffffffffeff, 0x2, 0xd53b, 0x8000]}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:15 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x200, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xe2f2, 0x5, [0x4b, 0xbf6, 0x7ff, 0x101, 0xffffffffffffff81]}, &(0x7f0000000140)=0x12) 12:25:15 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 244.747844] gfs2: invalid mount option: fscontext=user_u [ 244.774788] gfs2: can't parse mount arguments 12:25:15 executing program 4: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:15 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000006c0)={{0x2, 0x1, 0x91, 0x3, 0xffffffffffffff93}, 0x7, 0xffff, 'id1\x00', 'timer1\x00', 0x0, 0x20, 0xffffffffffffffe1, 0xffffffff, 0xffff}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:15 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 12:25:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x200, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x90) 12:25:15 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 245.020823] gfs2: invalid mount option: fscontext=user_u [ 245.035811] gfs2: can't parse mount arguments 12:25:15 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x7f, 0xfffffffffffffe5d) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000980)=ANY=[@ANYRESOCT=r2], 0x0, &(0x7f00000001c0)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r4, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x5, 0x85) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={r9, 0x0, &(0x7f00000014c0)}, &(0x7f0000000100)=0xd) io_submit(r8, 0x1, &(0x7f0000000780)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x2, r4, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x4000000001, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r3) memfd_create(&(0x7f0000000640), 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r3, r7, &(0x7f0000000380), 0x2000005) 12:25:15 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x7f, 0xfffffffffffffe5d) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000980)=ANY=[@ANYRESOCT=r2], 0x0, &(0x7f00000001c0)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r4, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x5, 0x85) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={r9, 0x0, &(0x7f00000014c0)}, &(0x7f0000000100)=0xd) io_submit(r8, 0x1, &(0x7f0000000780)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x2, r4, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x4000000001, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r3) memfd_create(&(0x7f0000000640), 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r3, r7, &(0x7f0000000380), 0x2000005) 12:25:15 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x100000000, 0x1ff, 0x977}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:15 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:15 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x7f, 0xfffffffffffffe5d) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000980)=ANY=[@ANYRESOCT=r2], 0x0, &(0x7f00000001c0)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r4, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x5, 0x85) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={r9, 0x0, &(0x7f00000014c0)}, &(0x7f0000000100)=0xd) io_submit(r8, 0x1, &(0x7f0000000780)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x2, r4, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x4000000001, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r3) memfd_create(&(0x7f0000000640), 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r3, r7, &(0x7f0000000380), 0x2000005) 12:25:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) dup(r0) [ 245.271109] gfs2: invalid mount option: fscontext=user_u [ 245.288943] gfs2: can't parse mount arguments 12:25:15 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:16 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) prctl$PR_GET_THP_DISABLE(0x2a) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:16 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:16 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x2) listen(r0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0xff) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 12:25:16 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 245.524390] gfs2: invalid mount option: fscontext=user_u [ 245.542224] gfs2: can't parse mount arguments 12:25:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x0, 0x6, 0x661f, 0x1, [{0x100000000, 0x7, 0x59b, 0x0, 0x0, 0x900}]}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@newsa={0x310, 0x10, 0xb08, 0x70bd26, 0x25dfdbfe, {{@in6=@mcast2, @in6=@mcast2, 0x4e21, 0x5, 0x4e20, 0x3, 0xa, 0xa0, 0x20, 0x32, r1, r2}, {@in6=@mcast1, 0x4d6, 0x3b}, @in6=@loopback, {0xfffffffffffffeff, 0xd9e5, 0x0, 0x4, 0x4, 0x4, 0x5a}, {0x0, 0x44b0895a, 0x7, 0x3ff}, {0x3, 0xc90}, 0x70bd28, 0x0, 0xe8e3e3268b4c2b14, 0x1, 0xc0000, 0x21}, [@tfcpad={0x8, 0x16, 0x1}, @coaddr={0x14, 0xe, @in6=@ipv4={[], [], @multicast2}}, @algo_aead={0x140, 0x12, {{'aegis128l-aesni\x00'}, 0x798, 0x60, "ca73b7e9340018de0ac4b1e22dc65059307319bd728548b8b0da0e2c71f46ae8cd30e38f7501ce259bc5d74351eebad3072e62c5ecf763487a8cf86ed43dec719b9af0fbaf0c707bc14e853202f8e463da187650d29307d29d021fdaceef2e5c11de0fd0afac1d96ed37cbfd11155219ae9882610a0b790b881f64c71cbd35b5dfda2b541a38461951b70c1aba75badc25d4d7d6993bac187d48d64e511adf00215b71b151f50858d99d88d1833c7e7bc453cc066139ace6dacd80d7d5e1709da1680b2216daec72507a69f7f33c767cea226a3cf7803ee9cd8c402e471eada5694aaa22d1a4c674bc2c778b59cb6d3a82cd6b"}}, @tmpl={0xc4, 0x5, [{{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@remote, 0x3506, 0x3, 0x0, 0x0, 0x5d, 0xfe7, 0x7f}, {{@in=@remote, 0x4d4, 0x32}, 0x2, @in=@remote, 0x0, 0x4, 0x0, 0x1, 0x33cb, 0x0, 0x9}, {{@in6=@dev={0xfe, 0x80, [], 0x16}, 0x4d5, 0x3c}, 0x2, @in6=@mcast1, 0x3507, 0x4, 0x1, 0x9e1a, 0x8707, 0x8, 0x2f}]}]}, 0x310}}, 0x0) 12:25:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)={0x81, 0x4, 0x5, 0x2, 0x7f, 0xffffffff7fffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', '\x00'}, &(0x7f0000000240)=""/235, 0x41) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/24, &(0x7f0000000200)=0x18) 12:25:16 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000640)=0x2) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') flock(r1, 0x9612e450ebf86f3a) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x66fe, 0x5, 0x80, 0x401, 0x0, 0x8, 0x0, 0x0, 0x4, 0x5, 0xfffffffffffffffa, 0x7, 0x5, 0x1, 0x3f, 0x1, 0x7ff, 0x7, 0x20, 0x10001, 0x2, 0x6, 0x0, 0xfffffffffffffff9, 0xff, 0x2, 0x60, 0x1, 0xfffffffffffffffb, 0x3, 0x0, 0x1ff, 0x3ff, 0x7, 0x100, 0x4, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x100, 0x2, 0x9, 0xd458, 0x2, 0x10001}, r3, 0x7, 0xffffffffffffff9c, 0x3) 12:25:16 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0xf, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f00000000c0)='vboxnet1#self\x00', 0xffffffffffffffff}, 0x30) ptrace$getregs(0xe, r1, 0xff, &(0x7f0000000440)=""/182) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000180)=0x2) clone(0x10000, &(0x7f0000000240)="c74f062570d0627a050f43c1fa0901fe235f79c9f57947ca97ee54231440b305f96f435251a49db90634479ecc9bae1fbdb8cd325fad9ccf7a6721ab592864408764f9a3560cb7bd6495305390f5bf3594aed8ffad2b671ce7bacc45f5eec179525b78a2a58c4176c67a6131b63a72d134fff10a8bfa8984949dd4cff0255f7bc1ba855400ddec94d4c8c67eb7f0f3e0c31771f2ed19a2b539653d4324fe59b5b5b6161a05c8c6b42827469cccbf58f4c9b03878264263f80f7540d617e5c53bd272a0635ac4d0e1e2146401419770555a57", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000340)="537b2759967f85aa1715187cc9e515320d44f1c27266bcf8b25bfc6cd806d5fc3569b5f675e1a8ce56b415f6599007be1d7cc340ec9818199f953af55eab9c33ec2628f551a82e5dd05d39d917f0df4bbbda9e1d250110ac8ded335fc1666b7a6068a5368106f9342bf9a9a525916057dc2bc22269588260f7f79911ee6221ebad6046d4ac9c4dcd3d339602bcca884c87f0267d2c8d45fa128fbb85b033bd1337e2309509f84a17bddc64fc6b15e0393f27997717f885637457e98176e0aed5bea42974a8274dd44f3bb9ff79405aa98dc60a96870cf525ba366aa700464a50c5875e8581fac0261a7ff8067b8152") r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000240)}, 0x20) [ 245.767435] gfs2: invalid mount option: fscontext=user_u [ 245.793695] gfs2: can't parse mount arguments 12:25:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="73797374656d2e706f7369785f61636c5f64656661756c748c", &(0x7f0000000cc0), 0x24, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000240)}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, &(0x7f0000001680)) tkill(r1, 0x15) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2100, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0/file0\x00', 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:25:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:16 executing program 3: ppoll(&(0x7f0000000140)=[{}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) rmdir(&(0x7f0000000580)='./bus\x00') setresuid(0x0, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setreuid(r1, 0x0) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)='eth0))posix_acl_accesswlan0eth1eth0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='+.security\x00', 0xb, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) add_key(&(0x7f00000005c0)='.dead\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640), 0x0, 0x0) getpgrp(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x100000000, 0x40001}) 12:25:16 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:16 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x10000, 0x0) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f00000000c0), 0xc, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616ef2ffff0b00040008000300b3fdea5a"], 0x40}}, 0x0) 12:25:16 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, 0x0) 12:25:16 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) [ 246.094577] gfs2: invalid mount option: fscontext=user_u [ 246.101963] gfs2: can't parse mount arguments 12:25:16 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x7, 0x5) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r1, 0x127f, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff29, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200242, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) 12:25:16 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, 0x0) 12:25:16 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) 12:25:16 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) write$binfmt_misc(r0, &(0x7f0000000540)={'syz1', "05bb195e42590b4d4fc1a1a028c799b76caaf9885dff366309a36b1be98a781e123adc6c7300f3e48bac8ff4a1bc13b2efa77d7973c9db0673811d5ab7a50c6273d98a97fba040d2a65e0d2afb1fa884dc46c33de06c4bfed82af4a5303b4c09160ccc642beb42e2b6af9daf2780b01ffc500002c97f2b6f14c3a04025d757daa23e1adf7933042a9e4f8877f893829ec6dbe828937d017a55bec05e8f4f1d932afabec5995d"}, 0xaa) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:16 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x5c) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1000007, 0x12, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc00}], 0x1, 0x0) sendfile(r3, r0, &(0x7f0000000080), 0x0) 12:25:16 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, 0x0) [ 246.360755] gfs2: invalid mount option: fscontext=user_u [ 246.407682] audit: type=1804 audit(1544012716.996:31): pid=8267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir535820475/syzkaller.X4xkE9/16/bus" dev="sda1" ino=16581 res=1 [ 246.418103] gfs2: can't parse mount arguments [ 246.475968] audit: type=1804 audit(1544012717.026:32): pid=8267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir535820475/syzkaller.X4xkE9/16/bus" dev="sda1" ino=16581 res=1 [ 246.537018] audit: type=1804 audit(1544012717.036:33): pid=8267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir535820475/syzkaller.X4xkE9/16/bus" dev="sda1" ino=16581 res=1 [ 246.561450] audit: type=1804 audit(1544012717.036:34): pid=8270 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir535820475/syzkaller.X4xkE9/16/bus" dev="sda1" ino=16581 res=1 [ 246.585968] audit: type=1804 audit(1544012717.036:35): pid=8267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir535820475/syzkaller.X4xkE9/16/bus" dev="sda1" ino=16581 res=1 12:25:17 executing program 3: ppoll(&(0x7f0000000140)=[{}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) rmdir(&(0x7f0000000580)='./bus\x00') setresuid(0x0, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setreuid(r1, 0x0) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)='eth0))posix_acl_accesswlan0eth1eth0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='+.security\x00', 0xb, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) add_key(&(0x7f00000005c0)='.dead\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640), 0x0, 0x0) getpgrp(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x100000000, 0x40001}) 12:25:17 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) 12:25:17 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0x0, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d3ab27191a01", 0x6) write$binfmt_elf32(r1, &(0x7f00000005c0)=ANY=[], 0x216) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 12:25:17 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000500)={0x4, r1}) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x7, 0x5) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r1, 0x127f, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff29, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200242, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) 12:25:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:17 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0x0, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 246.915949] gfs2: invalid mount option: fscontext=user_u [ 246.954621] gfs2: can't parse mount arguments 12:25:17 executing program 5: ppoll(&(0x7f0000000140)=[{}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) rmdir(&(0x7f0000000580)='./bus\x00') setresuid(0x0, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setreuid(r1, 0x0) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)='eth0))posix_acl_accesswlan0eth1eth0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='+.security\x00', 0xb, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) add_key(&(0x7f00000005c0)='.dead\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640), 0x0, 0x0) getpgrp(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x100000000, 0x40001}) 12:25:17 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000004c0)) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:17 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0x0, @sliced={0xd5f, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) [ 247.163481] gfs2: invalid mount option: fscontext=user_u [ 247.188023] gfs2: can't parse mount arguments 12:25:18 executing program 3: ppoll(&(0x7f0000000140)=[{}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) rmdir(&(0x7f0000000580)='./bus\x00') setresuid(0x0, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setreuid(r1, 0x0) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)='eth0))posix_acl_accesswlan0eth1eth0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='+.security\x00', 0xb, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) add_key(&(0x7f00000005c0)='.dead\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640), 0x0, 0x0) getpgrp(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x100000000, 0x40001}) 12:25:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7, 0x2], 0x1}}) 12:25:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:18 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x7, 0x5) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r1, 0x127f, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff29, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200242, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) 12:25:18 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x0, 0x140, 0x140, 0x140, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, &(0x7f0000000080), {[{{@ipv6={@local, @ipv4={[], [], @local}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x99, 0x6, 0x5a0de048a4f2d087, 0x3c}, 0x0, 0x120, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x80000001, 0x8, 0x2, 0x208, 0x1000}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x11}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xff000000, 0xff, 0xffffffff], 'ip6_vti0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x7046b490, 0x0, 0x10}, 0x0, 0x158, 0x188, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x8, 0x1, 0x10000, 0x101, @local, @loopback, @ipv4={[], [], @empty}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0x0, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x884, 0x2000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7fff, 0x4, 0x4, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e, 0x7], 0x1}}) [ 247.757185] gfs2: invalid mount option: fscontext=user_u [ 247.779686] gfs2: can't parse mount arguments 12:25:18 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:18 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x7, 0x5) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r1, 0x127f, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff29, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200242, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) 12:25:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff, 0x8e], 0x1}}) 12:25:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1, 0xff], 0x1}}) [ 248.011994] gfs2: invalid mount option: fscontext=user_u [ 248.046045] gfs2: can't parse mount arguments 12:25:19 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x8000, 0x20400) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000240)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="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", 0x101, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:25:19 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x7, 0x5) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r1, 0x127f, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff29, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200242, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) 12:25:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000"}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:19 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fchdir(r0) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b, 0x1], 0x1}}) 12:25:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/32) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) setrlimit(0xe, &(0x7f0000000040)={0x0, 0x2}) 12:25:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01, 0x3b], 0x1}}) 12:25:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) [ 248.684045] gfs2: invalid mount option: fscontext=user_u [ 248.695502] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 248.706344] gfs2: can't parse mount arguments [ 248.712717] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 248.733025] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities 12:25:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589, 0xffffffffffffff01], 0x1}}) 12:25:19 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:19 executing program 3: mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x200000, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000001c0), 0x1e0) 12:25:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) r2 = geteuid() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x3f, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="dd500953430648790e9e2ea26cdd399708b2dbac045155a1f8d9e4a1692c10ca8a6c53f7d8e2cc9a8cc238c9561f204b473f977543ed637a9e74766bca74caae411455987ce084e104f0991b381c88c3680e4399ba1c540df273e0608bea8958d62107ada8859561552bb96f1466d7ef1d8133892f7b68c7161c0b3945424a01fb569145172e949ba37fd45d3dc0b57c6d3eecbe53d283b94054caf477d66c4d74a96fc69b66bfa073579573d599fdcc550cf0d3c9166c916f3959ab95bf4a65e7354379ef50307823d7927fa980c990306213615128ddfd63114bfdf705ab17d526581660fa1d9455566086c01bc4617289697747ccc4a24d", 0xf9, 0x4}], 0x2002, &(0x7f0000000300)={[{@uni_xlateno='uni_xlate=0'}], [{@audit='audit'}, {@fowner_gt={'fowner>', r1}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfshat={'smackfshat'}}]}) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x7fffef79, &(0x7f0000005b00), 0x7}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x1f4, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 12:25:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000037c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000140)="9c425a6d090131092c7aa8ba184b93dfb4b53b0196832ae0d577962f80e3163e84e0e5ada56dd3cccab0f25f42b6856e43654ac24ccd5e8cd612361b853603768a4c5b4fccbff87a2a", 0x0}, 0x18) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0xfffffffffffffffa}, 0xfffffffffffffc1e) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x40000000) r4 = inotify_init1(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000015c0)=0xe8) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() getresgid(&(0x7f00000016c0)=0x0, &(0x7f0000001700), &(0x7f0000001740)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() getresgid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) r14 = getegid() stat(&(0x7f0000001980)='./file1\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000001340)='system.posix_acl_default\x00', &(0x7f0000001a40)={{}, {0x1, 0x7}, [{0x2, 0x4, r5}, {0x2, 0x2, r6}, {0x2, 0x5, r7}, {0x2, 0x2, r8}], {}, [{0x8, 0x1, r9}, {0x8, 0x0, r10}, {0x8, 0x1, r11}, {0x8, 0x3, r12}, {0x8, 0x2, r13}, {0x8, 0x2, r14}, {0x8, 0x3, r15}], {}, {0x20, 0x1}}, 0x7c, 0x1) inotify_init() inotify_add_watch(r4, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r16 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r4, r16) ioctl$TCSETAW(r4, 0x5407, &(0x7f00000000c0)={0x3, 0xffffffff00000000, 0x1, 0x6, 0x100000001, 0x0, 0x100000001, 0x3, 0x44b, 0x6}) io_setup(0x1ff, &(0x7f0000001240)=0x0) io_submit(r17, 0x2, &(0x7f0000003600)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000001280)="38c4b9f670d1c46621d8fc25d96b48e5e447832fd30fdea951a57bf9e4ca652ecd186a3b484dc562ecd5bfabb69a84bff2d843979dd6c62a620a198e0cdd5e5727e7b9d6adcef4e994b55f024023b330c976710a0c1f995862565090c0c0ca11ce1027a81a8cc2c8efe4693dd9774777", 0x70, 0x7, 0x0, 0x1, r16}, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x6, r0, 0x0, 0x0, 0xde, 0x0, 0x1}]) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) 12:25:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e, 0x589], 0x1}}) 12:25:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) close(r0) [ 248.955142] gfs2: invalid mount option: fscontext=user_u [ 248.987366] gfs2: can't parse mount arguments 12:25:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 12:25:19 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:19 executing program 5: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') pread64(r0, &(0x7f0000000200)=""/183, 0xb7, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) 12:25:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100, 0x53e], 0x1}}) 12:25:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 12:25:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) close(r0) [ 249.325679] gfs2: invalid mount option: fscontext=user_u [ 249.429493] gfs2: can't parse mount arguments 12:25:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000, 0x100], 0x1}}) 12:25:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) close(r0) [ 250.882533] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:25:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9, 0x8000], 0x1}}) 12:25:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000037c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000140)="9c425a6d090131092c7aa8ba184b93dfb4b53b0196832ae0d577962f80e3163e84e0e5ada56dd3cccab0f25f42b6856e43654ac24ccd5e8cd612361b853603768a4c5b4fccbff87a2a", 0x0}, 0x18) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0xfffffffffffffffa}, 0xfffffffffffffc1e) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x40000000) r4 = inotify_init1(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000015c0)=0xe8) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() getresgid(&(0x7f00000016c0)=0x0, &(0x7f0000001700), &(0x7f0000001740)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() getresgid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) r14 = getegid() stat(&(0x7f0000001980)='./file1\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000001340)='system.posix_acl_default\x00', &(0x7f0000001a40)={{}, {0x1, 0x7}, [{0x2, 0x4, r5}, {0x2, 0x2, r6}, {0x2, 0x5, r7}, {0x2, 0x2, r8}], {}, [{0x8, 0x1, r9}, {0x8, 0x0, r10}, {0x8, 0x1, r11}, {0x8, 0x3, r12}, {0x8, 0x2, r13}, {0x8, 0x2, r14}, {0x8, 0x3, r15}], {}, {0x20, 0x1}}, 0x7c, 0x1) inotify_init() inotify_add_watch(r4, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r16 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r4, r16) ioctl$TCSETAW(r4, 0x5407, &(0x7f00000000c0)={0x3, 0xffffffff00000000, 0x1, 0x6, 0x100000001, 0x0, 0x100000001, 0x3, 0x44b, 0x6}) io_setup(0x1ff, &(0x7f0000001240)=0x0) io_submit(r17, 0x2, &(0x7f0000003600)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000001280)="38c4b9f670d1c46621d8fc25d96b48e5e447832fd30fdea951a57bf9e4ca652ecd186a3b484dc562ecd5bfabb69a84bff2d843979dd6c62a620a198e0cdd5e5727e7b9d6adcef4e994b55f024023b330c976710a0c1f995862565090c0c0ca11ce1027a81a8cc2c8efe4693dd9774777", 0x70, 0x7, 0x0, 0x1, r16}, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x6, r0, 0x0, 0x0, 0xde, 0x0, 0x1}]) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) 12:25:21 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) close(r0) 12:25:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 12:25:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26, 0x9], 0x1}}) 12:25:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) 12:25:22 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:22 executing program 5: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') pread64(r0, &(0x7f0000000200)=""/183, 0xb7, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) 12:25:22 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80, 0x26], 0x1}}) 12:25:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) 12:25:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) 12:25:22 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3, 0x80], 0x1}}) 12:25:23 executing program 1: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') pread64(r0, &(0x7f0000000200)=""/183, 0xb7, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) 12:25:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) 12:25:23 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f0000000a00)='./file0\x00', 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:23 executing program 5: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') pread64(r0, &(0x7f0000000200)=""/183, 0xb7, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) 12:25:23 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3], 0x1}}) 12:25:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) [ 254.729461] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:25:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0, 0x3], 0x1}}) 12:25:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:25 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', 0x0, 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000037c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000140)="9c425a6d090131092c7aa8ba184b93dfb4b53b0196832ae0d577962f80e3163e84e0e5ada56dd3cccab0f25f42b6856e43654ac24ccd5e8cd612361b853603768a4c5b4fccbff87a2a", 0x0}, 0x18) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0xfffffffffffffffa}, 0xfffffffffffffc1e) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x40000000) r4 = inotify_init1(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000015c0)=0xe8) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() getresgid(&(0x7f00000016c0)=0x0, &(0x7f0000001700), &(0x7f0000001740)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() getresgid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) r14 = getegid() stat(&(0x7f0000001980)='./file1\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000001340)='system.posix_acl_default\x00', &(0x7f0000001a40)={{}, {0x1, 0x7}, [{0x2, 0x4, r5}, {0x2, 0x2, r6}, {0x2, 0x5, r7}, {0x2, 0x2, r8}], {}, [{0x8, 0x1, r9}, {0x8, 0x0, r10}, {0x8, 0x1, r11}, {0x8, 0x3, r12}, {0x8, 0x2, r13}, {0x8, 0x2, r14}, {0x8, 0x3, r15}], {}, {0x20, 0x1}}, 0x7c, 0x1) inotify_init() inotify_add_watch(r4, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r16 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r4, r16) ioctl$TCSETAW(r4, 0x5407, &(0x7f00000000c0)={0x3, 0xffffffff00000000, 0x1, 0x6, 0x100000001, 0x0, 0x100000001, 0x3, 0x44b, 0x6}) io_setup(0x1ff, &(0x7f0000001240)=0x0) io_submit(r17, 0x2, &(0x7f0000003600)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000001280)="38c4b9f670d1c46621d8fc25d96b48e5e447832fd30fdea951a57bf9e4ca652ecd186a3b484dc562ecd5bfabb69a84bff2d843979dd6c62a620a198e0cdd5e5727e7b9d6adcef4e994b55f024023b330c976710a0c1f995862565090c0c0ca11ce1027a81a8cc2c8efe4693dd9774777", 0x70, 0x7, 0x0, 0x1, r16}, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x6, r0, 0x0, 0x0, 0xde, 0x0, 0x1}]) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) 12:25:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff, 0x6b07c8f0], 0x1}}) 12:25:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth1\x00', 0x80}) close(r0) 12:25:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:25 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', 0x0, 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8, 0xffff], 0x1}}) 12:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', 0x0, 0x6f9c, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:26 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8], 0x1}}) 12:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) close(r0) 12:25:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 255.640772] FAULT_INJECTION: forcing a failure. [ 255.640772] name failslab, interval 1, probability 0, space 0, times 1 12:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x3, &(0x7f0000000c80)=[{&(0x7f0000000a40)="1c455e5fc6451a4e2ebb04da282bee9dfe9563c858be29d0cb7f90e12726a03f03132a307292f7c7f2e826bcfc3d53b629bf58d0d60a1c73812dda49dc4dbd22987e67bfdb4a3e7f4d58ed0a1994dc1a5f5ae4b04bcf0a3bcf1cc1aaa5dc6c441b115510138525bb0704", 0x6a, 0x1}, {&(0x7f0000000ac0)="8602a64d22c7d1ac6f855fa4f83db8ed75d9209007859b379fa8eb838083273783614121869a6de320b73e6bf342fca4b2fe196202f4ef360acadf732f4aec89eecedf4f44d446824cd75f0d67f9f5839d0e7d8e1edab271290db2a1fb290ab14280424dd52c4d83d9fbbabf2ab02b3a7892a5bd52622d1c57d608e1841f045781c321a673fed4271dded7f7e28e614c8c51057c4ee6e9ad6155f08523a270c7d4d3798b4ac6904e4fbc70691b3f58fd69f485040052089c73cccabb600049b799956925a706", 0xc6, 0x93d4}, {&(0x7f0000000bc0)="43bc83094027e47c848b910f384fb790cf8e0b25b90bdd360a8c87a6f532b3b4334c7e4f186d2a646fba74031d771a8e8a778e2e62c83bbe451409fe3d5912489b6b2198dc5bf489a2da94699186bba2adb74325ca65692e7e605b29dfe9275c22a157bb99a47c9e1e16313b45774a414466e46664ec7ed7baaced7f55901d8adde47b25d29b4705aa0d5ee5e822d0ca03215dfa1b2d5046a0c0d19c476a893cb46a2c93389ce5c5f4eefaf24f37ba3e16f45987b2151d5a", 0xb8, 0x5}], 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) [ 255.709315] CPU: 1 PID: 8606 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 255.718366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.727724] Call Trace: [ 255.730465] dump_stack+0x244/0x39d [ 255.734138] ? dump_stack_print_info.cold.1+0x20/0x20 [ 255.739397] should_fail.cold.4+0xa/0x17 [ 255.743484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.748672] ? graph_lock+0x270/0x270 [ 255.752550] ? br_get_link_af_size_filtered+0x1e1/0xce0 [ 255.757932] ? lock_downgrade+0x900/0x900 [ 255.762098] ? find_held_lock+0x36/0x1c0 [ 255.766194] ? __lock_is_held+0xb5/0x140 [ 255.770370] ? perf_trace_sched_process_exec+0x860/0x860 [ 255.775890] __should_failslab+0x124/0x180 [ 255.780195] should_failslab+0x9/0x14 [ 255.784055] kmem_cache_alloc_node+0x26e/0x730 [ 255.788702] __alloc_skb+0x114/0x770 [ 255.792434] ? netdev_alloc_frag+0x1f0/0x1f0 [ 255.796912] ? if_nlmsg_size+0x5d1/0xbb0 [ 255.801002] ? rtnetlink_put_metrics+0x690/0x690 [ 255.805833] ? mutex_trylock+0x2b0/0x2b0 [ 255.809924] ? lock_downgrade+0x900/0x900 [ 255.814126] ? check_preemption_disabled+0x48/0x280 [ 255.819159] rtmsg_ifinfo_build_skb+0x74/0x190 [ 255.823758] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 255.828619] rtnetlink_event+0x144/0x170 [ 255.832715] notifier_call_chain+0x17e/0x380 [ 255.837137] ? unregister_die_notifier+0x20/0x20 [ 255.841906] ? lock_downgrade+0x900/0x900 [ 255.846067] ? check_preemption_disabled+0x48/0x280 [ 255.851163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:25:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4, 0xb8], 0x1}}) [ 255.856781] ? rtnl_is_locked+0xb5/0xf0 [ 255.860783] ? rtnl_trylock+0x20/0x20 [ 255.864609] raw_notifier_call_chain+0x2d/0x40 [ 255.869220] call_netdevice_notifiers_info+0x3f/0x90 [ 255.874345] netdev_update_features+0x10a/0x140 [ 255.879040] ? __netdev_update_features+0x1c20/0x1c20 [ 255.884322] ? tun_chr_close+0x180/0x180 [ 255.888419] __tun_chr_ioctl+0xa22/0x46e0 [ 255.892580] ? find_held_lock+0x36/0x1c0 [ 255.896662] ? tun_chr_read_iter+0x1e0/0x1e0 [ 255.901080] ? lock_downgrade+0x900/0x900 [ 255.905248] ? check_preemption_disabled+0x48/0x280 12:25:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 255.910286] ? kasan_check_read+0x11/0x20 [ 255.914523] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 255.919822] ? rcu_read_unlock_special+0x370/0x370 [ 255.924799] ? __fget+0x4d1/0x740 [ 255.928282] ? ksys_dup3+0x680/0x680 [ 255.932020] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 255.936974] tun_chr_ioctl+0x2a/0x40 [ 255.940699] ? tun_chr_compat_ioctl+0x30/0x30 [ 255.945280] do_vfs_ioctl+0x1de/0x1790 [ 255.949191] ? __lock_is_held+0xb5/0x140 [ 255.953275] ? ioctl_preallocate+0x300/0x300 [ 255.953293] ? __fget_light+0x2e9/0x430 [ 255.953309] ? fget_raw+0x20/0x20 [ 255.953393] ? __sb_end_write+0xd9/0x110 [ 255.953418] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.953433] ? fput+0x130/0x1a0 [ 255.961960] ? do_syscall_64+0x9a/0x820 [ 255.961978] ? do_syscall_64+0x9a/0x820 [ 255.962013] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 255.978398] ? security_file_ioctl+0x94/0xc0 [ 255.988795] gfs2: invalid mount option: fscontext=user_u [ 255.991020] ksys_ioctl+0xa9/0xd0 [ 255.991041] __x64_sys_ioctl+0x73/0xb0 [ 255.991061] do_syscall_64+0x1b9/0x820 [ 255.991081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.991103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 256.000944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.001032] ? trace_hardirqs_on_caller+0x310/0x310 [ 256.001053] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 256.020929] gfs2: can't parse mount arguments [ 256.022532] ? prepare_exit_to_usermode+0x291/0x3b0 [ 256.022574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.022606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.056992] RIP: 0033:0x457569 12:25:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100, 0x4], 0x1}}) [ 256.060200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.079122] RSP: 002b:00007f07d639cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.086847] RAX: ffffffffffffffda RBX: 00007f07d639cc90 RCX: 0000000000457569 [ 256.094114] RDX: 0000000000000003 RSI: 00000000400454d0 RDI: 0000000000000003 [ 256.101368] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 12:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 256.108623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07d639d6d4 [ 256.115878] R13: 00000000004c1411 R14: 00000000004d2768 R15: 0000000000000004 12:25:26 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 12:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 12:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc, 0x100], 0x1}}) 12:25:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 256.356141] gfs2: invalid mount option: fscontext=user_u 12:25:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = dup(r0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2db, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0xfffffffffffffd95}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 256.405628] gfs2: can't parse mount arguments [ 256.409916] FAULT_INJECTION: forcing a failure. [ 256.409916] name failslab, interval 1, probability 0, space 0, times 0 12:25:27 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7, 0xfffffffffffffffc], 0x1}}) 12:25:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 256.514863] CPU: 0 PID: 8660 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 256.523425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.532780] Call Trace: [ 256.532807] dump_stack+0x244/0x39d [ 256.532841] ? dump_stack_print_info.cold.1+0x20/0x20 [ 256.532873] should_fail.cold.4+0xa/0x17 [ 256.548711] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.553876] ? __save_stack_trace+0x8d/0xf0 [ 256.558231] ? graph_lock+0x270/0x270 [ 256.562046] ? save_stack+0xa9/0xd0 [ 256.565684] ? save_stack+0x43/0xd0 [ 256.565705] ? find_held_lock+0x36/0x1c0 [ 256.565725] ? __lock_is_held+0xb5/0x140 [ 256.577560] ? dwc3_gadget_ep_free_request+0x2b8/0x430 [ 256.583278] ? graph_lock+0x270/0x270 [ 256.587098] ? perf_trace_sched_process_exec+0x860/0x860 [ 256.592566] ? check_preemption_disabled+0x48/0x280 [ 256.597598] __should_failslab+0x124/0x180 [ 256.601852] should_failslab+0x9/0x14 [ 256.605668] kmem_cache_alloc_node_trace+0x270/0x740 [ 256.610792] __kmalloc_node_track_caller+0x3c/0x70 [ 256.615741] __kmalloc_reserve.isra.38+0x41/0xe0 [ 256.620510] __alloc_skb+0x150/0x770 [ 256.624246] ? netdev_alloc_frag+0x1f0/0x1f0 [ 256.628671] ? if_nlmsg_size+0x5d1/0xbb0 [ 256.632748] ? rtnetlink_put_metrics+0x690/0x690 [ 256.637532] ? mutex_trylock+0x2b0/0x2b0 [ 256.641623] ? lock_downgrade+0x900/0x900 [ 256.645784] ? check_preemption_disabled+0x48/0x280 [ 256.650824] rtmsg_ifinfo_build_skb+0x74/0x190 [ 256.655428] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 256.660290] rtnetlink_event+0x144/0x170 [ 256.664384] notifier_call_chain+0x17e/0x380 [ 256.668816] ? unregister_die_notifier+0x20/0x20 [ 256.673588] ? lock_downgrade+0x900/0x900 [ 256.677750] ? check_preemption_disabled+0x48/0x280 [ 256.682785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.688345] ? rtnl_is_locked+0xb5/0xf0 [ 256.692341] ? rtnl_trylock+0x20/0x20 [ 256.696163] raw_notifier_call_chain+0x2d/0x40 [ 256.696185] call_netdevice_notifiers_info+0x3f/0x90 [ 256.696216] netdev_update_features+0x10a/0x140 [ 256.696238] ? __netdev_update_features+0x1c20/0x1c20 [ 256.705922] ? tun_chr_close+0x180/0x180 [ 256.705951] __tun_chr_ioctl+0xa22/0x46e0 [ 256.705968] ? find_held_lock+0x36/0x1c0 [ 256.705991] ? tun_chr_read_iter+0x1e0/0x1e0 [ 256.732668] ? lock_downgrade+0x900/0x900 [ 256.736820] ? check_preemption_disabled+0x48/0x280 [ 256.741856] ? kasan_check_read+0x11/0x20 [ 256.746014] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 256.751301] ? rcu_read_unlock_special+0x370/0x370 [ 256.756264] ? __fget+0x4d1/0x740 [ 256.759750] ? ksys_dup3+0x680/0x680 [ 256.763487] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 256.768435] tun_chr_ioctl+0x2a/0x40 [ 256.772164] ? tun_chr_compat_ioctl+0x30/0x30 [ 256.776667] do_vfs_ioctl+0x1de/0x1790 [ 256.780565] ? __lock_is_held+0xb5/0x140 [ 256.780586] ? ioctl_preallocate+0x300/0x300 [ 256.780602] ? __fget_light+0x2e9/0x430 [ 256.780619] ? fget_raw+0x20/0x20 [ 256.780640] ? __sb_end_write+0xd9/0x110 [ 256.793072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 256.793088] ? fput+0x130/0x1a0 [ 256.793105] ? do_syscall_64+0x9a/0x820 [ 256.793122] ? do_syscall_64+0x9a/0x820 [ 256.793139] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 256.793163] ? security_file_ioctl+0x94/0xc0 [ 256.826359] ksys_ioctl+0xa9/0xd0 [ 256.829834] __x64_sys_ioctl+0x73/0xb0 [ 256.833754] do_syscall_64+0x1b9/0x820 [ 256.837655] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.843048] ? syscall_return_slowpath+0x5e0/0x5e0 [ 256.847995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.852854] ? trace_hardirqs_on_caller+0x310/0x310 [ 256.857895] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 256.862939] ? prepare_exit_to_usermode+0x291/0x3b0 [ 256.867983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.872847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.878044] RIP: 0033:0x457569 [ 256.881247] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.900152] RSP: 002b:00007f07d639cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.900169] RAX: ffffffffffffffda RBX: 00007f07d639cc90 RCX: 0000000000457569 12:25:27 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:27 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1, 0x7], 0x1}}) 12:25:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0x0, 0x4}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 12:25:27 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)={[{@discard='discard'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) [ 256.900178] RDX: 0000000000000003 RSI: 00000000400454d0 RDI: 0000000000000003 [ 256.900187] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 256.900197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07d639d6d4 [ 256.900215] R13: 00000000004c1411 R14: 00000000004d2768 R15: 0000000000000004 12:25:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 257.018742] gfs2: invalid mount option: fscontext=user_u [ 257.034111] gfs2: can't parse mount arguments 12:25:27 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9, 0x1], 0x1}}) 12:25:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 257.077092] FAULT_INJECTION: forcing a failure. [ 257.077092] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 257.088956] CPU: 0 PID: 8702 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 257.097443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.106806] Call Trace: [ 257.109420] dump_stack+0x244/0x39d [ 257.113072] ? dump_stack_print_info.cold.1+0x20/0x20 [ 257.118294] should_fail.cold.4+0xa/0x17 [ 257.122376] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.127493] ? find_held_lock+0x36/0x1c0 [ 257.131572] ? mark_held_locks+0x130/0x130 [ 257.135797] ? lock_downgrade+0x900/0x900 [ 257.139945] ? check_preemption_disabled+0x48/0x280 [ 257.144969] ? kasan_check_read+0x11/0x20 [ 257.149117] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 257.154382] ? rcu_read_unlock_special+0x370/0x370 [ 257.159300] ? rcu_softirq_qs+0x20/0x20 [ 257.163328] ? unwind_dump+0x190/0x190 [ 257.167267] ? is_bpf_text_address+0xd3/0x170 [ 257.171761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.177297] ? should_fail+0x22d/0xd01 [ 257.181203] ? __kernel_text_address+0xd/0x40 [ 257.185698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.190790] ? __save_stack_trace+0x8d/0xf0 [ 257.195135] __alloc_pages_nodemask+0x34b/0xdd0 [ 257.199816] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 257.204835] ? save_stack+0xa9/0xd0 [ 257.208449] ? save_stack+0x43/0xd0 [ 257.212074] ? find_held_lock+0x36/0x1c0 [ 257.216137] ? trace_hardirqs_off+0xb8/0x310 [ 257.220536] cache_grow_begin+0xa5/0x8c0 [ 257.224590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.230125] ? check_preemption_disabled+0x48/0x280 [ 257.235146] kmem_cache_alloc_node_trace+0x670/0x740 [ 257.240247] __kmalloc_node_track_caller+0x3c/0x70 [ 257.245168] __kmalloc_reserve.isra.38+0x41/0xe0 [ 257.249915] __alloc_skb+0x150/0x770 [ 257.253637] ? netdev_alloc_frag+0x1f0/0x1f0 [ 257.258032] ? if_nlmsg_size+0x5d1/0xbb0 [ 257.262094] ? rtnetlink_put_metrics+0x690/0x690 [ 257.266846] ? mutex_trylock+0x2b0/0x2b0 [ 257.270898] ? lock_downgrade+0x900/0x900 [ 257.275037] ? check_preemption_disabled+0x48/0x280 [ 257.280060] rtmsg_ifinfo_build_skb+0x74/0x190 [ 257.284648] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 257.289503] rtnetlink_event+0x144/0x170 [ 257.293568] notifier_call_chain+0x17e/0x380 [ 257.297968] ? unregister_die_notifier+0x20/0x20 [ 257.302730] ? lock_downgrade+0x900/0x900 [ 257.306879] ? check_preemption_disabled+0x48/0x280 [ 257.311884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.317432] ? rtnl_is_locked+0xb5/0xf0 [ 257.321395] ? rtnl_trylock+0x20/0x20 [ 257.325188] raw_notifier_call_chain+0x2d/0x40 [ 257.329779] call_netdevice_notifiers_info+0x3f/0x90 [ 257.334882] netdev_update_features+0x10a/0x140 [ 257.339563] ? __netdev_update_features+0x1c20/0x1c20 [ 257.344754] ? tun_chr_close+0x180/0x180 [ 257.348815] __tun_chr_ioctl+0xa22/0x46e0 [ 257.352953] ? find_held_lock+0x36/0x1c0 [ 257.357007] ? tun_chr_read_iter+0x1e0/0x1e0 [ 257.361404] ? lock_downgrade+0x900/0x900 [ 257.365541] ? check_preemption_disabled+0x48/0x280 [ 257.370560] ? kasan_check_read+0x11/0x20 [ 257.374709] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 257.379974] ? rcu_read_unlock_special+0x370/0x370 [ 257.384898] ? __fget+0x4d1/0x740 [ 257.388344] ? ksys_dup3+0x680/0x680 [ 257.392061] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 257.396978] tun_chr_ioctl+0x2a/0x40 [ 257.400680] ? tun_chr_compat_ioctl+0x30/0x30 [ 257.405188] do_vfs_ioctl+0x1de/0x1790 [ 257.409085] ? __lock_is_held+0xb5/0x140 [ 257.413136] ? ioctl_preallocate+0x300/0x300 [ 257.417537] ? __fget_light+0x2e9/0x430 [ 257.421497] ? fget_raw+0x20/0x20 [ 257.424940] ? __sb_end_write+0xd9/0x110 [ 257.428990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 257.434512] ? fput+0x130/0x1a0 [ 257.437781] ? do_syscall_64+0x9a/0x820 [ 257.441741] ? do_syscall_64+0x9a/0x820 [ 257.445702] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 257.450301] ? security_file_ioctl+0x94/0xc0 [ 257.454705] ksys_ioctl+0xa9/0xd0 [ 257.458147] __x64_sys_ioctl+0x73/0xb0 [ 257.462024] do_syscall_64+0x1b9/0x820 [ 257.465900] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.471299] ? syscall_return_slowpath+0x5e0/0x5e0 [ 257.476232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.481075] ? trace_hardirqs_on_caller+0x310/0x310 [ 257.486107] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 257.491127] ? prepare_exit_to_usermode+0x291/0x3b0 [ 257.496135] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.500970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.506144] RIP: 0033:0x457569 [ 257.509330] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:25:28 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x1f) [ 257.528248] RSP: 002b:00007f07d639cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.535964] RAX: ffffffffffffffda RBX: 00007f07d639cc90 RCX: 0000000000457569 [ 257.543227] RDX: 0000000000000003 RSI: 00000000400454d0 RDI: 0000000000000003 [ 257.550483] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 257.557737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07d639d6d4 [ 257.564990] R13: 00000000004c1411 R14: 00000000004d2768 R15: 0000000000000004 12:25:28 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:28 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:28 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x1f) 12:25:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:28 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80, 0x9], 0x1}}) [ 257.769716] gfs2: not a GFS2 filesystem [ 257.820230] FAULT_INJECTION: forcing a failure. [ 257.820230] name failslab, interval 1, probability 0, space 0, times 0 12:25:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 257.875706] CPU: 0 PID: 8731 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 257.884268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.893637] Call Trace: [ 257.896248] dump_stack+0x244/0x39d [ 257.899898] ? dump_stack_print_info.cold.1+0x20/0x20 [ 257.905109] ? print_usage_bug+0xc0/0xc0 [ 257.905139] should_fail.cold.4+0xa/0x17 [ 257.905169] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.913330] ? graph_lock+0x270/0x270 12:25:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 257.913355] ? graph_lock+0x270/0x270 [ 257.913374] ? find_held_lock+0x36/0x1c0 [ 257.913403] ? find_held_lock+0x36/0x1c0 [ 257.913430] ? is_bpf_text_address+0xac/0x170 [ 257.913447] ? lock_downgrade+0x900/0x900 [ 257.913469] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 257.913486] ? rcu_read_unlock_special+0x370/0x370 [ 257.913506] __should_failslab+0x124/0x180 [ 257.913539] should_failslab+0x9/0x14 [ 257.913554] kmem_cache_alloc_node_trace+0x5a/0x740 [ 257.913567] ? is_bpf_text_address+0xd3/0x170 [ 257.913598] ? kernel_text_address+0x79/0xf0 12:25:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 257.913634] __kmalloc_node_track_caller+0x3c/0x70 [ 257.913668] __kmalloc_reserve.isra.38+0x41/0xe0 [ 257.913689] pskb_expand_head+0x230/0x10f0 [ 257.913708] ? save_stack+0xa9/0xd0 [ 257.913726] ? save_stack+0x43/0xd0 [ 257.913755] ? kasan_kmalloc+0xc7/0xe0 [ 257.913773] ? rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 257.913788] ? skb_release_data+0x880/0x880 [ 257.913805] ? netdev_update_features+0x10a/0x140 [ 257.913820] ? tun_chr_ioctl+0x2a/0x40 [ 257.913834] ? do_vfs_ioctl+0x1de/0x1790 [ 257.913846] ? ksys_ioctl+0xa9/0xd0 [ 257.913859] ? __x64_sys_ioctl+0x73/0xb0 [ 257.913879] ? do_syscall_64+0x1b9/0x820 [ 258.034368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.034387] ? check_preemption_disabled+0x48/0x280 [ 258.034414] ? __lock_is_held+0xb5/0x140 [ 258.034541] netlink_trim+0x2ea/0x380 [ 258.052865] ? netlink_skb_destructor+0x210/0x210 [ 258.052893] netlink_broadcast_filtered+0xf4/0x1680 [ 258.052916] ? __netlink_sendskb+0xd0/0xd0 [ 258.052935] ? netdev_alloc_frag+0x1f0/0x1f0 [ 258.071414] ? if_nlmsg_size+0x5d1/0xbb0 12:25:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 258.075508] ? rtnetlink_put_metrics+0x690/0x690 [ 258.080292] ? mutex_trylock+0x2b0/0x2b0 [ 258.084397] ? rtmsg_ifinfo_build_skb+0xc9/0x190 [ 258.089171] nlmsg_notify+0xa0/0x1a0 [ 258.092913] rtmsg_ifinfo_event.part.31+0xb2/0xe0 [ 258.092934] rtnetlink_event+0x144/0x170 [ 258.092955] notifier_call_chain+0x17e/0x380 [ 258.092976] ? unregister_die_notifier+0x20/0x20 [ 258.101865] ? lock_downgrade+0x900/0x900 [ 258.101881] ? check_preemption_disabled+0x48/0x280 [ 258.101900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.101916] ? rtnl_is_locked+0xb5/0xf0 [ 258.101933] ? rtnl_trylock+0x20/0x20 [ 258.101951] raw_notifier_call_chain+0x2d/0x40 [ 258.138119] call_netdevice_notifiers_info+0x3f/0x90 [ 258.143244] netdev_update_features+0x10a/0x140 [ 258.147927] ? __netdev_update_features+0x1c20/0x1c20 [ 258.153124] ? tun_chr_close+0x180/0x180 [ 258.157203] __tun_chr_ioctl+0xa22/0x46e0 [ 258.161383] ? find_held_lock+0x36/0x1c0 [ 258.165464] ? tun_chr_read_iter+0x1e0/0x1e0 [ 258.169904] ? lock_downgrade+0x900/0x900 12:25:28 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x1f) 12:25:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 258.174075] ? check_preemption_disabled+0x48/0x280 [ 258.179104] ? kasan_check_read+0x11/0x20 [ 258.183265] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 258.188555] ? rcu_read_unlock_special+0x370/0x370 [ 258.193508] ? __fget+0x4d1/0x740 [ 258.196979] ? ksys_dup3+0x680/0x680 [ 258.197007] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 258.197027] tun_chr_ioctl+0x2a/0x40 [ 258.205680] ? tun_chr_compat_ioctl+0x30/0x30 [ 258.205695] do_vfs_ioctl+0x1de/0x1790 [ 258.205730] ? __lock_is_held+0xb5/0x140 [ 258.221897] ? ioctl_preallocate+0x300/0x300 [ 258.226326] ? __fget_light+0x2e9/0x430 [ 258.230324] ? fget_raw+0x20/0x20 [ 258.233797] ? __sb_end_write+0xd9/0x110 [ 258.237874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.243460] ? fput+0x130/0x1a0 [ 258.246757] ? do_syscall_64+0x9a/0x820 [ 258.250748] ? do_syscall_64+0x9a/0x820 [ 258.254734] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 258.254756] ? security_file_ioctl+0x94/0xc0 [ 258.254775] ksys_ioctl+0xa9/0xd0 [ 258.267241] __x64_sys_ioctl+0x73/0xb0 [ 258.271141] do_syscall_64+0x1b9/0x820 [ 258.275057] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.275078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.275094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.275114] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.275134] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.300284] ? prepare_exit_to_usermode+0x291/0x3b0 [ 258.305325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.310200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.315409] RIP: 0033:0x457569 12:25:28 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 258.315426] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.315435] RSP: 002b:00007f07d639cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.337556] RAX: ffffffffffffffda RBX: 00007f07d639cc90 RCX: 0000000000457569 [ 258.337566] RDX: 0000000000000003 RSI: 00000000400454d0 RDI: 0000000000000003 [ 258.337576] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 258.337586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07d639d6d4 [ 258.337596] R13: 00000000004c1411 R14: 00000000004d2768 R15: 0000000000000004 [ 258.398800] gfs2: not a GFS2 filesystem 12:25:29 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1, 0x80], 0x1}}) 12:25:29 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x1f) 12:25:29 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:29 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5, 0x1], 0x1}}) 12:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 258.659709] gfs2: not a GFS2 filesystem 12:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:29 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5, 0x5], 0x1}}) 12:25:29 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) close(r0) 12:25:29 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:29 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5], 0x1}}) 12:25:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(0xffffffffffffffff) 12:25:29 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d2, 0x3) [ 259.088888] FAULT_INJECTION: forcing a failure. [ 259.088888] name failslab, interval 1, probability 0, space 0, times 0 [ 259.139035] CPU: 1 PID: 8824 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 259.147623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.156986] Call Trace: [ 259.159621] dump_stack+0x244/0x39d [ 259.163278] ? dump_stack_print_info.cold.1+0x20/0x20 [ 259.168489] ? lock_downgrade+0x900/0x900 [ 259.168519] should_fail.cold.4+0xa/0x17 [ 259.168542] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.181857] ? lock_downgrade+0x900/0x900 [ 259.186024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.191616] ? proc_fail_nth_write+0x9e/0x210 [ 259.191633] ? proc_cwd_link+0x1d0/0x1d0 [ 259.191661] ? find_held_lock+0x36/0x1c0 [ 259.204311] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.209803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.209835] __should_failslab+0x124/0x180 [ 259.209856] should_failslab+0x9/0x14 [ 259.209871] __kmalloc+0x2e0/0x760 [ 259.209906] ? strncpy_from_user+0x5a0/0x5a0 [ 259.227006] ? fput+0x130/0x1a0 [ 259.227025] ? do_syscall_64+0x9a/0x820 [ 259.227039] ? __x64_sys_memfd_create+0x142/0x4f0 [ 259.227054] ? do_syscall_64+0x9a/0x820 [ 259.227073] __x64_sys_memfd_create+0x142/0x4f0 [ 259.238707] ? memfd_fcntl+0x1910/0x1910 [ 259.238738] do_syscall_64+0x1b9/0x820 [ 259.247562] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.260187] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.260204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.260235] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.260254] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:25:29 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:29 executing program 1: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:29 executing program 1: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 259.260272] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.260300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.275420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.275434] RIP: 0033:0x457569 [ 259.275451] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.275459] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 259.275480] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 12:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:29 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5], 0x1}}) 12:25:29 executing program 1: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:30 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 259.290497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 259.300506] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 259.300517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9babf796d4 [ 259.300526] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 12:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:30 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400], 0x1}}) 12:25:30 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:30 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d3, 0x3) 12:25:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 259.631848] FAULT_INJECTION: forcing a failure. [ 259.631848] name failslab, interval 1, probability 0, space 0, times 0 [ 259.708840] CPU: 1 PID: 8861 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 259.717910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.717918] Call Trace: [ 259.717944] dump_stack+0x244/0x39d [ 259.717970] ? dump_stack_print_info.cold.1+0x20/0x20 [ 259.718002] should_fail.cold.4+0xa/0x17 [ 259.718026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.718051] ? find_held_lock+0x36/0x1c0 [ 259.752088] ? graph_lock+0x270/0x270 [ 259.755955] ? __lock_acquire+0x62f/0x4c20 [ 259.760204] ? lock_downgrade+0x900/0x900 [ 259.764396] ? check_preemption_disabled+0x48/0x280 [ 259.769439] ? find_held_lock+0x36/0x1c0 [ 259.773610] ? pci_disable_msi+0xf8/0x520 [ 259.773638] ? expand_files.part.8+0x571/0x9a0 [ 259.782370] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.782391] ? find_held_lock+0x36/0x1c0 [ 259.782417] __should_failslab+0x124/0x180 [ 259.791936] should_failslab+0x9/0x14 [ 259.791954] kmem_cache_alloc+0x2be/0x730 [ 259.791977] ? shmem_destroy_callback+0xc0/0xc0 [ 259.791995] shmem_alloc_inode+0x1b/0x40 [ 259.812891] alloc_inode+0x63/0x190 [ 259.816534] new_inode_pseudo+0x71/0x1a0 [ 259.820605] ? prune_icache_sb+0x1c0/0x1c0 [ 259.824860] ? _raw_spin_unlock+0x2c/0x50 [ 259.829036] new_inode+0x1c/0x40 [ 259.832411] shmem_get_inode+0xf1/0x920 [ 259.836399] ? shmem_encode_fh+0x340/0x340 [ 259.840648] ? lock_downgrade+0x900/0x900 [ 259.844830] ? lock_release+0xa10/0xa10 [ 259.848851] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.854326] ? usercopy_warn+0x110/0x110 [ 259.858406] __shmem_file_setup.part.50+0x83/0x2a0 [ 259.863348] shmem_file_setup+0x65/0x90 [ 259.863367] __x64_sys_memfd_create+0x2af/0x4f0 [ 259.863383] ? memfd_fcntl+0x1910/0x1910 [ 259.863416] do_syscall_64+0x1b9/0x820 [ 259.876105] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.876126] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.876142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.876164] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.885415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.885435] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.885458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.885482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.895251] RIP: 0033:0x457569 [ 259.895269] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.895278] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 259.895293] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 12:25:30 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9], 0x1}}) 12:25:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xbd8, 0x1ff}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40, 0x182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x96}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000140)=0x8) 12:25:30 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) close(r0) 12:25:30 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 259.895307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 259.964780] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 259.972080] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9babf796d4 [ 259.979374] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 12:25:30 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:30 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6], 0x1}}) 12:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(0xffffffffffffffff) 12:25:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)={0x0, @reserved}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x70da0e95, 0x2) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cb, 0x3) 12:25:30 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:30 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800], 0x1}}) 12:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xbd8, 0x1ff}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40, 0x182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x96}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000140)=0x8) 12:25:30 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d6, 0x3) [ 260.330547] FAULT_INJECTION: forcing a failure. [ 260.330547] name failslab, interval 1, probability 0, space 0, times 0 [ 260.349195] CPU: 0 PID: 8913 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 260.357718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.367090] Call Trace: [ 260.369704] dump_stack+0x244/0x39d [ 260.373352] ? dump_stack_print_info.cold.1+0x20/0x20 12:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xbd8, 0x1ff}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40, 0x182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x96}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000140)=0x8) [ 260.378572] should_fail.cold.4+0xa/0x17 [ 260.382653] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.387778] ? __kernel_text_address+0xd/0x40 [ 260.392315] ? unwind_get_return_address+0x61/0xa0 [ 260.397303] ? find_held_lock+0x36/0x1c0 [ 260.401419] ? perf_trace_sched_process_exec+0x860/0x860 [ 260.406887] __should_failslab+0x124/0x180 [ 260.411131] should_failslab+0x9/0x14 [ 260.414951] kmem_cache_alloc+0x2be/0x730 [ 260.419106] ? mpol_shared_policy_init+0x235/0x650 [ 260.419122] ? current_time+0x72/0x1b0 [ 260.419143] __d_alloc+0xc8/0xb90 [ 260.419164] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 260.436429] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.441559] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 260.441579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.452320] ? timespec64_trunc+0xea/0x180 [ 260.456568] ? inode_init_owner+0x340/0x340 [ 260.460902] ? _raw_spin_unlock+0x2c/0x50 [ 260.465060] ? current_time+0x10b/0x1b0 [ 260.465078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.465096] ? __lockdep_init_map+0x105/0x590 [ 260.465117] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 260.484663] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 260.484686] d_alloc_pseudo+0x1d/0x30 [ 260.484707] alloc_file_pseudo+0x158/0x3f0 [ 260.498298] ? alloc_file+0x4d0/0x4d0 [ 260.502127] ? usercopy_warn+0x110/0x110 [ 260.506221] __shmem_file_setup.part.50+0x110/0x2a0 [ 260.511258] shmem_file_setup+0x65/0x90 [ 260.511277] __x64_sys_memfd_create+0x2af/0x4f0 [ 260.511294] ? memfd_fcntl+0x1910/0x1910 [ 260.511329] do_syscall_64+0x1b9/0x820 12:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xbd8, 0x1ff}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40, 0x182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x96}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000140)=0x8) [ 260.511352] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.524066] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.533303] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.533330] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.533347] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 260.533364] ? prepare_exit_to_usermode+0x291/0x3b0 [ 260.533400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.543168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.543182] RIP: 0033:0x457569 [ 260.543206] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.558258] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 260.590745] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 260.590754] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 260.590763] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 260.590788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9babf796d4 [ 260.590797] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 12:25:31 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:31 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9], 0x1}}) 12:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000040)=@routing={0x1, 0x14, 0x1, 0x957c, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x1a}, @ipv4={[], [], @loopback}, @mcast2, @loopback, @empty, @dev={0xfe, 0x80, [], 0x11}, @remote, @empty, @loopback]}, 0xa8) 12:25:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454dc, 0x3) 12:25:31 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c], 0x1}}) [ 260.821342] FAULT_INJECTION: forcing a failure. [ 260.821342] name failslab, interval 1, probability 0, space 0, times 0 [ 260.859689] CPU: 1 PID: 8941 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 260.868267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.877636] Call Trace: [ 260.880251] dump_stack+0x244/0x39d [ 260.883891] ? dump_stack_print_info.cold.1+0x20/0x20 [ 260.889108] ? __save_stack_trace+0x8d/0xf0 [ 260.893449] should_fail.cold.4+0xa/0x17 [ 260.897518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.902625] ? save_stack+0x43/0xd0 [ 260.906270] ? kasan_kmalloc+0xc7/0xe0 [ 260.910191] ? percpu_ref_put_many+0x11c/0x260 [ 260.914785] ? graph_lock+0x270/0x270 [ 260.918609] ? find_held_lock+0x36/0x1c0 [ 260.922709] ? xfs_reflink_trim_around_shared+0x78/0x950 [ 260.928181] ? perf_trace_sched_process_exec+0x860/0x860 [ 260.933647] ? lock_downgrade+0x900/0x900 [ 260.937808] __should_failslab+0x124/0x180 [ 260.942059] should_failslab+0x9/0x14 [ 260.945864] kmem_cache_alloc+0x2be/0x730 [ 260.950013] ? d_set_d_op+0x31d/0x410 [ 260.953843] __alloc_file+0xa8/0x470 [ 260.957568] ? file_free_rcu+0xd0/0xd0 [ 260.961463] ? d_instantiate+0x79/0xa0 [ 260.965357] ? lock_downgrade+0x900/0x900 [ 260.969520] ? kasan_check_read+0x11/0x20 [ 260.973678] ? do_raw_spin_unlock+0xa7/0x330 [ 260.978095] ? do_raw_spin_trylock+0x270/0x270 [ 260.982687] alloc_empty_file+0x72/0x170 [ 260.986764] alloc_file+0x5e/0x4d0 [ 260.990321] ? _raw_spin_unlock+0x2c/0x50 [ 260.994486] alloc_file_pseudo+0x261/0x3f0 [ 260.998746] ? alloc_file+0x4d0/0x4d0 [ 261.002581] ? usercopy_warn+0x110/0x110 [ 261.006658] __shmem_file_setup.part.50+0x110/0x2a0 [ 261.011697] shmem_file_setup+0x65/0x90 [ 261.015707] __x64_sys_memfd_create+0x2af/0x4f0 [ 261.020389] ? memfd_fcntl+0x1910/0x1910 [ 261.024473] do_syscall_64+0x1b9/0x820 [ 261.028365] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.033733] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.038664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.043514] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.048538] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.053575] ? prepare_exit_to_usermode+0x291/0x3b0 [ 261.058605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.063463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.068661] RIP: 0033:0x457569 [ 261.071862] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.090789] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.098515] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 261.105799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 261.113091] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 12:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)={0x0, @reserved}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x70da0e95, 0x2) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 261.120370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9babf796d4 [ 261.127670] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 12:25:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:31 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff], 0x1}}) 12:25:31 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:32 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0045878, 0x3) 12:25:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454dc, 0x3) 12:25:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) close(r0) [ 261.375663] FAULT_INJECTION: forcing a failure. [ 261.375663] name failslab, interval 1, probability 0, space 0, times 0 [ 261.458794] CPU: 0 PID: 8970 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 261.467343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.476704] Call Trace: [ 261.479308] dump_stack+0x244/0x39d [ 261.482975] ? dump_stack_print_info.cold.1+0x20/0x20 [ 261.488185] ? lock_downgrade+0x900/0x900 [ 261.492363] ? check_preemption_disabled+0x48/0x280 [ 261.497412] should_fail.cold.4+0xa/0x17 [ 261.501493] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:25:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x30, 0x5, 0x12, 0x1e, 0x7, 0x6, 0x3, 0xdb}) accept4$unix(r1, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x800) r2 = getpid() r3 = getpgrp(r2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0x3, 0x2, 0x5, 0x1, 'syz0\x00', 0x5}, 0x0, [0x8, 0x0, 0x0, 0x96e, 0x6, 0x7f, 0x1fc, 0x6, 0x3, 0x0, 0x223, 0x1, 0x400, 0x1f, 0x9, 0x3, 0x302009f3, 0x6, 0x100, 0x7, 0xffffffff, 0x81, 0x8000, 0xbe67, 0x9b35, 0x4, 0xa6, 0xbbc9, 0x4, 0x401, 0x0, 0x3, 0x7d, 0xfffffffffffffffd, 0x85, 0x14, 0x10001, 0x9, 0x266c, 0x8000, 0x401, 0x81, 0x2, 0x7b377e6e, 0x3, 0x81b, 0x0, 0x8, 0x7, 0x5, 0x200, 0x288, 0x6, 0x0, 0x5, 0xaed, 0x3, 0x5, 0x20fc, 0x4, 0x2, 0xf5, 0x691, 0x6, 0x4, 0x734, 0x3ff, 0x8, 0x9, 0xfff, 0x8, 0x4, 0x5, 0x4, 0x7, 0x34f, 0x5d, 0x6, 0x6, 0x80, 0x1, 0x7d7, 0x9, 0xffff, 0x4, 0x6, 0x3f, 0x80000000, 0x81, 0xffffffff, 0x2, 0x3, 0x2, 0x7fff, 0x81, 0x8a, 0xa8592db, 0x4, 0x4a1e, 0x80000000, 0x26a, 0x3, 0x8, 0x3ff, 0x100000000, 0x3, 0x6, 0x1, 0x8, 0x2, 0x2, 0x80, 0x15, 0x9, 0x100000000, 0x4, 0x1, 0x2, 0x4, 0x4, 0xff, 0x1, 0x7, 0x5, 0x800, 0x1, 0x8, 0x20], {0x77359400}}) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000800)) syz_open_procfs$namespace(r3, &(0x7f00000000c0)='ns/pid\x00') accept$alg(r1, 0x0, 0x0) sendto$llc(r1, &(0x7f0000000640)="f9a8b0d47a59a3dd78c87ef6fa7cc757c3c9917adc558f80700d9d9a7c6e2b5a98e84d96313a299f6c4fd4f8489a5fbd397d7b327eb7222c694bace65787459accb69fd93979e02032c14147318bd3738c8a2d0dc75d44a3d0f5a4e5d37d957a6e9e5f3e72d7854a6351bdb86948c3762ae353acb6b4089d635c4824f01925825939f47d83604b502543f817084d9ebc147620f30821fc9760c5a1b875", 0x9d, 0x4, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xd, 0x2}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x80000, 0x0) [ 261.506612] ? is_bpf_text_address+0xd3/0x170 [ 261.511121] ? kernel_text_address+0x79/0xf0 [ 261.515563] ? __kernel_text_address+0xd/0x40 [ 261.520075] ? unwind_get_return_address+0x61/0xa0 [ 261.525020] ? __save_stack_trace+0x8d/0xf0 [ 261.529363] ? find_held_lock+0x36/0x1c0 [ 261.533455] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 261.538323] ? perf_trace_sched_process_exec+0x860/0x860 [ 261.543800] __should_failslab+0x124/0x180 [ 261.543821] should_failslab+0x9/0x14 [ 261.543852] kmem_cache_alloc_trace+0x2d7/0x750 [ 261.556555] ? __might_sleep+0x95/0x190 [ 261.560635] apparmor_file_alloc_security+0x17b/0xac0 [ 261.565887] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 261.565911] ? apparmor_path_rename+0xcd0/0xcd0 [ 261.576116] ? rcu_read_lock_sched_held+0x14f/0x180 [ 261.581578] ? kmem_cache_alloc+0x33a/0x730 [ 261.585945] ? d_set_d_op+0x31d/0x410 [ 261.589762] security_file_alloc+0x4c/0xa0 [ 261.589790] __alloc_file+0x12a/0x470 [ 261.589809] ? file_free_rcu+0xd0/0xd0 [ 261.589825] ? d_instantiate+0x79/0xa0 [ 261.589845] ? lock_downgrade+0x900/0x900 [ 261.589869] ? kasan_check_read+0x11/0x20 [ 261.589885] ? do_raw_spin_unlock+0xa7/0x330 [ 261.589903] ? do_raw_spin_trylock+0x270/0x270 [ 261.605746] alloc_empty_file+0x72/0x170 [ 261.605767] alloc_file+0x5e/0x4d0 [ 261.605784] ? _raw_spin_unlock+0x2c/0x50 [ 261.605819] alloc_file_pseudo+0x261/0x3f0 [ 261.605842] ? alloc_file+0x4d0/0x4d0 [ 261.634822] ? usercopy_warn+0x110/0x110 [ 261.634852] __shmem_file_setup.part.50+0x110/0x2a0 [ 261.634875] shmem_file_setup+0x65/0x90 [ 261.634893] __x64_sys_memfd_create+0x2af/0x4f0 [ 261.634909] ? memfd_fcntl+0x1910/0x1910 [ 261.634938] do_syscall_64+0x1b9/0x820 [ 261.652053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.652073] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.652089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.652109] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.652141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.652160] ? prepare_exit_to_usermode+0x291/0x3b0 [ 261.652180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.652204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.668802] RIP: 0033:0x457569 [ 261.679087] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.679096] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.679112] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 261.679122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4], 0x1}}) 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457], 0x1}}) 12:25:32 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 261.679132] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 261.679142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9babf796d4 [ 261.679152] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 12:25:32 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4], 0x1}}) 12:25:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000040)=@routing={0x1, 0x14, 0x1, 0x957c, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x1a}, @ipv4={[], [], @loopback}, @mcast2, @loopback, @empty, @dev={0xfe, 0x80, [], 0x11}, @remote, @empty, @loopback]}, 0xa8) 12:25:32 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000], 0x1}}) 12:25:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5451, 0x3) 12:25:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x2c00) close(r0) 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14], 0x1}}) [ 262.035180] FAULT_INJECTION: forcing a failure. [ 262.035180] name failslab, interval 1, probability 0, space 0, times 0 [ 262.078097] CPU: 1 PID: 9007 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 262.086640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.096028] Call Trace: [ 262.098647] dump_stack+0x244/0x39d [ 262.102310] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.107526] ? find_held_lock+0x36/0x1c0 [ 262.111615] should_fail.cold.4+0xa/0x17 [ 262.115693] ? find_held_lock+0x36/0x1c0 [ 262.119772] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.124901] ? lock_downgrade+0x900/0x900 [ 262.129061] ? current_time+0x72/0x1b0 [ 262.132975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.138539] ? timespec64_trunc+0xea/0x180 [ 262.142790] ? inode_init_owner+0x340/0x340 [ 262.147133] ? find_held_lock+0x36/0x1c0 [ 262.151271] ? ceph_release+0x148/0x4a0 [ 262.155295] ? perf_trace_sched_process_exec+0x860/0x860 [ 262.160763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.166333] __should_failslab+0x124/0x180 [ 262.166355] should_failslab+0x9/0x14 [ 262.166376] kmem_cache_alloc+0x2be/0x730 [ 262.174409] ? do_sys_ftruncate+0x428/0x550 [ 262.174429] ? lock_downgrade+0x900/0x900 [ 262.174450] getname_flags+0xd0/0x590 [ 262.174470] ? __lock_is_held+0xb5/0x140 [ 262.182934] getname+0x19/0x20 [ 262.190865] do_sys_open+0x383/0x700 [ 262.190886] ? filp_open+0x80/0x80 [ 262.190907] ? trace_hardirqs_off_caller+0x300/0x300 [ 262.190921] ? do_sys_ftruncate+0x449/0x550 [ 262.190940] __x64_sys_open+0x7e/0xc0 [ 262.198198] do_syscall_64+0x1b9/0x820 [ 262.198228] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.198252] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.205480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.205500] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.205518] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.205538] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.214950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.214976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.214993] RIP: 0033:0x4111a1 12:25:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x30, 0x5, 0x12, 0x1e, 0x7, 0x6, 0x3, 0xdb}) accept4$unix(r1, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x800) r2 = getpid() r3 = getpgrp(r2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0x3, 0x2, 0x5, 0x1, 'syz0\x00', 0x5}, 0x0, [0x8, 0x0, 0x0, 0x96e, 0x6, 0x7f, 0x1fc, 0x6, 0x3, 0x0, 0x223, 0x1, 0x400, 0x1f, 0x9, 0x3, 0x302009f3, 0x6, 0x100, 0x7, 0xffffffff, 0x81, 0x8000, 0xbe67, 0x9b35, 0x4, 0xa6, 0xbbc9, 0x4, 0x401, 0x0, 0x3, 0x7d, 0xfffffffffffffffd, 0x85, 0x14, 0x10001, 0x9, 0x266c, 0x8000, 0x401, 0x81, 0x2, 0x7b377e6e, 0x3, 0x81b, 0x0, 0x8, 0x7, 0x5, 0x200, 0x288, 0x6, 0x0, 0x5, 0xaed, 0x3, 0x5, 0x20fc, 0x4, 0x2, 0xf5, 0x691, 0x6, 0x4, 0x734, 0x3ff, 0x8, 0x9, 0xfff, 0x8, 0x4, 0x5, 0x4, 0x7, 0x34f, 0x5d, 0x6, 0x6, 0x80, 0x1, 0x7d7, 0x9, 0xffff, 0x4, 0x6, 0x3f, 0x80000000, 0x81, 0xffffffff, 0x2, 0x3, 0x2, 0x7fff, 0x81, 0x8a, 0xa8592db, 0x4, 0x4a1e, 0x80000000, 0x26a, 0x3, 0x8, 0x3ff, 0x100000000, 0x3, 0x6, 0x1, 0x8, 0x2, 0x2, 0x80, 0x15, 0x9, 0x100000000, 0x4, 0x1, 0x2, 0x4, 0x4, 0xff, 0x1, 0x7, 0x5, 0x800, 0x1, 0x8, 0x20], {0x77359400}}) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000800)) syz_open_procfs$namespace(r3, &(0x7f00000000c0)='ns/pid\x00') accept$alg(r1, 0x0, 0x0) sendto$llc(r1, &(0x7f0000000640)="f9a8b0d47a59a3dd78c87ef6fa7cc757c3c9917adc558f80700d9d9a7c6e2b5a98e84d96313a299f6c4fd4f8489a5fbd397d7b327eb7222c694bace65787459accb69fd93979e02032c14147318bd3738c8a2d0dc75d44a3d0f5a4e5d37d957a6e9e5f3e72d7854a6351bdb86948c3762ae353acb6b4089d635c4824f01925825939f47d83604b502543f817084d9ebc147620f30821fc9760c5a1b875", 0x9d, 0x4, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xd, 0x2}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x80000, 0x0) 12:25:32 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@remote, r2}, 0x14) close(r0) [ 262.222687] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 262.222696] RSP: 002b:00007f9babf78a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 262.222711] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 262.222721] RDX: 00007f9babf78afa RSI: 0000000000000002 RDI: 00007f9babf78af0 [ 262.222731] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 262.222739] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 12:25:32 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59], 0x1}}) [ 262.222753] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:33 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:33 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001, 0xffffffffffffff59, 0xe14, 0x10000, 0x4, 0xd457, 0x4, 0x0, 0x7ff, 0x0, 0x2c, 0xcbd9, 0x800, 0x6, 0x9, 0x400, 0x5], 0x1}}) 12:25:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000010100000000000000000000000000d579979a88b8536694b67f2b5dd4a762d02b424ff77b74ce144109577a3723525dbe31cc3fa1adc61ece8f5a55b23d650595e492b103cbe71fbb87f7c60987379e7941d77620ef3bb29867a10473ee079d6e8f30bc012b1f340fc094de9b670b6ae71f9f47381e7b490d0a6e3a9957be461315e9723edc166aa59c47fda4bb2e2b36f20b0dc770fa7a302f676da70007116dd970d09fb63957a35770ea1ed54ec0d8a86a1fd3824ff814501513c92bea2b59948d"], 0x14}}, 0x0) close(r0) 12:25:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:33 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101, 0x8001], 0x1}}) [ 262.545763] FAULT_INJECTION: forcing a failure. [ 262.545763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 262.557695] CPU: 0 PID: 9054 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 262.566249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.575618] Call Trace: [ 262.578252] dump_stack+0x244/0x39d [ 262.582344] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.587565] should_fail.cold.4+0xa/0x17 [ 262.591651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.591672] ? print_usage_bug+0xc0/0xc0 [ 262.591697] ? mark_held_locks+0x130/0x130 [ 262.600842] ? graph_lock+0x270/0x270 [ 262.600876] ? print_usage_bug+0xc0/0xc0 [ 262.600893] ? graph_lock+0x270/0x270 [ 262.600907] ? lock_downgrade+0x900/0x900 [ 262.600937] ? check_preemption_disabled+0x48/0x280 [ 262.600982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.631540] ? should_fail+0x22d/0xd01 [ 262.635440] ? find_held_lock+0x36/0x1c0 [ 262.639516] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.644650] __alloc_pages_nodemask+0x34b/0xdd0 [ 262.649331] ? current_time+0x72/0x1b0 [ 262.653244] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 262.658277] ? inode_init_owner+0x340/0x340 [ 262.662621] ? find_held_lock+0x36/0x1c0 [ 262.662660] ? trace_hardirqs_off+0xb8/0x310 [ 262.671140] cache_grow_begin+0xa5/0x8c0 [ 262.671159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.671176] ? check_preemption_disabled+0x48/0x280 [ 262.671198] kmem_cache_alloc+0x66b/0x730 [ 262.671227] ? do_sys_ftruncate+0x428/0x550 [ 262.689962] getname_flags+0xd0/0x590 [ 262.689980] ? __lock_is_held+0xb5/0x140 [ 262.689998] getname+0x19/0x20 [ 262.690013] do_sys_open+0x383/0x700 [ 262.690032] ? filp_open+0x80/0x80 [ 262.690059] ? trace_hardirqs_off_caller+0x300/0x300 [ 262.698176] ? do_sys_ftruncate+0x449/0x550 [ 262.698197] __x64_sys_open+0x7e/0xc0 [ 262.698228] do_syscall_64+0x1b9/0x820 [ 262.730059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.735439] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.740377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.745245] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.750281] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.755323] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.760362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.765240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.770440] RIP: 0033:0x4111a1 [ 262.773664] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:25:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@remote, r2}, 0x14) close(r0) 12:25:33 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200, 0x101], 0x1}}) 12:25:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000000)={0x7004, 0x11a000}) close(r1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x80, "036089059a9fcb06b3c139f508275edc51dee8975122944ee2657b61c721b46cc94ff247edc32b963712ed7263ef0e4f5a62cde23c6b73ccf3283581f86fcdf2391d7235a7e6751151c721d972acf41be02b182f5641b3532397cd1f5e74442428e51638d45c89ee476bf06d7c1792525ba82b4e1078b24f351281d3037dcedf"}, &(0x7f0000000140)=0x88) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r3, 0x6}, &(0x7f00000001c0)=0x8) 12:25:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@remote, r2}, 0x14) close(r0) 12:25:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x152, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:25:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000000001, 0x70, 0x0, 0x4000000000, 0x10000007, 0x40, 0x0, 0x7f, 0x40000000, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7fff, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001280)='/dev/zero\x00', 0x10d040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000012c0)={0xffffffffffffffff}, 0x117, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000001340)={0x7, 0x8, 0xfa00, {r2, 0x7ff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x10, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r4 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x80) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000001240)={0xffff, 0x101}) futimesat(r4, &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={{0x0, 0x7530}, {0x77359400}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r3, 0x4) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f00000011c0)=""/124) close(r0) [ 262.792625] RSP: 002b:00007f9babf78a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 262.800390] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 262.807661] RDX: 00007f9babf78afa RSI: 0000000000000002 RDI: 00007f9babf78af0 [ 262.807671] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 262.807680] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 262.807690] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 262.891115] gfs2: not a GFS2 filesystem 12:25:33 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 12:25:33 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1, 0x200], 0x1}}) 12:25:33 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d1, 0x3) 12:25:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r2, 0x7}, &(0x7f0000000140)=0x8) close(r0) 12:25:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 12:25:33 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4, 0x1], 0x1}}) [ 263.145066] FAULT_INJECTION: forcing a failure. [ 263.145066] name failslab, interval 1, probability 0, space 0, times 0 12:25:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xc0000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x9, {{0xa, 0x4e24, 0x7fff, @remote, 0x100000001}}}, 0x88) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 263.218849] CPU: 0 PID: 9102 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 263.227376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.236737] Call Trace: [ 263.239342] dump_stack+0x244/0x39d [ 263.242995] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.248187] ? print_usage_bug+0xc0/0xc0 [ 263.252269] should_fail.cold.4+0xa/0x17 [ 263.256333] ? find_held_lock+0x36/0x1c0 [ 263.260411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.265521] ? lock_downgrade+0x900/0x900 [ 263.269667] ? check_preemption_disabled+0x48/0x280 [ 263.274687] ? kasan_check_read+0x11/0x20 [ 263.278883] ? find_held_lock+0x36/0x1c0 [ 263.282981] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.288460] __should_failslab+0x124/0x180 [ 263.292703] should_failslab+0x9/0x14 [ 263.296502] kmem_cache_alloc+0x2be/0x730 [ 263.300648] ? graph_lock+0x270/0x270 [ 263.304451] ? print_usage_bug+0xc0/0xc0 [ 263.308527] ? mark_held_locks+0x130/0x130 [ 263.312769] __alloc_file+0xa8/0x470 [ 263.316482] ? file_free_rcu+0xd0/0xd0 [ 263.320381] ? find_held_lock+0x36/0x1c0 [ 263.324460] ? is_bpf_text_address+0xac/0x170 [ 263.328971] ? lock_downgrade+0x900/0x900 [ 263.333122] ? check_preemption_disabled+0x48/0x280 [ 263.338166] alloc_empty_file+0x72/0x170 [ 263.342242] path_openat+0x170/0x5150 [ 263.346045] ? rcu_softirq_qs+0x20/0x20 [ 263.350020] ? unwind_dump+0x190/0x190 [ 263.353919] ? graph_lock+0x270/0x270 [ 263.357738] ? path_lookupat.isra.43+0xc00/0xc00 [ 263.362507] ? unwind_get_return_address+0x61/0xa0 [ 263.367440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.372463] ? expand_files.part.8+0x571/0x9a0 [ 263.377052] ? find_held_lock+0x36/0x1c0 [ 263.381125] ? __alloc_fd+0x347/0x6e0 [ 263.384928] ? lock_downgrade+0x900/0x900 [ 263.389072] ? getname+0x19/0x20 [ 263.392445] ? kasan_check_read+0x11/0x20 [ 263.396592] ? do_raw_spin_unlock+0xa7/0x330 [ 263.401017] ? do_raw_spin_trylock+0x270/0x270 [ 263.405599] ? __lock_is_held+0xb5/0x140 [ 263.409660] ? __check_object_size+0xb1/0x782 [ 263.414171] ? _raw_spin_unlock+0x2c/0x50 [ 263.418325] ? __alloc_fd+0x347/0x6e0 [ 263.422143] do_filp_open+0x255/0x380 [ 263.425942] ? may_open_dev+0x100/0x100 [ 263.429932] ? get_unused_fd_flags+0x122/0x1a0 [ 263.434516] ? __alloc_fd+0x6e0/0x6e0 [ 263.438339] ? __lock_is_held+0xb5/0x140 [ 263.442409] do_sys_open+0x568/0x700 [ 263.446145] ? filp_open+0x80/0x80 [ 263.449691] ? trace_hardirqs_off_caller+0x300/0x300 [ 263.454796] ? do_sys_ftruncate+0x449/0x550 [ 263.459119] __x64_sys_open+0x7e/0xc0 [ 263.462924] do_syscall_64+0x1b9/0x820 [ 263.466857] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.472231] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.477185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.482042] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.487090] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 263.492110] ? prepare_exit_to_usermode+0x291/0x3b0 [ 263.497129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.501982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.507188] RIP: 0033:0x4111a1 [ 263.510413] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 263.529318] RSP: 002b:00007f9babf78a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 263.537036] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 263.544305] RDX: 00007f9babf78afa RSI: 0000000000000002 RDI: 00007f9babf78af0 [ 263.551577] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 263.558852] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 12:25:34 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x12080) write$sndseq(r0, &(0x7f0000000140)=[{0x1000, 0x7, 0x0, 0x8000000080000000, @time={0x0, 0x989680}, {0x2, 0x5}, {0x10000, 0xfd1c}, @quote={{0x800, 0x9}, 0x8001}}, {0xfffffffffffffffc, 0x1ff, 0x5f0000000000000, 0xf09b, @time={0x0, 0x989680}, {0x6, 0x7f}, {0x8, 0x3f}, @quote={{0x1000, 0x4}, 0xfffffffffffffffc, &(0x7f0000000040)={0x989, 0x100000000, 0x0, 0x100000000, @tick=0x9, {0xa42e, 0x8000}, {}, @addr={0x100}}}}, {0x2, 0xffff, 0x4c, 0xffffffffffffffff, @time={0x77359400}, {0x7, 0x6}, {0x1, 0x3f}, @addr={0x71, 0x6}}, {0x7f, 0x400, 0x4, 0xc0000, @tick=0x6, {0xfffffffffffffffb}, {0x8, 0x7ff}, @ext={0xf, &(0x7f0000000080)="35fad71433a3f9a7f9d3f093eaa074"}}, {0x4, 0x800, 0xffffffffffffff00, 0x0, @tick=0x100000000, {0x7, 0x81}, {0x0, 0x8}, @note={0x6, 0xe7, 0x9, 0x1f, 0x4}}, {0x6, 0x9, 0x7, 0x5176, @time={0x77359400}, {0x3}, {0x81, 0x8}, @time=@tick=0x10000}, {0x7, 0x47e0f5ad, 0x4c1, 0x800, @time={0x77359400}, {0x7fffffff, 0x40}, {0x662, 0xfff}, @control={0x3ff, 0x6, 0x9}}], 0x150) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}, 0xffff, 0x1, 0x0, 0x4, 0x9, 0x80000000, 0x9}, &(0x7f00000002c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000340)="96fd8ffaa27366a91a2e5e6d1b34f1ba79ebadf47cc8649b90233229fce9f6548e69c7073de1ef830dc72cb47e89dfd19edae1d3624387c649012d0a54069b650fc6a00e1add81a196996a9260d7e2dae1f095193c21270c0a8008fdb6f5ff95c039cb74d177f683f6a2700104c299043a14c80ca40ada0c709f8efff94da6f6ef0c55fb208c800106bf41e02f27994b17198e89a6025f18a1c93bef2ec0b61f6569caab12f61c1ba5f66d2a6bffe827018216afb6c98da71778b17928580474f03cf79f67dfe1408b274a811c83c344502d220f3e222ef55ea29b60459b5ed7f7ac9989f66876b0d5a9cc58c5bd3ad7c5d0", 0xf2) close(r1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000300)={0x2, 0x7, 0x7, 0x811ce3d, 0x6a4e, 0x3f, 0x6, 0xff, 0x2, 0xb82e}) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000440)={0x0, @raw_data="23db956088644e06dff16a9a8fd0808e8c14db334dbb08245726beb5e5807a622a9f522d5a02796d9000c474e7c81e47945828b1333b43527693319bb67f017746bc05f3c8a6888e59731a4d6f9345ba765c229f5f74e5e645c3095089f00977d59b9aff9cd051e21e68c17013dc9ec54a35dfc3617b4b3c880f8b4e6fdbd7495221cfe2b8e4f20cae0438d53d7a28184d85e7cb350525305e69f44956a0910980beccd96cbc9c71c81f45f8f1e64c16a22aa2baa1bdbd10e75d4bc745d436bb1b8b0854bbe4a0b9"}) 12:25:34 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x100000001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 263.566119] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:34 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x101000) sendfile(r0, r0, &(0x7f0000000000), 0x8001) prctl$PR_SET_FPEXC(0xc, 0x2) close(r0) 12:25:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/249) close(r0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f0000000200)=@deltaction={0x3f8, 0x31, 0x704, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0xffff}, [@TCA_ACT_TAB={0x90, 0x1, [{0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x6da}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @TCA_ACT_TAB={0x28, 0x1, [{0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0xa4, 0x1, [{0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0xc85b}}, {0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x18, 0x0, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0xfa}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}]}, @TCA_ACT_TAB={0xac, 0x1, [{0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0xf647}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x18, 0x1e, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x5385}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x18, 0x7, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0xa4, 0x1, [{0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x83}}, {0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x18, 0xc, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffffffffffd}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x48f5416c}}]}]}, 0x3f8}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x0, 0x0) [ 263.784291] FAULT_INJECTION: forcing a failure. [ 263.784291] name failslab, interval 1, probability 0, space 0, times 0 [ 263.815759] CPU: 0 PID: 9131 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 263.824288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.833662] Call Trace: [ 263.836274] dump_stack+0x244/0x39d [ 263.839922] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.845130] ? lock_downgrade+0x900/0x900 [ 263.849292] ? check_preemption_disabled+0x48/0x280 [ 263.849325] should_fail.cold.4+0xa/0x17 [ 263.849346] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.858425] ? is_bpf_text_address+0xd3/0x170 [ 263.858445] ? kernel_text_address+0x79/0xf0 [ 263.858467] ? __kernel_text_address+0xd/0x40 [ 263.876947] ? unwind_get_return_address+0x61/0xa0 [ 263.881885] ? __save_stack_trace+0x8d/0xf0 [ 263.886223] ? find_held_lock+0x36/0x1c0 [ 263.890319] ? do_syscall_64+0x1b9/0x820 [ 263.894406] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.899884] __should_failslab+0x124/0x180 [ 263.904148] should_failslab+0x9/0x14 [ 263.907983] kmem_cache_alloc_trace+0x2d7/0x750 [ 263.912668] ? __might_sleep+0x95/0x190 [ 263.916668] apparmor_file_alloc_security+0x17b/0xac0 [ 263.921872] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 263.927442] ? apparmor_path_rename+0xcd0/0xcd0 [ 263.932117] ? rcu_read_lock_sched_held+0x14f/0x180 [ 263.937119] ? kmem_cache_alloc+0x33a/0x730 [ 263.941429] ? graph_lock+0x270/0x270 [ 263.945254] security_file_alloc+0x4c/0xa0 [ 263.949496] __alloc_file+0x12a/0x470 [ 263.953295] ? file_free_rcu+0xd0/0xd0 [ 263.957192] ? find_held_lock+0x36/0x1c0 [ 263.961255] ? is_bpf_text_address+0xac/0x170 [ 263.965740] ? lock_downgrade+0x900/0x900 [ 263.969885] ? check_preemption_disabled+0x48/0x280 [ 263.974893] alloc_empty_file+0x72/0x170 [ 263.978942] path_openat+0x170/0x5150 [ 263.982750] ? rcu_softirq_qs+0x20/0x20 [ 263.986725] ? unwind_dump+0x190/0x190 [ 263.990702] ? graph_lock+0x270/0x270 [ 263.994505] ? path_lookupat.isra.43+0xc00/0xc00 [ 263.999261] ? unwind_get_return_address+0x61/0xa0 [ 264.004178] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.009178] ? expand_files.part.8+0x571/0x9a0 [ 264.013773] ? find_held_lock+0x36/0x1c0 [ 264.017836] ? __alloc_fd+0x347/0x6e0 [ 264.021625] ? lock_downgrade+0x900/0x900 [ 264.025788] ? getname+0x19/0x20 [ 264.029144] ? kasan_check_read+0x11/0x20 [ 264.033311] ? do_raw_spin_unlock+0xa7/0x330 [ 264.037711] ? do_raw_spin_trylock+0x270/0x270 [ 264.042279] ? __lock_is_held+0xb5/0x140 [ 264.046338] ? __check_object_size+0xb1/0x782 [ 264.050881] ? _raw_spin_unlock+0x2c/0x50 [ 264.055024] ? __alloc_fd+0x347/0x6e0 [ 264.058904] do_filp_open+0x255/0x380 [ 264.062695] ? may_open_dev+0x100/0x100 [ 264.066661] ? get_unused_fd_flags+0x122/0x1a0 [ 264.071241] ? __alloc_fd+0x6e0/0x6e0 [ 264.075030] ? __lock_is_held+0xb5/0x140 [ 264.079111] do_sys_open+0x568/0x700 [ 264.082829] ? filp_open+0x80/0x80 [ 264.086371] ? trace_hardirqs_off_caller+0x300/0x300 [ 264.091487] ? do_sys_ftruncate+0x449/0x550 [ 264.095814] __x64_sys_open+0x7e/0xc0 [ 264.099617] do_syscall_64+0x1b9/0x820 [ 264.103507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.108873] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.113785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.118616] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.123621] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.128624] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.133630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.138478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.143672] RIP: 0033:0x4111a1 [ 264.146867] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 264.165771] RSP: 002b:00007f9babf78a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 264.173465] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 12:25:34 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [0x8d4], 0x1}}) 12:25:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000040)=""/34, 0x100000, 0x800, 0x40}, 0x18) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000000c0)=0x4, 0x4) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x81, 0x420001) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x7f, 0x1000, 0x8000, 0xffffffffffff8e9e}) close(r0) [ 264.180723] RDX: 00007f9babf78afa RSI: 0000000000000002 RDI: 00007f9babf78af0 [ 264.187976] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 264.195241] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 264.202508] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:34 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced={0x0, [], 0x1}}) 12:25:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:34 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:34 executing program 0: r0 = epoll_create1(0x80000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x8927, 0x3) 12:25:35 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000700)={0xa, @sliced}) [ 264.372794] FAULT_INJECTION: forcing a failure. [ 264.372794] name failslab, interval 1, probability 0, space 0, times 0 [ 264.392089] CPU: 0 PID: 9156 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 264.400597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.410097] Call Trace: [ 264.412699] dump_stack+0x244/0x39d [ 264.416361] ? dump_stack_print_info.cold.1+0x20/0x20 12:25:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xff, 0x40000) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040)=0x3c, 0x4) [ 264.421582] should_fail.cold.4+0xa/0x17 [ 264.425658] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.430786] ? print_usage_bug+0xc0/0xc0 [ 264.434852] ? up_write+0x7b/0x220 [ 264.438399] ? graph_lock+0x270/0x270 [ 264.442195] ? lock_acquire+0x1ed/0x520 [ 264.446276] ? lo_ioctl+0x25d/0x22a0 [ 264.450005] ? find_held_lock+0x36/0x1c0 [ 264.454054] ? __lock_is_held+0xb5/0x140 [ 264.458113] ? perf_trace_sched_process_exec+0x860/0x860 [ 264.463557] __should_failslab+0x124/0x180 [ 264.467783] should_failslab+0x9/0x14 [ 264.471625] kmem_cache_alloc_trace+0x2d7/0x750 [ 264.476338] ? check_preemption_disabled+0x48/0x280 [ 264.481350] __kthread_create_on_node+0x137/0x540 [ 264.486193] ? loop_get_status64+0x120/0x120 [ 264.490627] ? kthread_parkme+0xb0/0xb0 [ 264.494626] ? __lockdep_init_map+0x105/0x590 [ 264.499164] ? __lockdep_init_map+0x105/0x590 [ 264.503648] ? loop_get_status64+0x120/0x120 [ 264.508045] kthread_create_on_node+0xb1/0xe0 [ 264.512531] ? __kthread_create_on_node+0x540/0x540 [ 264.517539] ? check_preemption_disabled+0x48/0x280 [ 264.522558] lo_ioctl+0xcb3/0x22a0 [ 264.526089] ? lo_rw_aio+0x1ef0/0x1ef0 [ 264.529973] ? find_held_lock+0x36/0x1c0 [ 264.534058] ? lo_rw_aio+0x1ef0/0x1ef0 [ 264.537990] blkdev_ioctl+0x98e/0x21b0 [ 264.541882] ? blkpg_ioctl+0xc10/0xc10 [ 264.545754] ? lock_downgrade+0x900/0x900 [ 264.549901] ? check_preemption_disabled+0x48/0x280 [ 264.554920] ? kasan_check_read+0x11/0x20 [ 264.559058] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 264.564327] ? rcu_read_unlock_special+0x370/0x370 [ 264.569266] ? __fget+0x4d1/0x740 [ 264.572708] ? ksys_dup3+0x680/0x680 [ 264.576439] block_ioctl+0xee/0x130 [ 264.580072] ? blkdev_fallocate+0x400/0x400 [ 264.584384] do_vfs_ioctl+0x1de/0x1790 [ 264.588263] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 264.593789] ? ioctl_preallocate+0x300/0x300 [ 264.598186] ? __fget_light+0x2e9/0x430 [ 264.602155] ? fget_raw+0x20/0x20 [ 264.605597] ? rcu_read_lock_sched_held+0x14f/0x180 [ 264.610599] ? kmem_cache_free+0x24f/0x290 [ 264.614823] ? putname+0xf7/0x130 [ 264.618269] ? do_syscall_64+0x9a/0x820 [ 264.622254] ? do_syscall_64+0x9a/0x820 [ 264.626226] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 264.630815] ? security_file_ioctl+0x94/0xc0 [ 264.635246] ksys_ioctl+0xa9/0xd0 [ 264.638724] __x64_sys_ioctl+0x73/0xb0 [ 264.642612] do_syscall_64+0x1b9/0x820 [ 264.646505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.651858] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.656796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.661650] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.666670] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.671677] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.676701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.681569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.686748] RIP: 0033:0x4573d7 [ 264.689941] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.708838] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.716693] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 264.723947] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.731204] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 264.738478] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 264.745745] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:35 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x10000) close(r0) 12:25:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x81, 0x420001) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x7f, 0x1000, 0x8000, 0xffffffffffff8e9e}) close(r0) [ 264.916514] FAULT_INJECTION: forcing a failure. [ 264.916514] name failslab, interval 1, probability 0, space 0, times 0 [ 264.941488] CPU: 0 PID: 9177 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 264.950045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.950053] Call Trace: [ 264.950094] dump_stack+0x244/0x39d 12:25:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) socketpair(0x14, 0x5, 0x9, &(0x7f0000000000)) [ 264.950119] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.950150] should_fail.cold.4+0xa/0x17 [ 264.950172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.950190] ? pick_next_task_fair+0xa35/0x1c90 [ 264.950221] ? rcu_read_lock_sched_held+0x14f/0x180 [ 264.950267] ? graph_lock+0x270/0x270 [ 264.950303] ? print_usage_bug+0xc0/0xc0 [ 264.950354] ? find_held_lock+0x36/0x1c0 [ 264.962284] ? __lock_is_held+0xb5/0x140 [ 265.005884] ? reweight_entity+0x10f0/0x10f0 [ 265.010291] ? perf_trace_sched_process_exec+0x860/0x860 [ 265.015751] __should_failslab+0x124/0x180 [ 265.019975] should_failslab+0x9/0x14 [ 265.023763] kmem_cache_alloc+0x2be/0x730 [ 265.027905] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 265.032970] __kernfs_new_node+0x127/0x8d0 [ 265.037196] ? trace_hardirqs_off_caller+0x300/0x300 [ 265.042308] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 265.047067] ? _raw_spin_unlock_irq+0x60/0x80 [ 265.051545] ? __schedule+0x168b/0x21d0 [ 265.055504] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 265.060626] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 265.065746] ? graph_lock+0x270/0x270 [ 265.069555] ? graph_lock+0x270/0x270 [ 265.073375] ? enqueue_task_fair+0x24d/0xa50 [ 265.077775] ? find_held_lock+0x36/0x1c0 [ 265.081838] kernfs_new_node+0x95/0x120 [ 265.085819] kernfs_create_dir_ns+0x4d/0x160 [ 265.090228] internal_create_group+0x5fc/0xd80 [ 265.094803] ? remove_files.isra.1+0x190/0x190 [ 265.099369] ? up_write+0x7b/0x220 [ 265.102895] ? down_write_nested+0x130/0x130 [ 265.108156] ? down_read+0x120/0x120 [ 265.111864] sysfs_create_group+0x1f/0x30 [ 265.116023] lo_ioctl+0x166a/0x22a0 [ 265.119674] ? lo_rw_aio+0x1ef0/0x1ef0 [ 265.123599] ? find_held_lock+0x36/0x1c0 [ 265.127679] ? lo_rw_aio+0x1ef0/0x1ef0 [ 265.131588] blkdev_ioctl+0x98e/0x21b0 [ 265.135479] ? blkpg_ioctl+0xc10/0xc10 [ 265.139351] ? lock_downgrade+0x900/0x900 [ 265.143506] ? check_preemption_disabled+0x48/0x280 [ 265.148525] ? kasan_check_read+0x11/0x20 [ 265.152692] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 265.157957] ? rcu_read_unlock_special+0x370/0x370 [ 265.162893] ? __fget+0x4d1/0x740 [ 265.166363] ? ksys_dup3+0x680/0x680 [ 265.170085] block_ioctl+0xee/0x130 [ 265.173697] ? blkdev_fallocate+0x400/0x400 [ 265.178006] do_vfs_ioctl+0x1de/0x1790 [ 265.181882] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 265.187406] ? ioctl_preallocate+0x300/0x300 [ 265.191801] ? __fget_light+0x2e9/0x430 [ 265.195775] ? fget_raw+0x20/0x20 [ 265.199260] ? rcu_read_lock_sched_held+0x14f/0x180 [ 265.204276] ? kmem_cache_free+0x24f/0x290 [ 265.208509] ? putname+0xf7/0x130 [ 265.211951] ? do_syscall_64+0x9a/0x820 [ 265.215945] ? do_syscall_64+0x9a/0x820 [ 265.219908] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 265.224481] ? security_file_ioctl+0x94/0xc0 [ 265.228874] ksys_ioctl+0xa9/0xd0 [ 265.232333] __x64_sys_ioctl+0x73/0xb0 [ 265.236222] do_syscall_64+0x1b9/0x820 [ 265.240117] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.245472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.250397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.255236] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.260254] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.265273] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.270295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.275166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.280358] RIP: 0033:0x4573d7 [ 265.283539] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.302431] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.310124] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 265.317377] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 265.324630] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 265.331884] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 265.339136] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 265.358645] gfs2: not a GFS2 filesystem 12:25:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x804) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) r3 = getpgid(0x0) kcmp(r2, r3, 0x5, r1, r1) 12:25:36 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x3) 12:25:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xff1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) shutdown(r1, 0x0) r2 = socket$inet6(0xa, 0x803, 0x80) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x7fff}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x3, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}], 0x10) close(r0) 12:25:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) socketpair(0x14, 0x5, 0x9, &(0x7f0000000000)) 12:25:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) [ 265.519687] FAULT_INJECTION: forcing a failure. [ 265.519687] name failslab, interval 1, probability 0, space 0, times 0 [ 265.531343] CPU: 0 PID: 9196 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 265.539845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.549203] Call Trace: [ 265.551815] dump_stack+0x244/0x39d [ 265.555460] ? dump_stack_print_info.cold.1+0x20/0x20 [ 265.560663] ? update_load_avg+0x387/0x2470 [ 265.564991] should_fail.cold.4+0xa/0x17 [ 265.569073] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.574166] ? graph_lock+0x270/0x270 [ 265.577959] ? rb_erase+0x3710/0x3710 [ 265.581748] ? print_usage_bug+0xc0/0xc0 [ 265.585806] ? __update_load_avg_blocked_se+0x690/0x690 [ 265.591159] ? __update_load_avg_se+0xae0/0xae0 [ 265.595818] ? update_load_avg+0x387/0x2470 [ 265.600149] ? __update_load_avg_blocked_se+0x690/0x690 [ 265.605502] ? graph_lock+0x270/0x270 [ 265.609295] ? print_usage_bug+0xc0/0xc0 [ 265.613350] ? print_usage_bug+0xc0/0xc0 [ 265.617421] __should_failslab+0x124/0x180 [ 265.621663] should_failslab+0x9/0x14 [ 265.625453] kmem_cache_alloc+0x47/0x730 [ 265.629508] ? lock_downgrade+0x900/0x900 [ 265.633659] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 265.639382] idr_get_free+0x7a4/0xf70 [ 265.643184] ? radix_tree_iter_tag_clear+0x90/0x90 [ 265.648110] ? __save_stack_trace+0x8d/0xf0 [ 265.652425] ? save_stack+0xa9/0xd0 [ 265.656039] ? save_stack+0x43/0xd0 [ 265.659668] ? kasan_kmalloc+0xc7/0xe0 [ 265.663553] ? kasan_slab_alloc+0x12/0x20 [ 265.667692] ? kmem_cache_alloc+0x12e/0x730 [ 265.672000] ? __kernfs_new_node+0x127/0x8d0 [ 265.676395] ? kernfs_new_node+0x95/0x120 [ 265.680531] ? internal_create_group+0x5fc/0xd80 [ 265.685276] ? sysfs_create_group+0x1f/0x30 [ 265.689599] ? lo_ioctl+0x166a/0x22a0 [ 265.693399] ? blkdev_ioctl+0x98e/0x21b0 [ 265.697451] ? block_ioctl+0xee/0x130 [ 265.701241] ? do_vfs_ioctl+0x1de/0x1790 [ 265.705296] ? ksys_ioctl+0xa9/0xd0 [ 265.708923] ? __x64_sys_ioctl+0x73/0xb0 [ 265.712973] ? do_syscall_64+0x1b9/0x820 [ 265.717021] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.722374] ? find_held_lock+0x36/0x1c0 [ 265.726450] idr_alloc_u32+0x1d4/0x3a0 [ 265.730344] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 265.735175] ? lock_acquire+0x1ed/0x520 [ 265.739140] ? __kernfs_new_node+0x14e/0x8d0 [ 265.743534] ? __lock_is_held+0xb5/0x140 [ 265.747586] idr_alloc_cyclic+0x166/0x350 [ 265.751728] ? idr_alloc+0x1b0/0x1b0 [ 265.755436] ? __radix_tree_preload+0x1f7/0x280 [ 265.760111] __kernfs_new_node+0x1f4/0x8d0 [ 265.764345] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 265.769103] ? __switch_to_asm+0x34/0x70 [ 265.773162] ? __switch_to_asm+0x34/0x70 [ 265.777208] ? __switch_to_asm+0x40/0x70 [ 265.781264] ? __switch_to_asm+0x34/0x70 [ 265.785329] ? __switch_to_asm+0x40/0x70 [ 265.789391] ? __switch_to_asm+0x34/0x70 [ 265.793438] ? __switch_to_asm+0x40/0x70 [ 265.797500] ? __schedule+0x8d7/0x21d0 [ 265.801392] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 265.806487] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 265.811599] ? graph_lock+0x270/0x270 [ 265.815400] ? graph_lock+0x270/0x270 [ 265.819199] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 265.823794] ? find_held_lock+0x36/0x1c0 [ 265.827850] kernfs_new_node+0x95/0x120 [ 265.831834] kernfs_create_dir_ns+0x4d/0x160 [ 265.836248] internal_create_group+0x5fc/0xd80 [ 265.840828] ? remove_files.isra.1+0x190/0x190 [ 265.845413] ? up_write+0x7b/0x220 [ 265.848940] ? down_write_nested+0x130/0x130 [ 265.853356] ? down_read+0x120/0x120 [ 265.857094] sysfs_create_group+0x1f/0x30 [ 265.861296] lo_ioctl+0x166a/0x22a0 [ 265.864929] ? lo_rw_aio+0x1ef0/0x1ef0 [ 265.868803] ? find_held_lock+0x36/0x1c0 [ 265.872854] ? lo_rw_aio+0x1ef0/0x1ef0 [ 265.876744] blkdev_ioctl+0x98e/0x21b0 [ 265.880651] ? blkpg_ioctl+0xc10/0xc10 [ 265.884522] ? lock_downgrade+0x900/0x900 [ 265.888673] ? check_preemption_disabled+0x48/0x280 [ 265.893711] ? kasan_check_read+0x11/0x20 [ 265.897848] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 265.903138] ? rcu_read_unlock_special+0x370/0x370 [ 265.908109] ? __fget+0x4d1/0x740 [ 265.911591] ? ksys_dup3+0x680/0x680 [ 265.915310] block_ioctl+0xee/0x130 [ 265.918927] ? blkdev_fallocate+0x400/0x400 [ 265.923246] do_vfs_ioctl+0x1de/0x1790 [ 265.927122] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 265.932646] ? ioctl_preallocate+0x300/0x300 [ 265.937040] ? __fget_light+0x2e9/0x430 [ 265.941000] ? fget_raw+0x20/0x20 [ 265.944443] ? rcu_read_lock_sched_held+0x14f/0x180 [ 265.949444] ? kmem_cache_free+0x24f/0x290 [ 265.953679] ? putname+0xf7/0x130 [ 265.957137] ? do_syscall_64+0x9a/0x820 [ 265.961098] ? do_syscall_64+0x9a/0x820 [ 265.965075] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 265.969662] ? security_file_ioctl+0x94/0xc0 [ 265.974057] ksys_ioctl+0xa9/0xd0 [ 265.977515] __x64_sys_ioctl+0x73/0xb0 [ 265.981390] do_syscall_64+0x1b9/0x820 [ 265.985268] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.990634] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.995559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.000398] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.005400] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.010405] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.015414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.020252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.025427] RIP: 0033:0x4573d7 [ 266.028611] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.047496] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.055227] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 266.062487] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:25:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000140)="d9e1640f073e650f070f07360fc76d6366b80500000066b9c80000000f01d9dc600066b94c03000066b8c764000066ba000000000f300f090f20d86635080000000f22d8", 0x44}], 0x1, 0x1, &(0x7f00000001c0)=[@efer={0x2, 0xf001}, @flags={0x3, 0x1}], 0x2) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) close(r0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000080)=0x80000000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) [ 266.069761] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 266.077016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 266.084270] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 266.111140] gfs2: not a GFS2 filesystem 12:25:36 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454cc, 0x3) 12:25:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) socketpair(0x14, 0x5, 0x9, &(0x7f0000000000)) 12:25:36 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x894c, 0x3) 12:25:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x7, 0x7b7c627e, 0x3ff, 0x100, 0x0, 0x6, 0x40, 0x0, 0x5, 0x1, 0x3, 0xff, 0x10001, 0x87, 0xa31, 0x6, 0x3f, 0x1ff, 0x76c, 0x6, 0x6, 0x5, 0x0, 0x7, 0x0, 0x2000000000, 0xfffffffffffffffa, 0x80, 0x1000, 0x5, 0x9, 0x2, 0x0, 0x8, 0x9, 0xffffffffffffff7f, 0x0, 0xecf9, 0x2, @perf_config_ext={0x1ff, 0x8}, 0xc0, 0x7, 0x6d, 0x3, 0xffffffffffffffe0, 0x9, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x2) 12:25:37 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454cc, 0x3) [ 266.410127] FAULT_INJECTION: forcing a failure. [ 266.410127] name failslab, interval 1, probability 0, space 0, times 0 [ 266.421692] CPU: 0 PID: 9228 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 266.430197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.439566] Call Trace: [ 266.442191] dump_stack+0x244/0x39d [ 266.445861] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.451082] ? print_usage_bug+0xc0/0xc0 [ 266.455172] should_fail.cold.4+0xa/0x17 12:25:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sched\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) bind(r0, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x80) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000000)='\x00', 0x7) [ 266.459267] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.464392] ? graph_lock+0x270/0x270 [ 266.468209] ? print_usage_bug+0xc0/0xc0 [ 266.472308] ? rb_next+0x140/0x140 [ 266.475868] ? __lock_acquire+0x62f/0x4c20 [ 266.480113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.485669] ? __update_load_avg_blocked_se+0x690/0x690 [ 266.491074] ? __update_load_avg_se+0xae0/0xae0 [ 266.495781] ? update_load_avg+0x387/0x2470 [ 266.500129] ? __update_load_avg_blocked_se+0x690/0x690 [ 266.505506] ? graph_lock+0x270/0x270 [ 266.509373] ? attach_entity_load_avg+0x860/0x860 [ 266.514244] ? print_usage_bug+0xc0/0xc0 [ 266.518346] __should_failslab+0x124/0x180 [ 266.522631] should_failslab+0x9/0x14 [ 266.526435] kmem_cache_alloc+0x47/0x730 [ 266.530506] ? lock_downgrade+0x900/0x900 [ 266.534680] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 266.540399] idr_get_free+0x7a4/0xf70 [ 266.544228] ? radix_tree_iter_tag_clear+0x90/0x90 [ 266.549164] ? __save_stack_trace+0x8d/0xf0 [ 266.553506] ? save_stack+0xa9/0xd0 [ 266.557138] ? save_stack+0x43/0xd0 [ 266.560766] ? kasan_kmalloc+0xc7/0xe0 [ 266.564657] ? kasan_slab_alloc+0x12/0x20 [ 266.568804] ? kmem_cache_alloc+0x12e/0x730 [ 266.573139] ? __kernfs_new_node+0x127/0x8d0 [ 266.577554] ? kernfs_new_node+0x95/0x120 [ 266.581739] ? internal_create_group+0x5fc/0xd80 [ 266.586517] ? sysfs_create_group+0x1f/0x30 [ 266.590856] ? lo_ioctl+0x166a/0x22a0 [ 266.594677] ? blkdev_ioctl+0x98e/0x21b0 [ 266.598737] ? block_ioctl+0xee/0x130 [ 266.602538] ? do_vfs_ioctl+0x1de/0x1790 [ 266.606618] ? ksys_ioctl+0xa9/0xd0 [ 266.610271] ? __x64_sys_ioctl+0x73/0xb0 [ 266.614341] ? do_syscall_64+0x1b9/0x820 [ 266.618410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.623914] ? find_held_lock+0x36/0x1c0 [ 266.627993] idr_alloc_u32+0x1d4/0x3a0 [ 266.631892] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 266.636738] ? lock_acquire+0x1ed/0x520 [ 266.640717] ? __kernfs_new_node+0x14e/0x8d0 [ 266.645132] ? __lock_is_held+0xb5/0x140 [ 266.649205] idr_alloc_cyclic+0x166/0x350 [ 266.653376] ? idr_alloc+0x1b0/0x1b0 [ 266.657109] ? __radix_tree_preload+0x1f7/0x280 [ 266.661788] __kernfs_new_node+0x1f4/0x8d0 [ 266.666046] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 266.670822] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 266.675929] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 266.681052] ? graph_lock+0x270/0x270 [ 266.684862] ? print_usage_bug+0xc0/0xc0 [ 266.688925] ? graph_lock+0x270/0x270 [ 266.692768] ? enqueue_task_fair+0x24d/0xa50 [ 266.697182] ? find_held_lock+0x36/0x1c0 [ 266.701279] kernfs_new_node+0x95/0x120 [ 266.705281] kernfs_create_dir_ns+0x4d/0x160 [ 266.709704] internal_create_group+0x5fc/0xd80 [ 266.714484] ? remove_files.isra.1+0x190/0x190 [ 266.719066] ? up_write+0x7b/0x220 [ 266.722614] ? down_write_nested+0x130/0x130 [ 266.727025] ? down_read+0x120/0x120 [ 266.730760] sysfs_create_group+0x1f/0x30 [ 266.734914] lo_ioctl+0x166a/0x22a0 [ 266.738555] ? lo_rw_aio+0x1ef0/0x1ef0 [ 266.742450] ? find_held_lock+0x36/0x1c0 [ 266.746536] ? lo_rw_aio+0x1ef0/0x1ef0 [ 266.750433] blkdev_ioctl+0x98e/0x21b0 [ 266.754331] ? blkpg_ioctl+0xc10/0xc10 [ 266.758230] ? lock_downgrade+0x900/0x900 [ 266.762381] ? check_preemption_disabled+0x48/0x280 [ 266.767409] ? kasan_check_read+0x11/0x20 [ 266.771560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 266.776859] ? rcu_read_unlock_special+0x370/0x370 [ 266.781804] ? __fget+0x4d1/0x740 [ 266.785288] ? ksys_dup3+0x680/0x680 [ 266.789023] block_ioctl+0xee/0x130 [ 266.792670] ? blkdev_fallocate+0x400/0x400 [ 266.796994] do_vfs_ioctl+0x1de/0x1790 [ 266.800891] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 266.806466] ? ioctl_preallocate+0x300/0x300 [ 266.810877] ? __fget_light+0x2e9/0x430 [ 266.814857] ? fget_raw+0x20/0x20 [ 266.818356] ? rcu_read_lock_sched_held+0x14f/0x180 [ 266.823381] ? kmem_cache_free+0x24f/0x290 [ 266.827621] ? putname+0xf7/0x130 [ 266.831083] ? do_syscall_64+0x9a/0x820 [ 266.835076] ? do_syscall_64+0x9a/0x820 [ 266.839082] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 266.843676] ? security_file_ioctl+0x94/0xc0 [ 266.848092] ksys_ioctl+0xa9/0xd0 [ 266.851555] __x64_sys_ioctl+0x73/0xb0 [ 266.855456] do_syscall_64+0x1b9/0x820 [ 266.859355] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.864725] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.869670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.874538] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.879560] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.884583] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.889614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.894470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.899658] RIP: 0033:0x4573d7 [ 266.902857] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.921789] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.929496] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 266.936764] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.944039] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 266.951325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:25:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x804) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) r3 = getpgid(0x0) kcmp(r2, r3, 0x5, r1, r1) [ 266.958597] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 266.987792] gfs2: not a GFS2 filesystem 12:25:37 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454cc, 0x3) 12:25:37 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x804) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) r3 = getpgid(0x0) kcmp(r2, r3, 0x5, r1, r1) 12:25:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) close(r0) 12:25:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) [ 267.188179] FAULT_INJECTION: forcing a failure. [ 267.188179] name failslab, interval 1, probability 0, space 0, times 0 [ 267.227980] CPU: 0 PID: 9259 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 12:25:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8d8e299ec38993c9) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x20002) close(r0) [ 267.236492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.245962] Call Trace: [ 267.245990] dump_stack+0x244/0x39d [ 267.246017] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.246049] should_fail.cold.4+0xa/0x17 [ 267.252273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.252294] ? lock_release+0xa10/0xa10 [ 267.252309] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.252343] ? graph_lock+0x270/0x270 [ 267.252376] ? find_held_lock+0x36/0x1c0 [ 267.261638] ? __lock_is_held+0xb5/0x140 [ 267.261670] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.261685] ? kernfs_activate+0x21a/0x2c0 [ 267.261713] __should_failslab+0x124/0x180 [ 267.261734] should_failslab+0x9/0x14 [ 267.305853] kmem_cache_alloc+0x2be/0x730 [ 267.310034] ? lock_downgrade+0x900/0x900 [ 267.314197] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.319251] __kernfs_new_node+0x127/0x8d0 [ 267.323475] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 267.328234] ? graph_lock+0x270/0x270 [ 267.332028] ? __lock_is_held+0xb5/0x140 [ 267.336089] ? wait_for_completion+0x8a0/0x8a0 [ 267.340678] ? mutex_unlock+0xd/0x10 [ 267.344384] ? kernfs_activate+0x21a/0x2c0 [ 267.348607] ? kernfs_walk_and_get_ns+0x340/0x340 [ 267.353440] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 267.358964] ? kernfs_link_sibling+0x1d2/0x3b0 [ 267.363584] kernfs_new_node+0x95/0x120 [ 267.367562] __kernfs_create_file+0x5a/0x340 [ 267.371972] sysfs_add_file_mode_ns+0x222/0x530 [ 267.376636] internal_create_group+0x3df/0xd80 [ 267.381262] ? remove_files.isra.1+0x190/0x190 [ 267.385840] ? up_write+0x7b/0x220 [ 267.389373] ? down_write_nested+0x130/0x130 [ 267.393781] ? down_read+0x120/0x120 [ 267.397489] sysfs_create_group+0x1f/0x30 [ 267.401640] lo_ioctl+0x166a/0x22a0 [ 267.405272] ? lo_rw_aio+0x1ef0/0x1ef0 [ 267.409164] ? find_held_lock+0x36/0x1c0 [ 267.413250] ? lo_rw_aio+0x1ef0/0x1ef0 [ 267.417149] blkdev_ioctl+0x98e/0x21b0 [ 267.421042] ? blkpg_ioctl+0xc10/0xc10 [ 267.424928] ? lock_downgrade+0x900/0x900 [ 267.429077] ? check_preemption_disabled+0x48/0x280 [ 267.434085] ? kasan_check_read+0x11/0x20 [ 267.438230] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 267.443495] ? rcu_read_unlock_special+0x370/0x370 [ 267.448418] ? __fget+0x4d1/0x740 [ 267.451860] ? ksys_dup3+0x680/0x680 [ 267.455566] block_ioctl+0xee/0x130 [ 267.459179] ? blkdev_fallocate+0x400/0x400 [ 267.463488] do_vfs_ioctl+0x1de/0x1790 [ 267.467375] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 267.472901] ? ioctl_preallocate+0x300/0x300 [ 267.477294] ? __fget_light+0x2e9/0x430 [ 267.481260] ? fget_raw+0x20/0x20 [ 267.484718] ? rcu_read_lock_sched_held+0x14f/0x180 [ 267.489721] ? kmem_cache_free+0x24f/0x290 [ 267.493964] ? putname+0xf7/0x130 [ 267.497408] ? do_syscall_64+0x9a/0x820 [ 267.501369] ? do_syscall_64+0x9a/0x820 [ 267.505354] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 267.509934] ? security_file_ioctl+0x94/0xc0 [ 267.514342] ksys_ioctl+0xa9/0xd0 [ 267.517786] __x64_sys_ioctl+0x73/0xb0 [ 267.521664] do_syscall_64+0x1b9/0x820 [ 267.525555] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.530924] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.535838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.540692] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.545725] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.550737] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.555775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.560608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.565782] RIP: 0033:0x4573d7 [ 267.568976] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:25:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xffff, 0x482) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)={0x0, @reserved}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x23ffff) close(r1) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000240)={0x40}, &(0x7f0000000180), &(0x7f0000000200)={r2, r3+10000000}, 0x8) 12:25:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x3) 12:25:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xff, 0x40000) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040)=0x3c, 0x4) [ 267.587876] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.595568] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 267.602822] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.610091] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 267.617382] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 267.624637] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) [ 267.648551] gfs2: not a GFS2 filesystem 12:25:38 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)={0x6, 0x1, {0xffffffffffffffff, 0x3, 0x7000000000000, 0x2, 0x9}}) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8000, 0x0) setsockopt$inet6_buf(r1, 0x29, 0xf2, &(0x7f0000000100)="8f92a4726b0d150ada105d3c18bfca89ef757e723716deb67d5c8d345aa7ed6e3e0458ca82755dc0c57318da3b6769fd798881a321d7823de049327ca1415294e86312776bce5d69e004de6d0e0634cb8cca477e070f77ff14d30a33108e27c6d223d95749aedc363dc1fa0e0b6ec01c9c836b37f08d7c7dc92118edcdebcbae35b27ac61383fd3f309751a92acae3", 0x8f) 12:25:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) [ 267.843594] FAULT_INJECTION: forcing a failure. [ 267.843594] name failslab, interval 1, probability 0, space 0, times 0 [ 267.856033] CPU: 0 PID: 9289 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 267.864536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.864544] Call Trace: [ 267.864569] dump_stack+0x244/0x39d [ 267.864594] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.864627] should_fail.cold.4+0xa/0x17 [ 267.864652] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.864674] ? lock_release+0xa10/0xa10 [ 267.864691] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.864717] ? graph_lock+0x270/0x270 [ 267.864749] ? find_held_lock+0x36/0x1c0 [ 267.880309] ? __lock_is_held+0xb5/0x140 [ 267.880348] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.880365] ? kernfs_activate+0x21a/0x2c0 [ 267.880392] __should_failslab+0x124/0x180 [ 267.880413] should_failslab+0x9/0x14 [ 267.889648] kmem_cache_alloc+0x2be/0x730 [ 267.889666] ? lock_downgrade+0x900/0x900 [ 267.889685] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.889703] __kernfs_new_node+0x127/0x8d0 [ 267.889722] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 267.955931] ? graph_lock+0x270/0x270 [ 267.959763] ? __lock_is_held+0xb5/0x140 [ 267.963857] ? wait_for_completion+0x8a0/0x8a0 [ 267.968454] ? mutex_unlock+0xd/0x10 [ 267.972158] ? kernfs_activate+0x21a/0x2c0 [ 267.976381] ? kernfs_walk_and_get_ns+0x340/0x340 [ 267.981235] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 267.986757] ? kernfs_link_sibling+0x1d2/0x3b0 [ 267.991340] kernfs_new_node+0x95/0x120 [ 267.995326] __kernfs_create_file+0x5a/0x340 [ 267.999739] sysfs_add_file_mode_ns+0x222/0x530 [ 268.004429] internal_create_group+0x3df/0xd80 [ 268.009003] ? remove_files.isra.1+0x190/0x190 [ 268.013582] ? up_write+0x7b/0x220 [ 268.017108] ? down_write_nested+0x130/0x130 [ 268.021505] ? down_read+0x120/0x120 [ 268.025240] sysfs_create_group+0x1f/0x30 [ 268.029396] lo_ioctl+0x166a/0x22a0 [ 268.033019] ? lo_rw_aio+0x1ef0/0x1ef0 [ 268.036902] ? find_held_lock+0x36/0x1c0 [ 268.040967] ? lo_rw_aio+0x1ef0/0x1ef0 [ 268.044843] blkdev_ioctl+0x98e/0x21b0 [ 268.048718] ? blkpg_ioctl+0xc10/0xc10 [ 268.052610] ? lock_downgrade+0x900/0x900 [ 268.056835] ? check_preemption_disabled+0x48/0x280 [ 268.061844] ? kasan_check_read+0x11/0x20 [ 268.065986] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 268.071270] ? rcu_read_unlock_special+0x370/0x370 [ 268.076193] ? __fget+0x4d1/0x740 [ 268.079647] ? ksys_dup3+0x680/0x680 [ 268.083373] block_ioctl+0xee/0x130 [ 268.086994] ? blkdev_fallocate+0x400/0x400 [ 268.091308] do_vfs_ioctl+0x1de/0x1790 [ 268.095197] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 268.100774] ? ioctl_preallocate+0x300/0x300 [ 268.105168] ? __fget_light+0x2e9/0x430 [ 268.109145] ? fget_raw+0x20/0x20 [ 268.112584] ? rcu_read_lock_sched_held+0x14f/0x180 [ 268.117588] ? kmem_cache_free+0x24f/0x290 [ 268.121819] ? putname+0xf7/0x130 [ 268.125307] ? do_syscall_64+0x9a/0x820 [ 268.129324] ? do_syscall_64+0x9a/0x820 [ 268.133293] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 268.137873] ? security_file_ioctl+0x94/0xc0 [ 268.142271] ksys_ioctl+0xa9/0xd0 [ 268.145727] __x64_sys_ioctl+0x73/0xb0 [ 268.149620] do_syscall_64+0x1b9/0x820 [ 268.153513] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.158895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.163825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.168678] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.173687] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.178713] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.183750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.188588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.193795] RIP: 0033:0x4573d7 [ 268.197002] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.215888] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.223579] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 268.230832] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.238091] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 12:25:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) [ 268.245350] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 268.252618] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 268.307589] gfs2: not a GFS2 filesystem 12:25:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0x3) 12:25:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) [ 268.359726] Unknown ioctl 1080054598 12:25:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ff9000/0x4000)=nil) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xdcb, 0x2a4000) close(r0) 12:25:39 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 268.498845] FAULT_INJECTION: forcing a failure. [ 268.498845] name failslab, interval 1, probability 0, space 0, times 0 [ 268.521056] CPU: 0 PID: 9317 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 268.529586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.538938] Call Trace: [ 268.541534] dump_stack+0x244/0x39d [ 268.545175] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.550387] should_fail.cold.4+0xa/0x17 [ 268.554455] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.559565] ? lock_release+0xa10/0xa10 [ 268.563543] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.569016] ? graph_lock+0x270/0x270 [ 268.572830] ? find_held_lock+0x36/0x1c0 [ 268.576902] ? __lock_is_held+0xb5/0x140 [ 268.580979] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.586434] ? kernfs_activate+0x21a/0x2c0 [ 268.590693] __should_failslab+0x124/0x180 [ 268.594937] should_failslab+0x9/0x14 [ 268.598774] kmem_cache_alloc+0x2be/0x730 [ 268.602944] ? lock_downgrade+0x900/0x900 [ 268.607097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.612117] __kernfs_new_node+0x127/0x8d0 [ 268.616360] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 268.621122] ? graph_lock+0x270/0x270 [ 268.624942] ? __lock_is_held+0xb5/0x140 [ 268.629001] ? wait_for_completion+0x8a0/0x8a0 [ 268.633594] ? mutex_unlock+0xd/0x10 [ 268.637309] ? kernfs_activate+0x21a/0x2c0 [ 268.641561] ? kernfs_walk_and_get_ns+0x340/0x340 [ 268.646413] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 268.651956] ? kernfs_link_sibling+0x1d2/0x3b0 [ 268.656551] kernfs_new_node+0x95/0x120 [ 268.660541] __kernfs_create_file+0x5a/0x340 [ 268.665005] sysfs_add_file_mode_ns+0x222/0x530 [ 268.669692] internal_create_group+0x3df/0xd80 [ 268.674329] ? remove_files.isra.1+0x190/0x190 [ 268.678922] ? up_write+0x7b/0x220 [ 268.682486] ? down_write_nested+0x130/0x130 [ 268.686898] ? down_read+0x120/0x120 [ 268.690632] sysfs_create_group+0x1f/0x30 [ 268.694784] lo_ioctl+0x166a/0x22a0 [ 268.698424] ? lo_rw_aio+0x1ef0/0x1ef0 [ 268.702325] ? find_held_lock+0x36/0x1c0 [ 268.706409] ? lo_rw_aio+0x1ef0/0x1ef0 [ 268.710305] blkdev_ioctl+0x98e/0x21b0 [ 268.714367] ? blkpg_ioctl+0xc10/0xc10 [ 268.718284] ? lock_downgrade+0x900/0x900 [ 268.722439] ? check_preemption_disabled+0x48/0x280 [ 268.727469] ? kasan_check_read+0x11/0x20 [ 268.731619] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 268.736902] ? rcu_read_unlock_special+0x370/0x370 [ 268.741843] ? __fget+0x4d1/0x740 [ 268.745323] ? ksys_dup3+0x680/0x680 [ 268.749051] block_ioctl+0xee/0x130 [ 268.752680] ? blkdev_fallocate+0x400/0x400 [ 268.757008] do_vfs_ioctl+0x1de/0x1790 [ 268.760906] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 268.766468] ? ioctl_preallocate+0x300/0x300 [ 268.770883] ? __fget_light+0x2e9/0x430 [ 268.774864] ? fget_raw+0x20/0x20 [ 268.778332] ? rcu_read_lock_sched_held+0x14f/0x180 [ 268.783355] ? kmem_cache_free+0x24f/0x290 [ 268.787598] ? putname+0xf7/0x130 [ 268.791064] ? do_syscall_64+0x9a/0x820 [ 268.795057] ? do_syscall_64+0x9a/0x820 [ 268.799042] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 268.803633] ? security_file_ioctl+0x94/0xc0 [ 268.808064] ksys_ioctl+0xa9/0xd0 [ 268.811524] __x64_sys_ioctl+0x73/0xb0 [ 268.815417] do_syscall_64+0x1b9/0x820 [ 268.819310] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.824691] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.829623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.834490] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.839542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.844597] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.849622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.854475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.859665] RIP: 0033:0x4573d7 [ 268.862862] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.881762] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.889471] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 268.896752] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.904034] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 268.911303] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 268.918591] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x201) 12:25:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) [ 268.965420] gfs2: not a GFS2 filesystem 12:25:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d4, 0x3) 12:25:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:39 executing program 3: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') r3 = open(&(0x7f0000000040)='./file0\x00', 0x200800, 0x10) mq_timedsend(r3, &(0x7f0000000080)="33ed1dcd5e405f0a94072bc34e96901217f96d21e671eacb699829a76f63cc6a3e81c6266a35ebdd361dd1b07272e1b98c0a92d9c6ced83d805b0e9efa3dbac3ee0cbc36286a210a9d3ef1f1003e77bf1ae09c48f6b1959cc3f8674ed48322ace288b4c5", 0x64, 0x4, &(0x7f0000000140)) sync_file_range(r1, 0x8, 0x9, 0x2) 12:25:39 executing program 0: socketpair(0x10, 0x1, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000"}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:25:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:39 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454cc, 0x3) 12:25:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x4020940d, 0x3) [ 269.285140] FAULT_INJECTION: forcing a failure. [ 269.285140] name failslab, interval 1, probability 0, space 0, times 0 [ 269.318194] CPU: 1 PID: 9351 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 269.326721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.326729] Call Trace: [ 269.326753] dump_stack+0x244/0x39d [ 269.326778] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.326811] should_fail.cold.4+0xa/0x17 [ 269.326842] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.326864] ? lock_release+0xa10/0xa10 [ 269.326881] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.326909] ? graph_lock+0x270/0x270 [ 269.347650] ? find_held_lock+0x36/0x1c0 [ 269.347673] ? __lock_is_held+0xb5/0x140 [ 269.347702] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.356839] ? kernfs_activate+0x21a/0x2c0 [ 269.356869] __should_failslab+0x124/0x180 [ 269.356889] should_failslab+0x9/0x14 [ 269.356906] kmem_cache_alloc+0x2be/0x730 [ 269.356926] ? lock_downgrade+0x900/0x900 [ 269.366342] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 269.366363] __kernfs_new_node+0x127/0x8d0 [ 269.366385] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 269.366402] ? graph_lock+0x270/0x270 [ 269.366427] ? __lock_is_held+0xb5/0x140 [ 269.374302] ? wait_for_completion+0x8a0/0x8a0 [ 269.374333] ? mutex_unlock+0xd/0x10 12:25:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 269.374349] ? kernfs_activate+0x21a/0x2c0 [ 269.374368] ? kernfs_walk_and_get_ns+0x340/0x340 [ 269.374388] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.383893] ? kernfs_link_sibling+0x1d2/0x3b0 [ 269.383915] kernfs_new_node+0x95/0x120 [ 269.383937] __kernfs_create_file+0x5a/0x340 [ 269.383960] sysfs_add_file_mode_ns+0x222/0x530 [ 269.383986] internal_create_group+0x3df/0xd80 [ 269.384012] ? remove_files.isra.1+0x190/0x190 [ 269.392467] ? up_write+0x7b/0x220 [ 269.392484] ? down_write_nested+0x130/0x130 12:25:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x89d64e56598e95e9, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) [ 269.392500] ? down_read+0x120/0x120 [ 269.392531] sysfs_create_group+0x1f/0x30 [ 269.392553] lo_ioctl+0x166a/0x22a0 [ 269.400495] ? lo_rw_aio+0x1ef0/0x1ef0 [ 269.400515] ? find_held_lock+0x36/0x1c0 [ 269.400536] ? lo_rw_aio+0x1ef0/0x1ef0 [ 269.400556] blkdev_ioctl+0x98e/0x21b0 [ 269.400575] ? blkpg_ioctl+0xc10/0xc10 [ 269.400591] ? lock_downgrade+0x900/0x900 [ 269.400611] ? check_preemption_disabled+0x48/0x280 [ 269.409762] ? kasan_check_read+0x11/0x20 [ 269.409779] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 269.409797] ? rcu_read_unlock_special+0x370/0x370 [ 269.409831] ? __fget+0x4d1/0x740 [ 269.409854] ? ksys_dup3+0x680/0x680 [ 269.409883] block_ioctl+0xee/0x130 [ 269.418851] ? blkdev_fallocate+0x400/0x400 [ 269.418870] do_vfs_ioctl+0x1de/0x1790 [ 269.418891] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 269.418910] ? ioctl_preallocate+0x300/0x300 [ 269.418927] ? __fget_light+0x2e9/0x430 [ 269.418944] ? fget_raw+0x20/0x20 [ 269.426795] ? rcu_read_lock_sched_held+0x14f/0x180 [ 269.426812] ? kmem_cache_free+0x24f/0x290 [ 269.426835] ? putname+0xf7/0x130 [ 269.426853] ? do_syscall_64+0x9a/0x820 [ 269.426871] ? do_syscall_64+0x9a/0x820 [ 269.435167] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 269.435190] ? security_file_ioctl+0x94/0xc0 [ 269.435210] ksys_ioctl+0xa9/0xd0 [ 269.435242] __x64_sys_ioctl+0x73/0xb0 [ 269.435262] do_syscall_64+0x1b9/0x820 [ 269.444321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.444342] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.444358] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:25:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) close(r0) [ 269.444378] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.444397] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.444416] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.454540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.454566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.454579] RIP: 0033:0x4573d7 [ 269.454595] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:25:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x6080, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000040)={0xffffffff, 0x2, 0x13, "86db0448fbd93ae3668621445c3f95713a8728899efc37a7d3d74f0eb0fee3fc3029ed1607299144d70bc2ab3217f6dfbc57665138a2c78383b3fd42", 0x6, "b3fb611c1d82aaed5f18cbe076e0f55f5f2cc1a6969c735fd2f9c4d2da5d7f546eefba45cd344177be4394fa46c4e5661304eb231beff7190f26a28c", 0x20}) close(r0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) [ 269.454608] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.462984] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 269.462993] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.463016] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.463040] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 269.463049] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 269.656988] gfs2: not a GFS2 filesystem 12:25:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) 12:25:40 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x245ef207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x7, 0x70, 0xee, 0x100, 0x1ff, 0xbae, 0x0, 0x80000001, 0x1000, 0x4, 0x100000000, 0x6, 0x1ff, 0x1, 0x800, 0x2, 0x3, 0xffffffff, 0xfffffffffffffffa, 0x7, 0x80, 0xb4, 0x3ff, 0x80, 0x6, 0x101, 0x9, 0x260, 0x5, 0x4, 0x4, 0x3, 0x2, 0x55e2, 0x3ff, 0x4, 0x80000000000, 0x8, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0x800}, 0x1020, 0x8001, 0x8f0c, 0x7, 0x7, 0x3f, 0x1}, r1, 0xf, 0xffffffffffffff9c, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f00000004c0)={0x2, 0x9, 0xffffffffffffffff, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) close(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r5, 0x9, 0x3, 0x0, 0x7, 0x40}, 0x14) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000700)={{0x2, 0x4e21, @multicast1}, {0x1, @local}, 0x0, {0x2, 0x4e22, @rand_addr=0x4}, 'team_slave_0\x00'}) r6 = msgget(0x3, 0x400) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000580)=0x0) r8 = getpgid(0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x400, r2, r3, r2, r3, 0x0, 0x1}, 0x2c04f733, 0x3123, 0x44, 0x3, 0x0, 0xfffffffffffffffb, r7, r8}) r9 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x8, 0xc0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r5, 0x20}, 0x8) 12:25:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) close(r1) fcntl$getown(r0, 0x9) [ 269.933956] FAULT_INJECTION: forcing a failure. [ 269.933956] name failslab, interval 1, probability 0, space 0, times 0 [ 269.953753] CPU: 1 PID: 9391 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 269.962290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.971656] Call Trace: [ 269.974279] dump_stack+0x244/0x39d [ 269.977933] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.983163] should_fail.cold.4+0xa/0x17 [ 269.987260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.992376] ? lock_release+0xa10/0xa10 [ 269.996358] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.001863] ? graph_lock+0x270/0x270 [ 270.005691] ? find_held_lock+0x36/0x1c0 [ 270.009775] ? __lock_is_held+0xb5/0x140 [ 270.013872] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.019338] ? kernfs_activate+0x21a/0x2c0 [ 270.023596] __should_failslab+0x124/0x180 [ 270.027864] should_failslab+0x9/0x14 [ 270.031682] kmem_cache_alloc+0x2be/0x730 [ 270.035858] ? lock_downgrade+0x900/0x900 [ 270.040023] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.045049] __kernfs_new_node+0x127/0x8d0 [ 270.049307] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 270.054057] ? graph_lock+0x270/0x270 [ 270.057854] ? __lock_is_held+0xb5/0x140 [ 270.061917] ? wait_for_completion+0x8a0/0x8a0 [ 270.066493] ? mutex_unlock+0xd/0x10 [ 270.070193] ? kernfs_activate+0x21a/0x2c0 [ 270.074428] ? kernfs_walk_and_get_ns+0x340/0x340 [ 270.079262] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.084795] ? kernfs_link_sibling+0x1d2/0x3b0 [ 270.089402] kernfs_new_node+0x95/0x120 [ 270.093381] __kernfs_create_file+0x5a/0x340 [ 270.097784] sysfs_add_file_mode_ns+0x222/0x530 [ 270.102447] internal_create_group+0x3df/0xd80 [ 270.107052] ? remove_files.isra.1+0x190/0x190 [ 270.111621] ? up_write+0x7b/0x220 [ 270.115174] ? down_write_nested+0x130/0x130 [ 270.119571] ? down_read+0x120/0x120 [ 270.123282] sysfs_create_group+0x1f/0x30 [ 270.127428] lo_ioctl+0x166a/0x22a0 [ 270.131048] ? lo_rw_aio+0x1ef0/0x1ef0 [ 270.134924] ? find_held_lock+0x36/0x1c0 [ 270.138974] ? lo_rw_aio+0x1ef0/0x1ef0 [ 270.142850] blkdev_ioctl+0x98e/0x21b0 [ 270.146792] ? blkpg_ioctl+0xc10/0xc10 [ 270.150676] ? lock_downgrade+0x900/0x900 [ 270.154811] ? check_preemption_disabled+0x48/0x280 [ 270.159856] ? kasan_check_read+0x11/0x20 [ 270.163994] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 270.169259] ? rcu_read_unlock_special+0x370/0x370 [ 270.174184] ? __fget+0x4d1/0x740 [ 270.177643] ? ksys_dup3+0x680/0x680 [ 270.181375] block_ioctl+0xee/0x130 [ 270.185008] ? blkdev_fallocate+0x400/0x400 [ 270.189321] do_vfs_ioctl+0x1de/0x1790 [ 270.193237] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.198765] ? ioctl_preallocate+0x300/0x300 [ 270.203161] ? __fget_light+0x2e9/0x430 [ 270.207137] ? fget_raw+0x20/0x20 [ 270.210608] ? rcu_read_lock_sched_held+0x14f/0x180 [ 270.215635] ? kmem_cache_free+0x24f/0x290 [ 270.219874] ? putname+0xf7/0x130 [ 270.223323] ? do_syscall_64+0x9a/0x820 [ 270.227288] ? do_syscall_64+0x9a/0x820 [ 270.231267] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 270.235871] ? security_file_ioctl+0x94/0xc0 [ 270.240275] ksys_ioctl+0xa9/0xd0 [ 270.243717] __x64_sys_ioctl+0x73/0xb0 [ 270.247591] do_syscall_64+0x1b9/0x820 [ 270.251471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.256827] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.261755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.266630] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.271639] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.276653] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.281675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.286514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.291691] RIP: 0033:0x4573d7 [ 270.294889] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.313777] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.321489] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 270.328758] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:25:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x2, 0x3) 12:25:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:40 executing program 0: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xbda) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 270.336012] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.343308] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 270.350567] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 270.399165] gfs2: not a GFS2 filesystem 12:25:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x245ef207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x7, 0x70, 0xee, 0x100, 0x1ff, 0xbae, 0x0, 0x80000001, 0x1000, 0x4, 0x100000000, 0x6, 0x1ff, 0x1, 0x800, 0x2, 0x3, 0xffffffff, 0xfffffffffffffffa, 0x7, 0x80, 0xb4, 0x3ff, 0x80, 0x6, 0x101, 0x9, 0x260, 0x5, 0x4, 0x4, 0x3, 0x2, 0x55e2, 0x3ff, 0x4, 0x80000000000, 0x8, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0x800}, 0x1020, 0x8001, 0x8f0c, 0x7, 0x7, 0x3f, 0x1}, r1, 0xf, 0xffffffffffffff9c, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f00000004c0)={0x2, 0x9, 0xffffffffffffffff, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) close(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r5, 0x9, 0x3, 0x0, 0x7, 0x40}, 0x14) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000700)={{0x2, 0x4e21, @multicast1}, {0x1, @local}, 0x0, {0x2, 0x4e22, @rand_addr=0x4}, 'team_slave_0\x00'}) r6 = msgget(0x3, 0x400) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000580)=0x0) r8 = getpgid(0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x400, r2, r3, r2, r3, 0x0, 0x1}, 0x2c04f733, 0x3123, 0x44, 0x3, 0x0, 0xfffffffffffffffb, r7, r8}) r9 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x8, 0xc0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r5, 0x20}, 0x8) 12:25:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:41 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:41 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) 12:25:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454dd, 0x3) 12:25:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x8000, 0x4) [ 270.671643] FAULT_INJECTION: forcing a failure. [ 270.671643] name failslab, interval 1, probability 0, space 0, times 0 [ 270.707263] CPU: 0 PID: 9431 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 270.715875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.725222] Call Trace: [ 270.727799] dump_stack+0x244/0x39d [ 270.731417] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.736604] should_fail.cold.4+0xa/0x17 [ 270.740656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.745749] ? lock_release+0xa10/0xa10 [ 270.749725] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.755176] ? graph_lock+0x270/0x270 [ 270.758968] ? find_held_lock+0x36/0x1c0 [ 270.763047] ? __lock_is_held+0xb5/0x140 [ 270.767203] ? rndis_wlan_do_link_up_work+0xb08/0xdf0 [ 270.772400] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.777838] ? kernfs_activate+0x21a/0x2c0 [ 270.782065] __should_failslab+0x124/0x180 [ 270.786309] should_failslab+0x9/0x14 [ 270.790120] kmem_cache_alloc+0x2be/0x730 [ 270.794262] ? lock_downgrade+0x900/0x900 [ 270.798414] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.803420] __kernfs_new_node+0x127/0x8d0 [ 270.807646] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 270.812391] ? graph_lock+0x270/0x270 [ 270.816183] ? __lock_is_held+0xb5/0x140 [ 270.820247] ? wait_for_completion+0x8a0/0x8a0 [ 270.824847] ? mutex_unlock+0xd/0x10 [ 270.828579] ? kernfs_activate+0x21a/0x2c0 [ 270.832844] ? kernfs_walk_and_get_ns+0x340/0x340 [ 270.837678] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.843202] ? kernfs_link_sibling+0x1d2/0x3b0 [ 270.847837] kernfs_new_node+0x95/0x120 [ 270.851818] __kernfs_create_file+0x5a/0x340 [ 270.856258] sysfs_add_file_mode_ns+0x222/0x530 [ 270.860933] internal_create_group+0x3df/0xd80 [ 270.865527] ? remove_files.isra.1+0x190/0x190 [ 270.870097] ? up_write+0x7b/0x220 [ 270.873624] ? down_write_nested+0x130/0x130 [ 270.878017] ? down_read+0x120/0x120 [ 270.881745] sysfs_create_group+0x1f/0x30 [ 270.885896] lo_ioctl+0x166a/0x22a0 [ 270.889534] ? lo_rw_aio+0x1ef0/0x1ef0 [ 270.893441] ? lo_rw_aio+0x1ef0/0x1ef0 [ 270.897342] blkdev_ioctl+0x98e/0x21b0 [ 270.901229] ? blkpg_ioctl+0xc10/0xc10 [ 270.905107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.909866] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 270.914459] ? retint_kernel+0x2d/0x2d [ 270.918367] ? trace_hardirqs_on_caller+0xc0/0x310 [ 270.923285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.928040] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 270.933499] ? retint_kernel+0x1b/0x2d [ 270.937380] ? trace_hardirqs_on+0x310/0x310 [ 270.941814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.946563] ? retint_kernel+0x2d/0x2d [ 270.950450] ? do_vfs_ioctl+0xd1/0x1790 [ 270.954435] block_ioctl+0xee/0x130 [ 270.958047] ? blkdev_fallocate+0x400/0x400 [ 270.962355] do_vfs_ioctl+0x1de/0x1790 [ 270.966237] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.971763] ? ioctl_preallocate+0x300/0x300 [ 270.976161] ? __fget_light+0x2e9/0x430 [ 270.980142] ? fget_raw+0x20/0x20 [ 270.983586] ? rcu_read_lock_sched_held+0x14f/0x180 [ 270.988589] ? kmem_cache_free+0x24f/0x290 [ 270.992815] ? putname+0xf7/0x130 [ 270.996276] ? do_syscall_64+0x9a/0x820 [ 271.000269] ? do_syscall_64+0x9a/0x820 [ 271.004250] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 271.008824] ? security_file_ioctl+0x94/0xc0 [ 271.013232] ksys_ioctl+0xa9/0xd0 [ 271.016715] __x64_sys_ioctl+0x73/0xb0 [ 271.020590] do_syscall_64+0x1b9/0x820 [ 271.024469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.029879] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.034809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.039647] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.044698] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.049703] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.054741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.059589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.064792] RIP: 0033:0x4573d7 [ 271.067970] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.086871] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.094561] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 271.101829] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 271.109094] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.116365] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:25:41 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) 12:25:41 executing program 1: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xbda) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:41 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000040)={0x80000000, 0x2, 'client1\x00', 0xffffffff80000004, "f725cccb420698e7", "c569a7f608f6769b55468539d262a29114b939de30272cf2bdc3afeac0f2d1e3", 0x1e, 0x44d}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 271.123618] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 271.178115] gfs2: not a GFS2 filesystem 12:25:41 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="f364478a6db5a342008a2423a656ea3e118a7ad07ca5f239b15fabfd9d9169fc3925b2c6e4d63264f27fc235f25123cbd26cf9fe5678636bb52d30d63d698992b3959c0c0785089f0e9d90231d6a013ac691a714e9bb86443ade842dae7a3f8fade9e101c3ff4b16456c86f1acb880a1e7954aa9c3d7809e1ba21e92472e4d82f30bea6d4b4cf67f15acb9ec3d7d311e299524345a00f176787a564571c1037c610f96bec6269efdd8cf7d0218b0e22b184da59a01e55c1fcd1b2d20a7a26d11f2e9d4f701c0c6de776d9d", 0xcb}, {&(0x7f0000000240)="d99de29a190b97bd34c61deddb09c0cd17d924131e8b6dd98a1b91b79a0cb8ff58300f61d9eb6c4879b1f0f0de43ed5031ab070676a4ab96ea723af94f5638c750a4470e5e9eedf2e13bb2fc3a19f8fbe58821523f2121a605a21270491cf64447bf7e5b9d28ce7af2c6330a4d48c1c7abca5f3ba4808d18a75ab33fea821cccd666bd62a6aeb6d5c18aa2343f6421771fd33e6ed0045d723f405649970b733f87cd87c49dee", 0xa6}, {&(0x7f0000000300)="81d6a187c085576cdccd74ce378d9aff539ac8d3c42c0e4b9ceccd2428554760b3e2d10ce37a4595493bd053db56fc1cd0ba2dcd046fc69ccd4bd25ed83b3013db6d51bf7a409d32e114c4962d7d08076639241dd05aa0627d1c4903edcec019e23820bb7d245157661a47ababffdebfbf664ca3b1f00e09b9dffcfb6d34370095a92819f4b220dfeee8eb4d31f049aa585d6292ea20f4cf6cb505ab8b0f7210a8aa", 0xa2}], 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x440000, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000003c0)={0x0, 0x0, 0x2080}) close(r1) 12:25:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x245ef207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x7, 0x70, 0xee, 0x100, 0x1ff, 0xbae, 0x0, 0x80000001, 0x1000, 0x4, 0x100000000, 0x6, 0x1ff, 0x1, 0x800, 0x2, 0x3, 0xffffffff, 0xfffffffffffffffa, 0x7, 0x80, 0xb4, 0x3ff, 0x80, 0x6, 0x101, 0x9, 0x260, 0x5, 0x4, 0x4, 0x3, 0x2, 0x55e2, 0x3ff, 0x4, 0x80000000000, 0x8, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0x800}, 0x1020, 0x8001, 0x8f0c, 0x7, 0x7, 0x3f, 0x1}, r1, 0xf, 0xffffffffffffff9c, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f00000004c0)={0x2, 0x9, 0xffffffffffffffff, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) close(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r5, 0x9, 0x3, 0x0, 0x7, 0x40}, 0x14) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000700)={{0x2, 0x4e21, @multicast1}, {0x1, @local}, 0x0, {0x2, 0x4e22, @rand_addr=0x4}, 'team_slave_0\x00'}) r6 = msgget(0x3, 0x400) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000580)=0x0) r8 = getpgid(0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x400, r2, r3, r2, r3, 0x0, 0x1}, 0x2c04f733, 0x3123, 0x44, 0x3, 0x0, 0xfffffffffffffffb, r7, r8}) r9 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x8, 0xc0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r5, 0x20}, 0x8) 12:25:41 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:41 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) 12:25:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x400000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x3) [ 271.412833] FAULT_INJECTION: forcing a failure. [ 271.412833] name failslab, interval 1, probability 0, space 0, times 0 [ 271.451502] CPU: 0 PID: 9466 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 12:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x245ef207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x7, 0x70, 0xee, 0x100, 0x1ff, 0xbae, 0x0, 0x80000001, 0x1000, 0x4, 0x100000000, 0x6, 0x1ff, 0x1, 0x800, 0x2, 0x3, 0xffffffff, 0xfffffffffffffffa, 0x7, 0x80, 0xb4, 0x3ff, 0x80, 0x6, 0x101, 0x9, 0x260, 0x5, 0x4, 0x4, 0x3, 0x2, 0x55e2, 0x3ff, 0x4, 0x80000000000, 0x8, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0x800}, 0x1020, 0x8001, 0x8f0c, 0x7, 0x7, 0x3f, 0x1}, r1, 0xf, 0xffffffffffffff9c, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f00000004c0)={0x2, 0x9, 0xffffffffffffffff, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) close(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r5, 0x9, 0x3, 0x0, 0x7, 0x40}, 0x14) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000700)={{0x2, 0x4e21, @multicast1}, {0x1, @local}, 0x0, {0x2, 0x4e22, @rand_addr=0x4}, 'team_slave_0\x00'}) r6 = msgget(0x3, 0x400) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000580)=0x0) r8 = getpgid(0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x400, r2, r3, r2, r3, 0x0, 0x1}, 0x2c04f733, 0x3123, 0x44, 0x3, 0x0, 0xfffffffffffffffb, r7, r8}) r9 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x8, 0xc0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000200)='bond_slave_1\x00', 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r5, 0x20}, 0x8) 12:25:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x20d, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0xffffffffffffffff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0xc5}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xa0) close(r0) 12:25:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 271.460036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.469405] Call Trace: [ 271.472010] dump_stack+0x244/0x39d [ 271.475658] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.480863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.486417] should_fail.cold.4+0xa/0x17 [ 271.490521] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.495625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.501150] ? wake_up_klogd+0x11a/0x180 [ 271.505224] ? console_device+0xc0/0xc0 [ 271.509201] ? __down_trylock_console_sem+0x151/0x1f0 [ 271.514401] ? graph_lock+0x270/0x270 [ 271.518188] ? vprintk_emit+0x293/0x990 [ 271.522151] ? find_held_lock+0x36/0x1c0 [ 271.526222] ? __lock_is_held+0xb5/0x140 [ 271.530314] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.535757] ? vprintk_default+0x28/0x30 [ 271.539819] __should_failslab+0x124/0x180 [ 271.544052] should_failslab+0x9/0x14 [ 271.547835] kmem_cache_alloc_trace+0x2d7/0x750 [ 271.552513] kobject_uevent_env+0x2f3/0x101e [ 271.556913] kobject_uevent+0x1f/0x24 [ 271.560703] lo_ioctl+0x16f1/0x22a0 [ 271.564324] ? lo_rw_aio+0x1ef0/0x1ef0 [ 271.568211] ? find_held_lock+0x36/0x1c0 [ 271.572265] ? lo_rw_aio+0x1ef0/0x1ef0 [ 271.576151] blkdev_ioctl+0x98e/0x21b0 [ 271.580027] ? blkpg_ioctl+0xc10/0xc10 [ 271.583898] ? lock_downgrade+0x900/0x900 [ 271.588032] ? check_preemption_disabled+0x48/0x280 [ 271.593038] ? kasan_check_read+0x11/0x20 [ 271.597259] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 271.602523] ? rcu_read_unlock_special+0x370/0x370 [ 271.607442] ? __fget+0x4d1/0x740 [ 271.610894] ? ksys_dup3+0x680/0x680 [ 271.614599] block_ioctl+0xee/0x130 [ 271.618208] ? blkdev_fallocate+0x400/0x400 [ 271.622522] do_vfs_ioctl+0x1de/0x1790 [ 271.626412] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.631954] ? ioctl_preallocate+0x300/0x300 [ 271.636356] ? __fget_light+0x2e9/0x430 [ 271.640312] ? fget_raw+0x20/0x20 [ 271.644463] ? rcu_read_lock_sched_held+0x14f/0x180 [ 271.649463] ? kmem_cache_free+0x24f/0x290 [ 271.653689] ? putname+0xf7/0x130 [ 271.657133] ? do_syscall_64+0x9a/0x820 [ 271.661103] ? do_syscall_64+0x9a/0x820 [ 271.665094] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 271.669711] ? security_file_ioctl+0x94/0xc0 [ 271.674203] ksys_ioctl+0xa9/0xd0 [ 271.677680] __x64_sys_ioctl+0x73/0xb0 [ 271.681578] do_syscall_64+0x1b9/0x820 [ 271.685456] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.690805] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.695719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.700600] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.705625] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.710632] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.715637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.720471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.725659] RIP: 0033:0x4573d7 [ 271.728854] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.747753] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.755453] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 12:25:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) [ 271.763784] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 271.771036] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.778287] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 271.785539] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 271.796801] gfs2: not a GFS2 filesystem 12:25:42 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) close(r0) 12:25:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 12:25:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x121000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@local, 0x34, 0x3, 0x1, 0x200000000000002, 0x5, 0x7, 0x9}, 0x20) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={r2, 0x2}) 12:25:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d9, 0x3) [ 272.088388] FAULT_INJECTION: forcing a failure. [ 272.088388] name failslab, interval 1, probability 0, space 0, times 0 12:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 272.137012] CPU: 1 PID: 9500 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 272.145529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.154897] Call Trace: [ 272.157483] dump_stack+0x244/0x39d [ 272.161117] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.166316] ? is_bpf_text_address+0xd3/0x170 [ 272.170843] should_fail.cold.4+0xa/0x17 [ 272.174911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.180025] ? graph_lock+0x270/0x270 [ 272.183820] ? save_stack+0x43/0xd0 [ 272.187433] ? kasan_kmalloc+0xc7/0xe0 [ 272.191336] ? kmem_cache_alloc_trace+0x152/0x750 [ 272.196184] ? kobject_uevent_env+0x2f3/0x101e [ 272.200755] ? kobject_uevent+0x1f/0x24 [ 272.204719] ? lo_ioctl+0x16f1/0x22a0 [ 272.208527] ? find_held_lock+0x36/0x1c0 [ 272.212651] ? __lock_is_held+0xb5/0x140 [ 272.216725] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.222185] __should_failslab+0x124/0x180 [ 272.226411] should_failslab+0x9/0x14 [ 272.230222] __kmalloc+0x2e0/0x760 [ 272.233763] ? kobject_uevent_env+0x2f3/0x101e [ 272.238336] ? rcu_read_lock_sched_held+0x14f/0x180 [ 272.243353] ? kobject_get_path+0xc2/0x1b0 [ 272.247580] ? kmem_cache_alloc_trace+0x353/0x750 [ 272.252413] kobject_get_path+0xc2/0x1b0 [ 272.256465] kobject_uevent_env+0x314/0x101e [ 272.260869] kobject_uevent+0x1f/0x24 [ 272.264674] lo_ioctl+0x16f1/0x22a0 [ 272.268297] ? lo_rw_aio+0x1ef0/0x1ef0 [ 272.272193] ? find_held_lock+0x36/0x1c0 [ 272.276276] ? lo_rw_aio+0x1ef0/0x1ef0 [ 272.280169] blkdev_ioctl+0x98e/0x21b0 [ 272.284044] ? blkpg_ioctl+0xc10/0xc10 [ 272.287915] ? lock_downgrade+0x900/0x900 [ 272.292051] ? check_preemption_disabled+0x48/0x280 [ 272.297055] ? kasan_check_read+0x11/0x20 [ 272.301198] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.306473] ? rcu_read_unlock_special+0x370/0x370 [ 272.311395] ? __fget+0x4d1/0x740 [ 272.314843] ? ksys_dup3+0x680/0x680 [ 272.318562] block_ioctl+0xee/0x130 [ 272.322200] ? blkdev_fallocate+0x400/0x400 [ 272.326533] do_vfs_ioctl+0x1de/0x1790 [ 272.330410] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 272.335934] ? ioctl_preallocate+0x300/0x300 [ 272.340347] ? __fget_light+0x2e9/0x430 [ 272.344329] ? fget_raw+0x20/0x20 [ 272.347777] ? rcu_read_lock_sched_held+0x14f/0x180 [ 272.352798] ? kmem_cache_free+0x24f/0x290 [ 272.357025] ? putname+0xf7/0x130 [ 272.360465] ? do_syscall_64+0x9a/0x820 [ 272.364453] ? do_syscall_64+0x9a/0x820 [ 272.368443] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.373016] ? security_file_ioctl+0x94/0xc0 [ 272.377414] ksys_ioctl+0xa9/0xd0 [ 272.380874] __x64_sys_ioctl+0x73/0xb0 [ 272.384749] do_syscall_64+0x1b9/0x820 [ 272.388627] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.393990] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.398929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.403805] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.408811] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.413825] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.418836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.423669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.428844] RIP: 0033:0x4573d7 [ 272.432023] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.450908] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.458601] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 272.465857] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 272.473111] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.480367] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:25:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x20) close(r1) 12:25:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) [ 272.487622] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 272.549497] gfs2: not a GFS2 filesystem 12:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 12:25:43 executing program 0: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x400, 0x7, 0x2, 0x0, 0x0, 0x80000000, 0x900, 0x9, 0x7fffffff, 0x4, 0x3, 0x18dee10a, 0xab, 0x4d0b, 0x9, 0x101, 0x3, 0x3, 0x3, 0x0, 0x538, 0x80000000, 0x1ff, 0x2, 0x2, 0x7, 0x1, 0x2, 0x0, 0xff, 0x4, 0xdfc, 0x3f, 0x5, 0x9, 0x8, 0x0, 0x3, 0x6, @perf_config_ext={0x22, 0x9}, 0x60, 0x4, 0x2, 0x0, 0xfff, 0x0, 0x6b54657}, 0xffffffffffffff9c, 0x7, 0xffffffffffffffff, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5fbe) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f000059dffc), &(0x7f0000000040)=0xff18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, r3}) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) r6 = fcntl$dupfd(r2, 0x406, r4) getpeername$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x101000, 0x0) close(r2) connect$inet6(r6, &(0x7f0000000300)={0xa, 0x4e23, 0x3ff, @loopback, 0x3}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2c0, 0x0) 12:25:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:43 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x3) 12:25:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) [ 272.771681] FAULT_INJECTION: forcing a failure. [ 272.771681] name failslab, interval 1, probability 0, space 0, times 0 [ 272.792483] CPU: 0 PID: 9536 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 272.801015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.810377] Call Trace: [ 272.812983] dump_stack+0x244/0x39d [ 272.816635] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.821867] should_fail.cold.4+0xa/0x17 [ 272.825954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.831079] ? lock_release+0xa10/0xa10 [ 272.835066] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.840531] ? graph_lock+0x270/0x270 [ 272.844374] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.849407] ? find_held_lock+0x36/0x1c0 [ 272.853484] ? __lock_is_held+0xb5/0x140 [ 272.857566] ? put_dec+0x3b/0xf0 [ 272.860958] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.866449] ? graph_lock+0x270/0x270 12:25:43 executing program 0: r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x180000) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:43 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xb046, 0x2) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0xdf, &(0x7f0000000140)="e23b74bacd1caac12f01d19d7859430694c74c603c988d6f4ad60b8ea2990dab49cd41c487c0a921055b312102f681812c4f578b5e5673e75b8e308ea3a9cd33c5a179bdff13037c73714b68aedab943e3acbe2fdf68556ac4f7c12214863718700eef0bc224d6d3edc47ff91dc29967257fbfd8ccf64a2e3631ca116b2fe6fba8cb8ee18987f3a3e338cebd267dd1c305e8024a61399243e1a8f42228d75aee4ed51bda03829f547e399e8d87752946a8e1157b7de11ae392b5f932aaecb230eb0e0033d0c043bc548e2b6c4fa25f587bf7346a1da5dd7d889ab498546e49"}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x20) close(r1) [ 272.870296] __should_failslab+0x124/0x180 [ 272.874548] should_failslab+0x9/0x14 [ 272.878351] kmem_cache_alloc_node+0x26e/0x730 [ 272.882930] ? find_held_lock+0x36/0x1c0 [ 272.886988] __alloc_skb+0x114/0x770 [ 272.890709] ? netdev_alloc_frag+0x1f0/0x1f0 [ 272.895115] ? kasan_check_read+0x11/0x20 [ 272.899258] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.904523] ? rcu_read_unlock_special+0x370/0x370 [ 272.909445] ? netlink_has_listeners+0x2cb/0x4a0 [ 272.914189] ? netlink_tap_init_net+0x3d0/0x3d0 [ 272.918861] alloc_uevent_skb+0x84/0x1da [ 272.922916] kobject_uevent_env+0xa52/0x101e [ 272.927323] kobject_uevent+0x1f/0x24 [ 272.931144] lo_ioctl+0x16f1/0x22a0 [ 272.934775] ? lo_rw_aio+0x1ef0/0x1ef0 [ 272.938666] ? find_held_lock+0x36/0x1c0 [ 272.942715] ? lo_rw_aio+0x1ef0/0x1ef0 [ 272.946610] blkdev_ioctl+0x98e/0x21b0 [ 272.950485] ? blkpg_ioctl+0xc10/0xc10 [ 272.954372] ? lock_downgrade+0x900/0x900 [ 272.958521] ? check_preemption_disabled+0x48/0x280 [ 272.963532] ? kasan_check_read+0x11/0x20 [ 272.967667] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.972953] ? rcu_read_unlock_special+0x370/0x370 [ 272.977895] ? __fget+0x4d1/0x740 [ 272.981342] ? ksys_dup3+0x680/0x680 [ 272.985064] block_ioctl+0xee/0x130 [ 272.988675] ? blkdev_fallocate+0x400/0x400 [ 272.993019] do_vfs_ioctl+0x1de/0x1790 [ 272.996927] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.002467] ? ioctl_preallocate+0x300/0x300 [ 273.006864] ? __fget_light+0x2e9/0x430 [ 273.010840] ? fget_raw+0x20/0x20 [ 273.014284] ? rcu_read_lock_sched_held+0x14f/0x180 [ 273.019288] ? kmem_cache_free+0x24f/0x290 [ 273.023529] ? putname+0xf7/0x130 [ 273.026987] ? do_syscall_64+0x9a/0x820 [ 273.030965] ? do_syscall_64+0x9a/0x820 [ 273.034953] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 273.039566] ? security_file_ioctl+0x94/0xc0 [ 273.044000] ksys_ioctl+0xa9/0xd0 [ 273.047471] __x64_sys_ioctl+0x73/0xb0 [ 273.051349] do_syscall_64+0x1b9/0x820 [ 273.055245] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.060633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.065550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.070381] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.075385] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.080392] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.085413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.090285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.095490] RIP: 0033:0x4573d7 [ 273.098670] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.117554] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.125247] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 273.132506] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 273.139767] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 273.147047] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 273.154301] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 273.179833] gfs2: not a GFS2 filesystem 12:25:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040)=0x6dd4, 0x4) 12:25:43 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000000)={0x0, 0x100, 0x3ff, 0x800, 0x1, 0x92}) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x101000) sendfile(r0, r0, &(0x7f0000000000), 0x8001) prctl$PR_SET_FPEXC(0xc, 0x2) close(r0) 12:25:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cd, 0x3) [ 273.431497] FAULT_INJECTION: forcing a failure. [ 273.431497] name failslab, interval 1, probability 0, space 0, times 0 12:25:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x4a0002) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4c8, 0x4000) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000000c0)) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000040)) sendto$inet(r0, &(0x7f0000000140)="4e0743fac75bcee1dca5a9d7f771cc38c0db00dc027ab5aa29a9b3996ed3d43567e0daa8d91dd4ef4e68386b87fd112654bd7ef5cd706c93a88d2e654b98e75a1afc959978043184d2cdda29067c475895cf0c869d2d107d0dbe25d30d31ac465a76ec24636bc38bff024de0a507790da7762f93bf3de2fa296b0a13574b8577f29ec70d55cf6b6f998cb7a85cb083e9398816d4ea080abfe6b45248b87428dec178bea9adc92fae0a509e28ef8a49bfc2f9e355ce185e8b5b5609d28426f31de02c73d97205c719dc653281979b7521181052ed05a1b99d24ecd2d2bf8c650b0e508474a94bc79c", 0xe8, 0x800, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) 12:25:44 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x4c0, 0x160, 0x160, 0x0, 0x0, 0x0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0xf0, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x800, 0x9512, 0xf8, 0x0, 0x0, "33b82f214b5368ea40831827a6b725f2cb47b1e2ff7af4d2978b11ae599a6a8c86e66859d21901a89c35b3ac3d5945cc4eb773ac4ccd8edb4d5307ac5b6d0c66"}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x16}, @loopback, [0xffffff00, 0x0, 0xff, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffffff, 0xff], 'bond_slave_0\x00', 'sit0\x00', {0xff}, {0xff}, 0xf7, 0x7, 0x4, 0x4}, 0x0, 0x228, 0x290, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x100000001, 0xca, 0x8, 0x8, 0x1, 0x0, [@mcast1, @empty, @mcast2, @remote, @mcast2, @local, @loopback, @loopback, @empty, @mcast1, @remote, @local, @mcast2, @ipv4={[], [], @rand_addr=0x8}, @mcast1, @remote], 0xd}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x7, 0x9, 0x10000, 'pptp\x00', 'syz0\x00', 0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$VT_RELDISP(r0, 0x5605) close(r1) [ 273.481345] CPU: 0 PID: 9570 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 273.489904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.499275] Call Trace: [ 273.501885] dump_stack+0x244/0x39d [ 273.505519] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.510721] should_fail.cold.4+0xa/0x17 [ 273.514771] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.519872] ? lock_release+0xa10/0xa10 [ 273.523846] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.529281] ? graph_lock+0x270/0x270 [ 273.533069] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.538100] ? find_held_lock+0x36/0x1c0 [ 273.542149] ? __lock_is_held+0xb5/0x140 [ 273.546205] ? put_dec+0x3b/0xf0 [ 273.549593] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.555031] ? graph_lock+0x270/0x270 [ 273.558835] __should_failslab+0x124/0x180 [ 273.563095] should_failslab+0x9/0x14 [ 273.566885] kmem_cache_alloc_node+0x26e/0x730 [ 273.571453] ? find_held_lock+0x36/0x1c0 [ 273.575508] __alloc_skb+0x114/0x770 [ 273.579225] ? netdev_alloc_frag+0x1f0/0x1f0 [ 273.583628] ? kasan_check_read+0x11/0x20 [ 273.587773] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.593035] ? rcu_read_unlock_special+0x370/0x370 [ 273.597954] ? netlink_has_listeners+0x2cb/0x4a0 [ 273.602693] ? netlink_tap_init_net+0x3d0/0x3d0 [ 273.607365] alloc_uevent_skb+0x84/0x1da [ 273.611444] kobject_uevent_env+0xa52/0x101e [ 273.615862] kobject_uevent+0x1f/0x24 [ 273.619657] lo_ioctl+0x16f1/0x22a0 [ 273.623281] ? lo_rw_aio+0x1ef0/0x1ef0 [ 273.627188] ? find_held_lock+0x36/0x1c0 [ 273.631251] ? lo_rw_aio+0x1ef0/0x1ef0 [ 273.635129] blkdev_ioctl+0x98e/0x21b0 [ 273.639021] ? blkpg_ioctl+0xc10/0xc10 [ 273.642908] ? lock_downgrade+0x900/0x900 [ 273.647045] ? check_preemption_disabled+0x48/0x280 [ 273.652052] ? kasan_check_read+0x11/0x20 [ 273.656187] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.661469] ? rcu_read_unlock_special+0x370/0x370 [ 273.666395] ? __fget+0x4d1/0x740 [ 273.669840] ? ksys_dup3+0x680/0x680 [ 273.673551] block_ioctl+0xee/0x130 [ 273.677164] ? blkdev_fallocate+0x400/0x400 [ 273.681615] do_vfs_ioctl+0x1de/0x1790 [ 273.685510] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.694976] ? ioctl_preallocate+0x300/0x300 [ 273.699373] ? __fget_light+0x2e9/0x430 [ 273.703356] ? fget_raw+0x20/0x20 [ 273.706822] ? rcu_read_lock_sched_held+0x14f/0x180 [ 273.711835] ? kmem_cache_free+0x24f/0x290 [ 273.716082] ? putname+0xf7/0x130 [ 273.719553] ? do_syscall_64+0x9a/0x820 [ 273.723525] ? do_syscall_64+0x9a/0x820 [ 273.727491] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 273.732067] ? security_file_ioctl+0x94/0xc0 [ 273.736466] ksys_ioctl+0xa9/0xd0 [ 273.739910] __x64_sys_ioctl+0x73/0xb0 [ 273.743784] do_syscall_64+0x1b9/0x820 [ 273.747694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.753059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.757984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.762844] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.767863] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.772867] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.777872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.782724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.787927] RIP: 0033:0x4573d7 [ 273.791107] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.809998] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.817734] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 273.825018] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:25:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040)=0x6dd4, 0x4) [ 273.832274] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 273.839544] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 273.846816] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 273.858151] gfs2: not a GFS2 filesystem [ 274.002054] Unknown ioctl 22021 12:25:44 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 274.039956] Unknown ioctl 22021 12:25:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:44 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) 12:25:44 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc) r4 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x5aa, 0xf4b, 0x1}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000002c0)={r5, 0x53}, &(0x7f0000000300)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x29b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r6) 12:25:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0189436, 0x3) [ 274.134312] FAULT_INJECTION: forcing a failure. [ 274.134312] name failslab, interval 1, probability 0, space 0, times 0 [ 274.153691] CPU: 0 PID: 9603 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 274.162252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.171609] Call Trace: [ 274.174213] dump_stack+0x244/0x39d [ 274.177876] ? dump_stack_print_info.cold.1+0x20/0x20 12:25:44 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) [ 274.183095] should_fail.cold.4+0xa/0x17 [ 274.187175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.192301] ? __save_stack_trace+0x8d/0xf0 [ 274.196649] ? graph_lock+0x270/0x270 [ 274.200514] ? save_stack+0xa9/0xd0 [ 274.204155] ? save_stack+0x43/0xd0 [ 274.207782] ? find_held_lock+0x36/0x1c0 [ 274.211849] ? __lock_is_held+0xb5/0x140 [ 274.215916] ? graph_lock+0x270/0x270 [ 274.219707] ? perf_trace_sched_process_exec+0x860/0x860 [ 274.225153] ? check_preemption_disabled+0x48/0x280 [ 274.230172] __should_failslab+0x124/0x180 [ 274.234424] should_failslab+0x9/0x14 [ 274.238234] kmem_cache_alloc_node_trace+0x270/0x740 [ 274.243354] __kmalloc_node_track_caller+0x3c/0x70 [ 274.248290] __kmalloc_reserve.isra.38+0x41/0xe0 [ 274.253139] __alloc_skb+0x150/0x770 [ 274.256866] ? netdev_alloc_frag+0x1f0/0x1f0 [ 274.261305] ? kasan_check_read+0x11/0x20 [ 274.265459] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 274.270737] ? rcu_read_unlock_special+0x370/0x370 [ 274.275690] ? netlink_has_listeners+0x2cb/0x4a0 [ 274.280432] ? netlink_tap_init_net+0x3d0/0x3d0 [ 274.285134] alloc_uevent_skb+0x84/0x1da [ 274.289234] kobject_uevent_env+0xa52/0x101e [ 274.293668] kobject_uevent+0x1f/0x24 [ 274.297457] lo_ioctl+0x16f1/0x22a0 [ 274.301077] ? lo_rw_aio+0x1ef0/0x1ef0 [ 274.304953] ? find_held_lock+0x36/0x1c0 [ 274.309000] ? lo_rw_aio+0x1ef0/0x1ef0 [ 274.312884] blkdev_ioctl+0x98e/0x21b0 [ 274.316772] ? blkpg_ioctl+0xc10/0xc10 [ 274.320645] ? lock_downgrade+0x900/0x900 [ 274.324781] ? check_preemption_disabled+0x48/0x280 [ 274.329788] ? kasan_check_read+0x11/0x20 [ 274.333939] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 274.339203] ? rcu_read_unlock_special+0x370/0x370 [ 274.344141] ? __fget+0x4d1/0x740 [ 274.347603] ? ksys_dup3+0x680/0x680 [ 274.351310] block_ioctl+0xee/0x130 [ 274.354927] ? blkdev_fallocate+0x400/0x400 [ 274.359244] do_vfs_ioctl+0x1de/0x1790 [ 274.363131] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 274.368669] ? ioctl_preallocate+0x300/0x300 [ 274.373063] ? __fget_light+0x2e9/0x430 [ 274.377036] ? fget_raw+0x20/0x20 [ 274.380496] ? rcu_read_lock_sched_held+0x14f/0x180 [ 274.385543] ? kmem_cache_free+0x24f/0x290 [ 274.389779] ? putname+0xf7/0x130 [ 274.393254] ? do_syscall_64+0x9a/0x820 [ 274.397222] ? do_syscall_64+0x9a/0x820 [ 274.401201] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 274.405778] ? security_file_ioctl+0x94/0xc0 [ 274.410172] ksys_ioctl+0xa9/0xd0 [ 274.413629] __x64_sys_ioctl+0x73/0xb0 [ 274.417521] do_syscall_64+0x1b9/0x820 [ 274.421411] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.426768] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.431696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.436530] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.441534] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.446549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 274.451558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.456407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.461596] RIP: 0033:0x4573d7 [ 274.464776] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.483662] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.491355] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 274.498618] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.505873] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.513137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.520392] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 274.577691] gfs2: not a GFS2 filesystem 12:25:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) 12:25:45 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xed, 0x1, 0x3, "b72df2ef8e7a9e388dd515fd09293f60", "6d10c2131c49a2bb742e78bf661b78d6a78ccf21f6d822450228ca1f9cf7c97f7767bd70a91f29ad7ac853cee4df97370de92ef6d93abe5fd72cb3e411e41795b8f5e4bf8901888fec388f21fd46ac7a7e7f37aa91fd1629b87f7fe42cfc2049b26759f5d5dffdda66d19c40f34cc74d7664b6b112e480cdeb726001b2c1cb89ed779f493793b1cf08cb173618f99050ebe00cf0339d8c97e4ed99f83b0194eb9b265e6a0f944533512ec9557e073e9e87d9beeb8f6c2a079e24dd944f6d288f6e02119ef0c8f1a4f0e93221d87d59c26d43ba4b88fd62c7"}, 0xed, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x1, 0x7, 0x3ea5, 0x80, 0x7a}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x100, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0xa080, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000240)=0x3f) 12:25:45 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:45 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000"}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) close(r0) r1 = memfd_create(&(0x7f0000000040)='/dev/snd/seq\x00', 0x1) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000080)=0x200, 0x4) ioctl$TIOCCBRK(r1, 0x5428) recvfrom$packet(r1, &(0x7f0000000100)=""/88, 0x58, 0x20, 0x0, 0x0) 12:25:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000"}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) 12:25:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5460, 0x3) 12:25:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) dup(r1) close(r1) r2 = dup3(r0, r1, 0x80000) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000000)={0x1, 0x401, 0x0, 0x7, 0x10, 0x3}) [ 274.898266] FAULT_INJECTION: forcing a failure. [ 274.898266] name failslab, interval 1, probability 0, space 0, times 0 [ 275.006799] CPU: 1 PID: 9645 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 275.015328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.024687] Call Trace: [ 275.027284] dump_stack+0x244/0x39d [ 275.030946] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.036165] ? lo_rw_aio+0x1ef0/0x1ef0 [ 275.040090] should_fail.cold.4+0xa/0x17 [ 275.044199] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.049316] ? blkpg_ioctl+0xc10/0xc10 [ 275.053208] ? lock_downgrade+0x900/0x900 [ 275.053265] ? check_preemption_disabled+0x48/0x280 [ 275.053290] ? kasan_check_read+0x11/0x20 [ 275.053310] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.062469] ? rcu_read_unlock_special+0x370/0x370 [ 275.062496] ? find_held_lock+0x36/0x1c0 [ 275.062535] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.062554] ? block_ioctl+0xee/0x130 [ 275.090161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.095723] __should_failslab+0x124/0x180 [ 275.099974] should_failslab+0x9/0x14 [ 275.103786] kmem_cache_alloc+0x2be/0x730 [ 275.107951] ? fget_raw+0x20/0x20 [ 275.111419] getname_flags+0xd0/0x590 [ 275.115310] do_mkdirat+0xc5/0x310 [ 275.118865] ? __ia32_sys_mknod+0xb0/0xb0 [ 275.123030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.128408] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.133547] ? ksys_ioctl+0x81/0xd0 [ 275.137186] __x64_sys_mkdir+0x5c/0x80 [ 275.141099] do_syscall_64+0x1b9/0x820 [ 275.144996] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.150373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.155316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.160173] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.165205] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.170257] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.175292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.180172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.185372] RIP: 0033:0x456987 [ 275.188578] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:25:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x1, 0x3326c0}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x2, 0x2}, &(0x7f0000000140)=0x8) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:45 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x402000, 0x0) ioctl$TIOCCONS(r0, 0x541d) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xffffffffffffffe1, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r2, 0xa77, 0x4}, 0x8) close(r1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x7f, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e20, 0x1, 'wrr\x00', 0x13, 0x2, 0x6c}, 0x2c) 12:25:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x6001) close(r0) 12:25:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dev/snd/seq\x00', 0x6) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xffffffffffff0d37}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x3}, &(0x7f0000000140)=0x8) close(r0) [ 275.207487] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 275.215205] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 275.222491] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 275.229783] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.237065] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.237075] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:45 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000"}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x3) 12:25:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x8f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x1d05}, 0x8) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) inotify_init() 12:25:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x8924, 0x3) [ 275.447744] FAULT_INJECTION: forcing a failure. [ 275.447744] name failslab, interval 1, probability 0, space 0, times 0 [ 275.533106] CPU: 1 PID: 9694 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 275.541654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.551041] Call Trace: [ 275.553649] dump_stack+0x244/0x39d [ 275.557310] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.562515] ? print_usage_bug+0xc0/0xc0 [ 275.566613] should_fail.cold.4+0xa/0x17 [ 275.570705] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.575835] ? mark_held_locks+0x130/0x130 [ 275.580101] ? graph_lock+0x270/0x270 [ 275.584078] ? print_usage_bug+0xc0/0xc0 [ 275.588177] ? lock_unpin_lock+0x4a0/0x4a0 [ 275.592442] ? __lock_is_held+0xb5/0x140 [ 275.596521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.602091] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.602118] ? __lock_is_held+0xb5/0x140 [ 275.602138] __should_failslab+0x124/0x180 [ 275.611655] should_failslab+0x9/0x14 [ 275.611671] kmem_cache_alloc+0x2be/0x730 [ 275.611686] ? __find_get_block+0x3b9/0xf10 [ 275.611822] ? ratelimit_state_init+0xb0/0xb0 [ 275.623883] ext4_alloc_inode+0xc7/0x880 [ 275.632690] ? ratelimit_state_init+0xb0/0xb0 [ 275.632715] ? __lock_acquire+0x62f/0x4c20 [ 275.632746] ? mark_held_locks+0x130/0x130 [ 275.641296] ? graph_lock+0x270/0x270 [ 275.641371] ? ext4_es_lookup_extent+0x48f/0xdd0 [ 275.641394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.649844] ? ratelimit_state_init+0xb0/0xb0 [ 275.649859] alloc_inode+0x63/0x190 [ 275.649874] new_inode_pseudo+0x71/0x1a0 [ 275.649889] ? prune_icache_sb+0x1c0/0x1c0 [ 275.649910] new_inode+0x1c/0x40 [ 275.658474] __ext4_new_inode+0x4c8/0x65a0 [ 275.668494] ? ext4_free_inode+0x1a10/0x1a10 [ 275.676169] ? find_held_lock+0x36/0x1c0 [ 275.683764] ? is_bpf_text_address+0xac/0x170 [ 275.692408] ? lock_downgrade+0x900/0x900 [ 275.692425] ? check_preemption_disabled+0x48/0x280 [ 275.692448] ? kasan_check_read+0x11/0x20 [ 275.692467] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.701013] ? rcu_read_unlock_special+0x370/0x370 [ 275.710166] ? rcu_softirq_qs+0x20/0x20 [ 275.710180] ? unwind_dump+0x190/0x190 [ 275.710210] ? is_bpf_text_address+0xd3/0x170 [ 275.719624] ? kernel_text_address+0x79/0xf0 [ 275.719643] ? __kernel_text_address+0xd/0x40 [ 275.719659] ? unwind_get_return_address+0x61/0xa0 [ 275.719678] ? __save_stack_trace+0x8d/0xf0 [ 275.719707] ? save_stack+0xa9/0xd0 [ 275.728588] ? save_stack+0x43/0xd0 [ 275.728604] ? __kasan_slab_free+0x102/0x150 [ 275.728623] ? kasan_slab_free+0xe/0x10 [ 275.770660] ? kmem_cache_free+0x83/0x290 [ 275.774813] ? print_usage_bug+0xc0/0xc0 [ 275.778867] ? __x64_sys_mkdir+0x5c/0x80 [ 275.782930] ? do_syscall_64+0x1b9/0x820 [ 275.786983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.792350] ? trace_hardirqs_off+0xb8/0x310 [ 275.796764] ? kasan_check_read+0x11/0x20 [ 275.800901] ? do_raw_spin_unlock+0xa7/0x330 [ 275.805298] ? trace_hardirqs_on+0x310/0x310 [ 275.809699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.815335] ? __dquot_initialize+0x629/0xdd0 [ 275.819835] ? dquot_get_next_dqblk+0x180/0x180 [ 275.824494] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 275.829412] ? common_perm+0x1f6/0x7b0 [ 275.833382] ext4_mkdir+0x2e1/0xe60 [ 275.837030] ? ext4_init_dot_dotdot+0x510/0x510 [ 275.841694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.847238] ? security_inode_permission+0xd2/0x100 [ 275.852250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.857773] ? security_inode_mkdir+0xe8/0x120 [ 275.862349] vfs_mkdir+0x42e/0x6b0 [ 275.865875] do_mkdirat+0x27a/0x310 [ 275.869492] ? __ia32_sys_mknod+0xb0/0xb0 [ 275.873633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.878985] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.884074] ? ksys_ioctl+0x81/0xd0 [ 275.887691] __x64_sys_mkdir+0x5c/0x80 [ 275.891568] do_syscall_64+0x1b9/0x820 [ 275.895457] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.900807] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.905734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.910580] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.915620] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.920641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.925692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.930550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.935730] RIP: 0033:0x456987 [ 275.938923] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.957805] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 275.965496] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 275.972761] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 12:25:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0189436, 0x0) 12:25:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) 12:25:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2004) close(r0) 12:25:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e22, 0x2, @ipv4={[], [], @remote}, 0x1}}, 0x6872, 0x6}, &(0x7f0000000200)=0x90) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 275.980013] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.987269] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.994566] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:46 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x82000, 0x0) socket$packet(0x11, 0x0, 0x300) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000200)={0x3, 0x4}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r2, 0x30, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) close(r0) 12:25:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000140)={0xa, @vbi={0x2, 0x10000, 0x7fffffff, 0x64737664, [0x1f, 0x1], [0x9, 0xab50], 0x13a}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) getgroups(0x3, &(0x7f00000004c0)=[0x0, 0xffffffffffffffff, 0xee01]) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x5}, [{0x2, 0x6, r2}, {0x2, 0x300e87f32f835583, r3}, {0x2, 0x0, r4}], {0x4, 0x4}, [{0x8, 0x4, r5}, {0x8, 0x0, r6}, {0x8, 0x2, r7}], {0x10, 0x6}, {0x20, 0x1}}, 0x54, 0x2) close(r0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x8000) 12:25:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) [ 276.147898] FAULT_INJECTION: forcing a failure. [ 276.147898] name failslab, interval 1, probability 0, space 0, times 0 [ 276.159609] CPU: 1 PID: 9723 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 276.168124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.177512] Call Trace: [ 276.180137] dump_stack+0x244/0x39d [ 276.183801] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.189042] should_fail.cold.4+0xa/0x17 [ 276.189100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.198269] ? mark_held_locks+0x130/0x130 [ 276.198308] ? find_held_lock+0x36/0x1c0 [ 276.198335] ? is_bpf_text_address+0xac/0x170 [ 276.198356] ? lock_downgrade+0x900/0x900 [ 276.206642] ? check_preemption_disabled+0x48/0x280 [ 276.206665] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.206681] ? rcu_read_unlock_special+0x370/0x370 [ 276.206694] ? rcu_softirq_qs+0x20/0x20 [ 276.206711] ? unwind_dump+0x190/0x190 [ 276.215347] ? graph_lock+0x270/0x270 [ 276.215370] __should_failslab+0x124/0x180 [ 276.215390] should_failslab+0x9/0x14 [ 276.215411] kmem_cache_alloc+0x47/0x730 [ 276.225687] ? __es_tree_search.isra.12+0x1ba/0x220 [ 276.225719] ? find_held_lock+0x36/0x1c0 [ 276.225739] __es_insert_extent+0x30c/0x1120 [ 276.225767] ? ext4_es_free_extent+0x790/0x790 [ 276.234668] ? kasan_check_write+0x14/0x20 [ 276.234684] ? do_raw_write_lock+0x14f/0x310 [ 276.234700] ? do_raw_read_unlock+0x70/0x70 [ 276.234714] ? __lock_is_held+0xb5/0x140 [ 276.234749] ext4_es_insert_extent+0x352/0xbd0 [ 276.242432] ? ext4_es_scan_clu+0x50/0x50 [ 276.242456] ? __lock_is_held+0xb5/0x140 [ 276.242486] ? rcu_read_lock_sched_held+0x14f/0x180 [ 276.242509] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 276.242530] ? ext4_rereserve_cluster+0x240/0x240 [ 276.250555] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.250585] ext4_ext_map_blocks+0x1d92/0x48e0 [ 276.250604] ? kasan_check_write+0x14/0x20 [ 276.259720] ? ext4_ext_release+0x10/0x10 [ 276.259742] ? graph_lock+0x270/0x270 [ 276.259759] ? graph_lock+0x270/0x270 12:25:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000140)=""/206, 0xce, 0x20, &(0x7f00000002c0)={0x11, 0xff, r2, 0x1, 0x4, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) close(r0) [ 276.259775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.259791] ? check_preemption_disabled+0x48/0x280 [ 276.259829] ? lock_acquire+0x1ed/0x520 [ 276.268294] ? ext4_map_blocks+0x487/0x1b50 [ 276.268316] ? lock_release+0xa10/0xa10 [ 276.268331] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.268347] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 276.268364] ? kasan_check_read+0x11/0x20 [ 276.268377] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.268410] ? down_read+0x8d/0x120 [ 276.277195] ? ext4_map_blocks+0x487/0x1b50 [ 276.277213] ? __down_interruptible+0x700/0x700 [ 276.277244] ? kernel_text_address+0x79/0xf0 [ 276.277264] ext4_map_blocks+0xe2d/0x1b50 [ 276.277281] ? __save_stack_trace+0x8d/0xf0 [ 276.277303] ? ext4_issue_zeroout+0x190/0x190 [ 276.286056] ? save_stack+0x43/0xd0 [ 276.286072] ? __kasan_slab_free+0x102/0x150 [ 276.286085] ? kasan_slab_free+0xe/0x10 [ 276.286099] ? kmem_cache_free+0x83/0x290 [ 276.286118] ext4_getblk+0x10e/0x630 [ 276.286136] ? ext4_iomap_begin+0x1390/0x1390 [ 276.306156] Unknown ioctl 1074291732 [ 276.307970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.307987] ? __dquot_initialize+0x629/0xdd0 [ 276.308006] ext4_bread+0x95/0x2b0 [ 276.308022] ? ext4_getblk+0x630/0x630 [ 276.308035] ? dquot_get_next_dqblk+0x180/0x180 [ 276.308052] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 276.308068] ? common_perm+0x1f6/0x7b0 [ 276.308089] ext4_append+0x14e/0x370 [ 276.325638] Unknown ioctl 1074291732 [ 276.327966] ext4_mkdir+0x532/0xe60 [ 276.328009] ? ext4_init_dot_dotdot+0x510/0x510 [ 276.328031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:25:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) [ 276.328049] ? security_inode_permission+0xd2/0x100 [ 276.328066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.328084] ? security_inode_mkdir+0xe8/0x120 [ 276.354571] vfs_mkdir+0x42e/0x6b0 [ 276.354593] do_mkdirat+0x27a/0x310 [ 276.366864] ? __ia32_sys_mknod+0xb0/0xb0 [ 276.366883] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.366901] ? trace_hardirqs_off_caller+0x300/0x300 [ 276.366919] ? ksys_ioctl+0x81/0xd0 [ 276.390102] __x64_sys_mkdir+0x5c/0x80 [ 276.390138] do_syscall_64+0x1b9/0x820 [ 276.390158] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.390177] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.390192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.390226] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.412058] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.412077] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.412100] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.412159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.441045] RIP: 0033:0x456987 [ 276.441063] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.441072] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 276.441088] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 276.441097] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 276.441107] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.441130] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:25:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454df, 0x3) [ 276.441139] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 276.511887] gfs2: not a GFS2 filesystem 12:25:47 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x4, 0x140) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x400, 0xa, [0xd7, 0x0, 0x2, 0x8, 0x8, 0x4, 0x4, 0x1, 0x4, 0x8001]}, &(0x7f0000000280)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={r1, 0x80000001}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2032b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000300)) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xde, 0x400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x5, 0x4, 0x4, 0xffffffffffffffff, 0x1, 0x8, 0x1, {0x0, @in={{0x2, 0x4e22, @empty}}, 0x6, 0x2, 0x1, 0x9, 0x200}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r4, 0x8, 0x2}, &(0x7f00000001c0)=0x8) close(r2) 12:25:47 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d4, 0x0) 12:25:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x401054d5, 0x3) [ 276.856540] FAULT_INJECTION: forcing a failure. [ 276.856540] name failslab, interval 1, probability 0, space 0, times 0 [ 276.868049] CPU: 0 PID: 9763 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 276.876553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.885917] Call Trace: [ 276.888529] dump_stack+0x244/0x39d [ 276.892239] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.897459] should_fail.cold.4+0xa/0x17 [ 276.901548] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:25:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 276.906679] ? mark_held_locks+0x130/0x130 [ 276.910934] ? find_held_lock+0x36/0x1c0 [ 276.915021] ? is_bpf_text_address+0xac/0x170 [ 276.919535] ? lock_downgrade+0x900/0x900 [ 276.923700] ? check_preemption_disabled+0x48/0x280 [ 276.928741] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.934031] ? rcu_read_unlock_special+0x370/0x370 [ 276.938983] ? rcu_softirq_qs+0x20/0x20 [ 276.942965] ? unwind_dump+0x190/0x190 [ 276.946887] ? graph_lock+0x270/0x270 [ 276.950715] __should_failslab+0x124/0x180 12:25:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) [ 276.954968] should_failslab+0x9/0x14 [ 276.958800] kmem_cache_alloc+0x47/0x730 [ 276.962878] ? __es_tree_search.isra.12+0x1ba/0x220 [ 276.967929] ? find_held_lock+0x36/0x1c0 [ 276.972022] __es_insert_extent+0x30c/0x1120 [ 276.976472] ? ext4_es_free_extent+0x790/0x790 [ 276.981075] ? kasan_check_write+0x14/0x20 [ 276.985315] ? do_raw_write_lock+0x14f/0x310 [ 276.989737] ? do_raw_read_unlock+0x70/0x70 [ 276.994069] ? __lock_is_held+0xb5/0x140 [ 276.998165] ext4_es_insert_extent+0x352/0xbd0 [ 277.002766] ? ext4_es_scan_clu+0x50/0x50 [ 277.006932] ? __lock_is_held+0xb5/0x140 [ 277.011033] ? rcu_read_lock_sched_held+0x14f/0x180 [ 277.016065] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 277.016084] ? ext4_rereserve_cluster+0x240/0x240 [ 277.016103] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 277.016127] ext4_ext_map_blocks+0x1d92/0x48e0 [ 277.031421] ? kasan_check_write+0x14/0x20 [ 277.031448] ? ext4_ext_release+0x10/0x10 [ 277.031468] ? graph_lock+0x270/0x270 [ 277.031500] ? graph_lock+0x270/0x270 12:25:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 277.031548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.031564] ? check_preemption_disabled+0x48/0x280 [ 277.031596] ? lock_acquire+0x1ed/0x520 [ 277.031610] ? ext4_map_blocks+0x487/0x1b50 [ 277.031631] ? lock_release+0xa10/0xa10 [ 277.031645] ? perf_trace_sched_process_exec+0x860/0x860 [ 277.031661] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 277.031677] ? kasan_check_read+0x11/0x20 [ 277.031691] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 277.031717] ? down_read+0x8d/0x120 [ 277.080500] ? ext4_map_blocks+0x487/0x1b50 [ 277.080533] ? __down_interruptible+0x700/0x700 [ 277.080567] ? kernel_text_address+0x79/0xf0 [ 277.080586] ext4_map_blocks+0xe2d/0x1b50 [ 277.080602] ? __save_stack_trace+0x8d/0xf0 [ 277.080623] ? ext4_issue_zeroout+0x190/0x190 [ 277.080642] ? save_stack+0x43/0xd0 [ 277.089434] ? __kasan_slab_free+0x102/0x150 [ 277.089446] ? kasan_slab_free+0xe/0x10 [ 277.089459] ? kmem_cache_free+0x83/0x290 [ 277.089477] ext4_getblk+0x10e/0x630 [ 277.089510] ? ext4_iomap_begin+0x1390/0x1390 [ 277.089543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:25:47 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 277.089559] ? __dquot_initialize+0x629/0xdd0 [ 277.089577] ext4_bread+0x95/0x2b0 [ 277.089593] ? ext4_getblk+0x630/0x630 [ 277.089606] ? dquot_get_next_dqblk+0x180/0x180 [ 277.089622] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 277.089638] ? common_perm+0x1f6/0x7b0 [ 277.089659] ext4_append+0x14e/0x370 [ 277.183944] ext4_mkdir+0x532/0xe60 [ 277.187594] ? ext4_init_dot_dotdot+0x510/0x510 [ 277.192299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.197851] ? security_inode_permission+0xd2/0x100 12:25:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000021c0)={0x0, 0xd6, "8ac0ba0326804d56202beb7df2f9c6f72ace87e9e693748b7ac0cc66b0f62df5a992dd412afb51d050d0dda70e30b8f496b0bf99542a6fe12d5c3d96dfd703255dbd2c5c2ddb4a8cc22a5361296e46aa9dbde2c9419dc8a3388d89226d3175602864fbb32587a738b519eb972e1340e838711db47235e18bc7849a37df940f6f4e5b5102641ffc681da92e4a4ac959e5987c95a36085bf7250de9cd74ebb5f035e5d1e345dc39aa0803459cc5b7f15767d2600545630c22e8efb30a30eb0ce2c501facadd6eb2c862b9de2b768d1a7fec3efe30de813"}, &(0x7f00000022c0)=0xde) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000002300)={r2, 0xfffffffffffffffd}, &(0x7f0000002340)=0xc) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200081, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000140)={0x0, 0x0, 0x2080}) [ 277.197872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.197889] ? security_inode_mkdir+0xe8/0x120 [ 277.197913] vfs_mkdir+0x42e/0x6b0 [ 277.197932] do_mkdirat+0x27a/0x310 [ 277.197951] ? __ia32_sys_mknod+0xb0/0xb0 [ 277.216601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.216622] ? trace_hardirqs_off_caller+0x300/0x300 [ 277.216638] ? ksys_ioctl+0x81/0xd0 [ 277.216659] __x64_sys_mkdir+0x5c/0x80 [ 277.216678] do_syscall_64+0x1b9/0x820 [ 277.216700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.251668] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.251685] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.251704] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.251723] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.251742] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.251780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.251819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.251832] RIP: 0033:0x456987 12:25:47 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0xe8, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x6, @local}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @local, 0xffffffffffffffff}, @in6={0xa, 0x4e22, 0x2, @remote, 0x49}, @in6={0xa, 0x4e23, 0x7fffffff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x3}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x4, @remote, 0x1}, @in6={0xa, 0x4e21, 0x501, @remote, 0x1}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={r1, 0x100000000, 0x2, [0x401, 0xfffffffffffffffd]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r2, 0xbba}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r3) [ 277.251849] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.251863] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 277.271722] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 277.271732] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 277.271741] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 277.271750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 277.271760] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7fff) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x801054db, 0x3) 12:25:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x0) [ 277.431300] gfs2: not a GFS2 filesystem 12:25:48 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x10000) close(r0) 12:25:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3f, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x101, 0x1, [0xb]}, &(0x7f0000000040)=0xa) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfd9]}, &(0x7f00000000c0)=0xa) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x300008, &(0x7f0000000580)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@subj_type={'subj_type', 0x3d, 'bdev'}}, {@uid_lt={'uid<', r5}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r6}}, {@hash='hash'}, {@measure='measure'}]}}) 12:25:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d3, 0x0) 12:25:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000021c0)={0x0, 0xd6, "8ac0ba0326804d56202beb7df2f9c6f72ace87e9e693748b7ac0cc66b0f62df5a992dd412afb51d050d0dda70e30b8f496b0bf99542a6fe12d5c3d96dfd703255dbd2c5c2ddb4a8cc22a5361296e46aa9dbde2c9419dc8a3388d89226d3175602864fbb32587a738b519eb972e1340e838711db47235e18bc7849a37df940f6f4e5b5102641ffc681da92e4a4ac959e5987c95a36085bf7250de9cd74ebb5f035e5d1e345dc39aa0803459cc5b7f15767d2600545630c22e8efb30a30eb0ce2c501facadd6eb2c862b9de2b768d1a7fec3efe30de813"}, &(0x7f00000022c0)=0xde) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000002300)={r2, 0xfffffffffffffffd}, &(0x7f0000002340)=0xc) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200081, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000140)={0x0, 0x0, 0x2080}) 12:25:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:48 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 277.696165] FAULT_INJECTION: forcing a failure. [ 277.696165] name failslab, interval 1, probability 0, space 0, times 0 12:25:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc020660b, 0x3) 12:25:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1ca, 0x240000) pkey_alloc(0x0, 0x3) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x20) [ 277.814087] CPU: 1 PID: 9822 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 277.822641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.832002] Call Trace: [ 277.832083] dump_stack+0x244/0x39d [ 277.832111] ? dump_stack_print_info.cold.1+0x20/0x20 [ 277.838327] should_fail.cold.4+0xa/0x17 [ 277.838348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.838367] ? kernel_text_address+0x79/0xf0 [ 277.838386] ? __kernel_text_address+0xd/0x40 [ 277.847642] ? __save_stack_trace+0x8d/0xf0 [ 277.847663] ? graph_lock+0x270/0x270 [ 277.847691] ? save_stack+0xa9/0xd0 [ 277.847712] ? __lock_is_held+0xb5/0x140 [ 277.857212] ? print_usage_bug+0xc0/0xc0 [ 277.857249] ? trace_hardirqs_off+0xb8/0x310 [ 277.857269] ? trace_hardirqs_on+0x310/0x310 [ 277.857286] ? perf_trace_sched_process_exec+0x860/0x860 [ 277.857305] ? __lock_acquire+0x62f/0x4c20 [ 277.866135] __should_failslab+0x124/0x180 [ 277.866171] should_failslab+0x9/0x14 [ 277.866204] __kmalloc+0x2e0/0x760 [ 277.873652] ? ext4_find_extent+0x757/0x9b0 [ 277.873675] ext4_find_extent+0x757/0x9b0 [ 277.873703] ext4_ext_map_blocks+0x28c/0x48e0 [ 277.873736] ? kasan_check_write+0x14/0x20 [ 277.873792] ? ext4_ext_release+0x10/0x10 [ 277.881909] ? graph_lock+0x270/0x270 [ 277.881925] ? graph_lock+0x270/0x270 [ 277.881943] ? graph_lock+0x270/0x270 [ 277.881963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.881981] ? check_preemption_disabled+0x48/0x280 [ 277.882017] ? lock_acquire+0x1ed/0x520 [ 277.882036] ? ext4_map_blocks+0x88f/0x1b50 [ 277.890847] ? lock_release+0xa10/0xa10 [ 277.890864] ? perf_trace_sched_process_exec+0x860/0x860 [ 277.890881] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 277.890899] ? kasan_check_read+0x11/0x20 [ 277.890915] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 277.890943] ? down_write+0x8a/0x130 [ 277.890961] ? ext4_map_blocks+0x88f/0x1b50 [ 277.900629] ? down_read+0x120/0x120 [ 277.900649] ? kernel_text_address+0x79/0xf0 [ 277.900672] ext4_map_blocks+0x8f7/0x1b50 [ 277.900690] ? __save_stack_trace+0x8d/0xf0 [ 277.900745] ? ext4_issue_zeroout+0x190/0x190 [ 277.900766] ? save_stack+0x43/0xd0 [ 277.900781] ? __kasan_slab_free+0x102/0x150 [ 277.900797] ? kasan_slab_free+0xe/0x10 [ 277.908816] ? kmem_cache_free+0x83/0x290 [ 277.908858] ext4_getblk+0x10e/0x630 [ 277.908879] ? ext4_iomap_begin+0x1390/0x1390 [ 277.908901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.908917] ? __dquot_initialize+0x629/0xdd0 [ 277.908936] ext4_bread+0x95/0x2b0 [ 277.916780] ? ext4_getblk+0x630/0x630 [ 277.916796] ? dquot_get_next_dqblk+0x180/0x180 [ 277.916813] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 277.916838] ? common_perm+0x1f6/0x7b0 [ 277.916861] ext4_append+0x14e/0x370 [ 277.916900] ext4_mkdir+0x532/0xe60 [ 277.925530] ? ext4_init_dot_dotdot+0x510/0x510 [ 277.925554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.925574] ? security_inode_permission+0xd2/0x100 [ 277.925593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.925615] ? security_inode_mkdir+0xe8/0x120 [ 277.973602] vfs_mkdir+0x42e/0x6b0 [ 277.973624] do_mkdirat+0x27a/0x310 [ 277.973644] ? __ia32_sys_mknod+0xb0/0xb0 [ 277.973664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.973702] ? trace_hardirqs_off_caller+0x300/0x300 [ 277.982502] ? ksys_ioctl+0x81/0xd0 [ 277.982522] __x64_sys_mkdir+0x5c/0x80 [ 277.982555] do_syscall_64+0x1b9/0x820 [ 277.982576] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.116156] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.116173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.116193] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.116214] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.163154] ? prepare_exit_to_usermode+0x291/0x3b0 [ 278.168183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.173046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.178242] RIP: 0033:0x456987 [ 278.181458] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.200360] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 278.208072] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 12:25:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000040)={0xdc17, 0x1, 0x4, 0x40000, {}, {0x4, 0xc, 0x1, 0x54a, 0xf0e, 0x9, "9267f6d4"}, 0x3438b96c, 0x3, @userptr=0x100, 0x4}) 12:25:48 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000080)={@empty, @multicast1, r1}, 0xc) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x4041) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xb7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) close(r0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@loopback, @rand_addr=0x8001, 0x1, 0x2, [@broadcast, @empty]}, 0x18) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) [ 278.215346] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 278.222614] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.229887] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 278.237159] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:49 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x0) 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000040)={0xdc17, 0x1, 0x4, 0x40000, {}, {0x4, 0xc, 0x1, 0x54a, 0xf0e, 0x9, "9267f6d4"}, 0x3438b96c, 0x3, @userptr=0x100, 0x4}) 12:25:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5450, 0x3) 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000040)={0xdc17, 0x1, 0x4, 0x40000, {}, {0x4, 0xc, 0x1, 0x54a, 0xf0e, 0x9, "9267f6d4"}, 0x3438b96c, 0x3, @userptr=0x100, 0x4}) [ 278.501523] FAULT_INJECTION: forcing a failure. [ 278.501523] name failslab, interval 1, probability 0, space 0, times 0 [ 278.516032] CPU: 0 PID: 9861 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 278.524568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.533931] Call Trace: [ 278.536539] dump_stack+0x244/0x39d [ 278.540179] ? dump_stack_print_info.cold.1+0x20/0x20 [ 278.545377] ? graph_lock+0x270/0x270 [ 278.549285] ? __mark_inode_dirty+0xfb5/0x1500 [ 278.553891] should_fail.cold.4+0xa/0x17 [ 278.557969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.563084] ? __lock_is_held+0xb5/0x140 [ 278.563111] ? graph_lock+0x270/0x270 [ 278.563130] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 278.563148] ? __mark_inode_dirty+0x4ad/0x1500 [ 278.563184] ? __inode_attach_wb+0x13f0/0x13f0 [ 278.563207] ? __lock_is_held+0xb5/0x140 [ 278.563260] ? inode_add_bytes+0xd3/0xf0 [ 278.563277] ? perf_trace_sched_process_exec+0x860/0x860 [ 278.563296] ? __dquot_alloc_space+0x4b9/0x8c0 [ 278.571155] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.571177] __should_failslab+0x124/0x180 [ 278.571197] should_failslab+0x9/0x14 [ 278.571213] kmem_cache_alloc+0x2be/0x730 [ 278.571265] ext4_mb_new_blocks+0x782/0x4820 [ 278.581370] ? find_held_lock+0x36/0x1c0 [ 278.581401] ? ext4_discard_preallocations+0x1900/0x1900 [ 278.581426] ? kasan_check_read+0x11/0x20 [ 278.594117] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 278.594135] ? rcu_read_unlock_special+0x370/0x370 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e22, 0x2, @ipv4={[], [], @remote}, 0x1}}, 0x6872, 0x6}, &(0x7f0000000200)=0x90) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 278.594150] ? rcu_softirq_qs+0x20/0x20 [ 278.594163] ? unwind_dump+0x190/0x190 [ 278.594190] ? is_bpf_text_address+0xd3/0x170 [ 278.594208] ? kernel_text_address+0x79/0xf0 [ 278.594236] ? __kernel_text_address+0xd/0x40 [ 278.621445] ? unwind_get_return_address+0x61/0xa0 [ 278.621481] ? __save_stack_trace+0x8d/0xf0 [ 278.621513] ? save_stack+0xa9/0xd0 [ 278.621546] ? save_stack+0x43/0xd0 [ 278.621562] ? kasan_kmalloc+0xc7/0xe0 [ 278.621575] ? __kmalloc+0x15b/0x760 [ 278.621605] ? ext4_find_extent+0x757/0x9b0 [ 278.621620] ? ext4_ext_map_blocks+0x28c/0x48e0 [ 278.621633] ? ext4_map_blocks+0x8f7/0x1b50 [ 278.621660] ? ext4_getblk+0x10e/0x630 [ 278.621687] ? ext4_bread+0x95/0x2b0 [ 278.621707] ? ext4_append+0x14e/0x370 [ 278.645043] ? ext4_mkdir+0x532/0xe60 [ 278.645060] ? vfs_mkdir+0x42e/0x6b0 [ 278.645072] ? do_mkdirat+0x27a/0x310 [ 278.645085] ? __x64_sys_mkdir+0x5c/0x80 [ 278.645101] ? do_syscall_64+0x1b9/0x820 [ 278.645120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.645140] ? save_stack+0xa9/0xd0 [ 278.645160] ? graph_lock+0x270/0x270 [ 278.666829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.666846] ? check_preemption_disabled+0x48/0x280 [ 278.666871] ? __lock_is_held+0xb5/0x140 [ 278.666900] ? rcu_read_lock_sched_held+0x14f/0x180 [ 278.666915] ? __kmalloc+0x5ee/0x760 [ 278.666935] ? ext4_find_extent+0x757/0x9b0 [ 278.666953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.684316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.684340] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 278.684366] ext4_ext_map_blocks+0x2715/0x48e0 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e22, 0x2, @ipv4={[], [], @remote}, 0x1}}, 0x6872, 0x6}, &(0x7f0000000200)=0x90) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 278.684400] ? ext4_ext_release+0x10/0x10 [ 278.684420] ? graph_lock+0x270/0x270 [ 278.684439] ? graph_lock+0x270/0x270 [ 278.695644] ? graph_lock+0x270/0x270 [ 278.695663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.695679] ? check_preemption_disabled+0x48/0x280 [ 278.695716] ? lock_acquire+0x1ed/0x520 [ 278.695731] ? ext4_map_blocks+0x88f/0x1b50 [ 278.695772] ? lock_release+0xa10/0xa10 [ 278.728263] ? perf_trace_sched_process_exec+0x860/0x860 [ 278.728282] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 278.728301] ? kasan_check_read+0x11/0x20 [ 278.728323] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 278.728354] ? down_write+0x8a/0x130 [ 278.728368] ? ext4_map_blocks+0x88f/0x1b50 [ 278.728386] ? down_read+0x120/0x120 [ 278.763591] ? kernel_text_address+0x79/0xf0 [ 278.763615] ext4_map_blocks+0x8f7/0x1b50 [ 278.763632] ? __save_stack_trace+0x8d/0xf0 [ 278.763659] ? ext4_issue_zeroout+0x190/0x190 [ 278.763696] ? save_stack+0x43/0xd0 [ 278.763712] ? __kasan_slab_free+0x102/0x150 [ 278.763725] ? kasan_slab_free+0xe/0x10 [ 278.763739] ? kmem_cache_free+0x83/0x290 [ 278.763772] ext4_getblk+0x10e/0x630 [ 278.763791] ? ext4_iomap_begin+0x1390/0x1390 [ 278.786429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.786448] ? __dquot_initialize+0x629/0xdd0 [ 278.786468] ext4_bread+0x95/0x2b0 [ 278.786486] ? ext4_getblk+0x630/0x630 [ 278.786501] ? dquot_get_next_dqblk+0x180/0x180 [ 278.786519] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 278.786540] ? common_perm+0x1f6/0x7b0 [ 278.813382] ext4_append+0x14e/0x370 [ 278.813409] ext4_mkdir+0x532/0xe60 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) inotify_init() 12:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) getsockopt$packet_int(r1, 0x107, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) 12:25:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0, 0x6}, {r0, 0x1}], 0x2, 0x46b1) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 278.813453] ? ext4_init_dot_dotdot+0x510/0x510 [ 278.813475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.813495] ? security_inode_permission+0xd2/0x100 [ 278.813515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.822857] ? security_inode_mkdir+0xe8/0x120 [ 278.836153] vfs_mkdir+0x42e/0x6b0 [ 278.836175] do_mkdirat+0x27a/0x310 [ 278.836196] ? __ia32_sys_mknod+0xb0/0xb0 [ 278.836227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.836247] ? trace_hardirqs_off_caller+0x300/0x300 [ 278.836267] ? ksys_ioctl+0x81/0xd0 [ 278.850356] __x64_sys_mkdir+0x5c/0x80 [ 278.850377] do_syscall_64+0x1b9/0x820 [ 278.850395] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.850416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.875961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.875982] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.876001] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.876020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 278.876043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.876071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.876092] RIP: 0033:0x456987 [ 278.905213] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.905232] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 278.905248] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 278.905258] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 278.905268] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.905278] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 278.905287] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:49 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x7, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454e1, 0x3) [ 279.303082] FAULT_INJECTION: forcing a failure. [ 279.303082] name failslab, interval 1, probability 0, space 0, times 0 [ 279.329665] CPU: 1 PID: 9897 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 279.338181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.347561] Call Trace: 12:25:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5450, 0x0) 12:25:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x10000, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0x32000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0xffffffffffffff10) 12:25:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) inotify_init() [ 279.350164] dump_stack+0x244/0x39d [ 279.353810] ? dump_stack_print_info.cold.1+0x20/0x20 [ 279.359022] ? graph_lock+0x270/0x270 [ 279.362846] ? __mark_inode_dirty+0xfb5/0x1500 [ 279.367438] should_fail.cold.4+0xa/0x17 [ 279.371543] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.376686] ? __lock_is_held+0xb5/0x140 [ 279.380772] ? graph_lock+0x270/0x270 [ 279.384587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.390132] ? __mark_inode_dirty+0x4ad/0x1500 [ 279.394727] ? __inode_attach_wb+0x13f0/0x13f0 [ 279.399355] ? __lock_is_held+0xb5/0x140 [ 279.403453] ? inode_add_bytes+0xd3/0xf0 [ 279.403485] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.403527] ? __dquot_alloc_space+0x4b9/0x8c0 [ 279.403547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 279.413078] __should_failslab+0x124/0x180 [ 279.413096] should_failslab+0x9/0x14 [ 279.413111] kmem_cache_alloc+0x2be/0x730 [ 279.413136] ext4_mb_new_blocks+0x782/0x4820 [ 279.439354] ? find_held_lock+0x36/0x1c0 [ 279.443453] ? ext4_discard_preallocations+0x1900/0x1900 [ 279.448916] ? kasan_check_read+0x11/0x20 [ 279.453071] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 279.458358] ? rcu_read_unlock_special+0x370/0x370 [ 279.463298] ? rcu_softirq_qs+0x20/0x20 [ 279.467292] ? unwind_dump+0x190/0x190 [ 279.467318] ? is_bpf_text_address+0xd3/0x170 [ 279.467342] ? kernel_text_address+0x79/0xf0 [ 279.467359] ? __kernel_text_address+0xd/0x40 [ 279.467378] ? unwind_get_return_address+0x61/0xa0 [ 279.467397] ? __save_stack_trace+0x8d/0xf0 [ 279.467423] ? save_stack+0xa9/0xd0 [ 279.484740] ? save_stack+0x43/0xd0 [ 279.493976] ? kasan_kmalloc+0xc7/0xe0 [ 279.493990] ? __kmalloc+0x15b/0x760 [ 279.494005] ? ext4_find_extent+0x757/0x9b0 [ 279.494020] ? ext4_ext_map_blocks+0x28c/0x48e0 [ 279.494034] ? ext4_map_blocks+0x8f7/0x1b50 [ 279.494046] ? ext4_getblk+0x10e/0x630 [ 279.494062] ? ext4_bread+0x95/0x2b0 [ 279.501328] ? ext4_append+0x14e/0x370 [ 279.501344] ? ext4_mkdir+0x532/0xe60 [ 279.501361] ? vfs_mkdir+0x42e/0x6b0 [ 279.501375] ? do_mkdirat+0x27a/0x310 [ 279.501388] ? __x64_sys_mkdir+0x5c/0x80 [ 279.501405] ? do_syscall_64+0x1b9/0x820 [ 279.501424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.501450] ? save_stack+0xa9/0xd0 [ 279.509076] ? graph_lock+0x270/0x270 [ 279.509100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.509117] ? check_preemption_disabled+0x48/0x280 [ 279.509141] ? __lock_is_held+0xb5/0x140 [ 279.509168] ? rcu_read_lock_sched_held+0x14f/0x180 [ 279.518144] ? __kmalloc+0x5ee/0x760 [ 279.518166] ? ext4_find_extent+0x757/0x9b0 [ 279.518202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.518231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.518270] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 279.518309] ext4_ext_map_blocks+0x2715/0x48e0 [ 279.526526] ? ext4_ext_release+0x10/0x10 [ 279.526547] ? graph_lock+0x270/0x270 [ 279.526563] ? graph_lock+0x270/0x270 [ 279.526581] ? graph_lock+0x270/0x270 [ 279.526599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.526619] ? check_preemption_disabled+0x48/0x280 [ 279.534230] ? lock_acquire+0x1ed/0x520 [ 279.534246] ? ext4_map_blocks+0x88f/0x1b50 12:25:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x141801) close(r0) 12:25:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_cache\x00') syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000080, 0x0, 0x40000084], [0xc1]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x200000) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f00000002c0)=0x6e, 0x1f6f5400052e3cfc) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000300)=0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r6, 0x12) close(r0) r7 = dup2(r0, r0) r8 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(r7, 0x8004562e, &(0x7f0000000140)) ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000340)={{0x2, 0x4e22, @multicast2}, {0x306, @remote}, 0x8, {0x2, 0x4e20, @multicast1}, 'team0\x00'}) r9 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x48000) close(r7) ioctl$VIDIOC_TRY_ENCODER_CMD(r9, 0xc028564e, &(0x7f00000000c0)={0x0, 0x1, [0x1, 0x5, 0x401, 0xbe4, 0x3, 0x0, 0x1, 0xf5c]}) close(r8) 12:25:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) [ 279.534269] ? lock_release+0xa10/0xa10 [ 279.534284] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.534323] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 279.541842] ? kasan_check_read+0x11/0x20 [ 279.541858] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 279.541887] ? down_write+0x8a/0x130 [ 279.541901] ? ext4_map_blocks+0x88f/0x1b50 [ 279.541916] ? down_read+0x120/0x120 [ 279.541935] ? kernel_text_address+0x79/0xf0 [ 279.541955] ext4_map_blocks+0x8f7/0x1b50 [ 279.541975] ? __save_stack_trace+0x8d/0xf0 [ 279.549837] ? ext4_issue_zeroout+0x190/0x190 [ 279.549860] ? save_stack+0x43/0xd0 [ 279.549876] ? __kasan_slab_free+0x102/0x150 [ 279.549889] ? kasan_slab_free+0xe/0x10 [ 279.549903] ? kmem_cache_free+0x83/0x290 [ 279.549922] ext4_getblk+0x10e/0x630 [ 279.549947] ? ext4_iomap_begin+0x1390/0x1390 [ 279.559368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.559385] ? __dquot_initialize+0x629/0xdd0 [ 279.559405] ext4_bread+0x95/0x2b0 [ 279.559423] ? ext4_getblk+0x630/0x630 [ 279.559437] ? dquot_get_next_dqblk+0x180/0x180 [ 279.559454] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 279.559474] ? common_perm+0x1f6/0x7b0 [ 279.566889] ext4_append+0x14e/0x370 [ 279.566930] ext4_mkdir+0x532/0xe60 [ 279.566959] ? ext4_init_dot_dotdot+0x510/0x510 [ 279.566980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.567001] ? security_inode_permission+0xd2/0x100 [ 279.577569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.577586] ? security_inode_mkdir+0xe8/0x120 [ 279.577612] vfs_mkdir+0x42e/0x6b0 [ 279.587140] do_mkdirat+0x27a/0x310 [ 279.587166] ? __ia32_sys_mknod+0xb0/0xb0 [ 279.587186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.587204] ? trace_hardirqs_off_caller+0x300/0x300 [ 279.587250] ? ksys_ioctl+0x81/0xd0 [ 279.595279] __x64_sys_mkdir+0x5c/0x80 [ 279.595300] do_syscall_64+0x1b9/0x820 [ 279.595317] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.595335] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.595350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.595369] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.606426] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.606446] ? prepare_exit_to_usermode+0x291/0x3b0 [ 279.606470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.606496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.606513] RIP: 0033:0x456987 [ 279.616103] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.616112] RSP: 002b:00007f9babf78a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 279.616128] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 279.616137] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000a00 [ 279.616146] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.616156] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 279.616164] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:50 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 280.076183] FAULT_INJECTION: forcing a failure. [ 280.076183] name failslab, interval 1, probability 0, space 0, times 0 [ 280.087713] CPU: 1 PID: 9932 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 280.096206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.105577] Call Trace: [ 280.108196] dump_stack+0x244/0x39d [ 280.111883] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.117093] should_fail.cold.4+0xa/0x17 [ 280.121160] ? print_usage_bug+0xc0/0xc0 [ 280.125240] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.130359] ? graph_lock+0x270/0x270 [ 280.134181] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.139660] ? __lock_acquire+0x62f/0x4c20 [ 280.143901] ? graph_lock+0x270/0x270 [ 280.147707] ? __lock_is_held+0xb5/0x140 [ 280.151799] ? print_usage_bug+0xc0/0xc0 [ 280.155908] ? find_held_lock+0x36/0x1c0 [ 280.160108] ? __sigqueue_alloc+0x251/0x710 [ 280.164450] ? lock_downgrade+0x900/0x900 [ 280.168609] ? check_preemption_disabled+0x48/0x280 [ 280.173642] __should_failslab+0x124/0x180 [ 280.177888] should_failslab+0x9/0x14 [ 280.181697] kmem_cache_alloc+0x47/0x730 [ 280.185777] __sigqueue_alloc+0x3db/0x710 [ 280.189940] ? dequeue_signal+0x630/0x630 [ 280.194098] ? ext4_mark_iloc_dirty+0x199a/0x2f30 [ 280.198990] ? mark_held_locks+0x130/0x130 [ 280.203283] ? mark_held_locks+0x130/0x130 [ 280.207542] ? graph_lock+0x270/0x270 [ 280.211360] __send_signal+0xd1d/0x1bb0 [ 280.215348] ? prepare_signal+0xe50/0xe50 [ 280.219514] ? graph_lock+0x270/0x270 [ 280.223382] ? list_lru_add+0x414/0x950 [ 280.227368] ? lock_downgrade+0x900/0x900 [ 280.231552] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 280.236750] ? lock_acquire+0x1ed/0x520 [ 280.240730] ? force_sig_info+0x55/0x310 [ 280.244824] ? kasan_check_write+0x14/0x20 [ 280.249098] ? do_raw_spin_lock+0x14f/0x350 [ 280.253437] ? rwlock_bug.part.2+0x90/0x90 [ 280.257695] ? trace_hardirqs_on+0x310/0x310 [ 280.262120] ? find_held_lock+0x36/0x1c0 [ 280.266211] send_signal+0x4a/0xe0 [ 280.269815] force_sig_info+0x250/0x310 [ 280.273816] force_sig_fault+0x12c/0x1d0 [ 280.277909] ? force_sigsegv+0x110/0x110 [ 280.281982] ? kasan_check_write+0x14/0x20 [ 280.286229] ? up_read+0x225/0x2c0 [ 280.289815] __bad_area_nosemaphore+0x2dc/0x3a0 [ 280.294501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.300066] bad_area+0x69/0x80 [ 280.303374] __do_page_fault+0xae0/0xe40 [ 280.307446] ? trace_hardirqs_off+0xb8/0x310 [ 280.311871] do_page_fault+0xed/0x7d1 [ 280.315682] ? vmalloc_sync_all+0x30/0x30 [ 280.319843] ? error_entry+0x70/0xd0 [ 280.323569] ? trace_hardirqs_off_caller+0xbb/0x300 [ 280.328592] ? trace_hardirqs_on_caller+0xc0/0x310 [ 280.333534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.338471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.343322] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.348346] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 280.353808] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.358844] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.363866] ? page_fault+0x8/0x30 [ 280.367415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.372268] ? page_fault+0x8/0x30 [ 280.375815] page_fault+0x1e/0x30 [ 280.379276] RIP: 0033:0x4511ff [ 280.382479] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 280.401387] RSP: 002b:00007f9babf78a88 EFLAGS: 00010283 [ 280.406754] RAX: 00007f9babf78b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 280.414028] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f9babf78b30 12:25:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x0) 12:25:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@generic={0xa, "16dbc9f8785ac0218c103a6b7f3b643105e4229234eea2b7c05e6dfea079e6f9f8b9e2e4c54a01f3ce31e62e715d30a242f1f7178a5faed705cc7d51aa331360c236e382db31219f7793a00970393942721356c56a60f5e524c4b7e0a0c1c4af6532bfa99b831325a6f449d06788bbd46d99371df8f1ab364181cd6b3d85"}, 0x80) 12:25:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1411cd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x800) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 280.421304] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 280.428577] R10: 0000000000000075 R11: 00000000004dde80 R12: 0000000000000004 [ 280.435854] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 280.450371] gfs2: not a GFS2 filesystem 12:25:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5452, 0x3) 12:25:51 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) close(r1) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r3 = getpgid(0x0) kcmp(r2, r3, 0x6, r0, r1) r4 = syz_open_procfs(r2, &(0x7f0000000040)='maps\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x9, @mcast1, 0x6}}, 0xffffffffffffffc0, 0x6, 0x0, 0x7fff, 0x1f}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000200)={r5, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000000c0)=0x84) 12:25:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x1f, 0x0, &(0x7f00000002c0)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)) syz_emit_ethernet(0x0, 0x0, 0x0) [ 280.818476] FAULT_INJECTION: forcing a failure. [ 280.818476] name failslab, interval 1, probability 0, space 0, times 0 [ 280.829749] CPU: 0 PID: 9955 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 280.838281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.847648] Call Trace: [ 280.850267] dump_stack+0x244/0x39d [ 280.853914] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.859144] should_fail.cold.4+0xa/0x17 [ 280.863227] ? print_usage_bug+0xc0/0xc0 [ 280.863263] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.863284] ? graph_lock+0x270/0x270 [ 280.863301] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.863335] ? __lock_acquire+0x62f/0x4c20 [ 280.863356] ? graph_lock+0x270/0x270 [ 280.889856] ? __lock_is_held+0xb5/0x140 [ 280.893948] ? print_usage_bug+0xc0/0xc0 [ 280.893972] ? find_held_lock+0x36/0x1c0 [ 280.893999] ? __sigqueue_alloc+0x251/0x710 [ 280.894018] ? lock_downgrade+0x900/0x900 [ 280.910575] ? check_preemption_disabled+0x48/0x280 [ 280.910599] __should_failslab+0x124/0x180 [ 280.910620] should_failslab+0x9/0x14 [ 280.910637] kmem_cache_alloc+0x47/0x730 [ 280.910680] __sigqueue_alloc+0x3db/0x710 [ 280.910699] ? dequeue_signal+0x630/0x630 [ 280.910714] ? ext4_mark_iloc_dirty+0x199a/0x2f30 [ 280.910743] ? mark_held_locks+0x130/0x130 [ 280.945207] ? mark_held_locks+0x130/0x130 [ 280.949467] ? graph_lock+0x270/0x270 [ 280.953298] __send_signal+0xd1d/0x1bb0 [ 280.957328] ? prepare_signal+0xe50/0xe50 [ 280.961487] ? graph_lock+0x270/0x270 [ 280.965306] ? list_lru_add+0x414/0x950 [ 280.969310] ? lock_downgrade+0x900/0x900 [ 280.973506] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 280.978715] ? lock_acquire+0x1ed/0x520 [ 280.982703] ? force_sig_info+0x55/0x310 [ 280.986783] ? kasan_check_write+0x14/0x20 [ 280.991024] ? do_raw_spin_lock+0x14f/0x350 [ 280.995367] ? rwlock_bug.part.2+0x90/0x90 [ 280.999608] ? trace_hardirqs_on+0x310/0x310 [ 281.004026] ? find_held_lock+0x36/0x1c0 [ 281.008098] send_signal+0x4a/0xe0 [ 281.011653] force_sig_info+0x250/0x310 [ 281.015648] force_sig_fault+0x12c/0x1d0 12:25:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x741200, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000000c0)="6be253236fe7b827b4c40f73bd786d72d4867b83ca715c914ce3cf37a2706e25081ec809abda1fe5e1a723af2b04e5dd39fb64b5f1658349973b1b4334fa5ade8f644e72502d56669d6da3f38daec9bd0b227ea48fb9d7fc67881cef6f97177d3d5ac3eaea9ae28d2199064eafbaa790adb3c5a0881f76c1485cba980b65b94fcefe8c49a6ce6eb8dfd8ecdeae91088e2e759b13f8e667cf5c6f982733b7fbf43015eb98f8") close(r0) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) bind$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x2711, @reserved}, 0x10) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000004c0)) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x88, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x30, 0x28, &(0x7f0000000180)=[@fd={0x66642a85, 0x0, r1, 0x0, 0x1}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}], &(0x7f00000001c0)=[0x0, 0x78, 0x58, 0x78, 0x30]}}, @transaction={0x40406300, {0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x20, &(0x7f0000000240)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x4}, @ptr={0x70742a85, 0x0, &(0x7f0000000200), 0x1, 0x3, 0x40}], &(0x7f0000000280)=[0x68, 0x48, 0x58, 0x48]}}], 0x84, 0x0, &(0x7f0000000380)="379272c3058509c235ec122d1e643dcf4fa2e184c50c1cebde0f49e200d20473ed3e6f480b7260c1aa1e380d0773dfded02cc380c49319bb06adc1fc5a94278345d29b861f1dbe0e308615bcea3b5a1cfe884bbf06faecfcb4127a16ff51ac357ed3e8cbd04381a2de4209ca6b432ca90adc7d868e18dd0e0d2187a0d3ba1f7291a8bec1"}) finit_module(r0, &(0x7f0000000480)=':security&wlan1!selinux[cgroup/cpuset(\x00', 0x3) close(r1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000000c0)) [ 281.019725] ? force_sigsegv+0x110/0x110 [ 281.023804] ? kasan_check_write+0x14/0x20 [ 281.028075] ? up_read+0x225/0x2c0 [ 281.031635] __bad_area_nosemaphore+0x2dc/0x3a0 [ 281.036432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.042004] bad_area+0x69/0x80 [ 281.045296] __do_page_fault+0xae0/0xe40 [ 281.049374] ? trace_hardirqs_off+0xb8/0x310 [ 281.053820] do_page_fault+0xed/0x7d1 [ 281.057631] ? vmalloc_sync_all+0x30/0x30 [ 281.061802] ? error_entry+0x70/0xd0 [ 281.061820] ? trace_hardirqs_off_caller+0xbb/0x300 [ 281.061835] ? trace_hardirqs_on_caller+0xc0/0x310 [ 281.061853] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.061868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.061900] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.061916] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 281.061932] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.061954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.061966] ? page_fault+0x8/0x30 [ 281.061984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.062002] ? page_fault+0x8/0x30 [ 281.070741] page_fault+0x1e/0x30 [ 281.070754] RIP: 0033:0x4511ff [ 281.070786] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 281.070795] RSP: 002b:00007f9babf78a88 EFLAGS: 00010283 [ 281.070808] RAX: 00007f9babf78b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 281.070817] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f9babf78b30 12:25:51 executing program 4: pipe(&(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write(0xffffffffffffffff, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x47141272) 12:25:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$netlink(r1, 0x10e, 0x8, &(0x7f0000000000)=""/17, &(0x7f0000000040)=0x11) close(r0) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x2, {0x6}}, 0x18) [ 281.070826] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 281.070834] R10: 0000000000000075 R11: 00000000004dde80 R12: 0000000000000004 [ 281.070844] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 281.189480] gfs2: not a GFS2 filesystem 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe408, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) io_setup(0x8, &(0x7f0000000000)=0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) listxattr(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)=""/113, 0x71) r4 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xb, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000001800)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000018c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x4000002}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x38, r5, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x800}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000040}, 0x40800) r6 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x1, 0x2) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x400481, 0x0) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/qat_adf_ctl\x00', 0x181d00, 0x0) io_submit(r2, 0x7, &(0x7f0000001780)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x400, r0, &(0x7f0000000040)="f61af212d38dae03e3cc12de9bc4831e3062ae79ccdbe0c7301911f2a571783e97f97be2ecc3ee2bf599e393f22452c31a4287642d94950423ea8d613680853bf8ec74c4acd29334aee7364a22e6d9f83b768629413776995aef66e73306ba597b8c01ead1907d2ebec4fab46ec5a88b4003bd4e522a6b11febd10bf219ebba38145f125800545a704d24b5fa5c29d247ad9618b19a22d", 0x97, 0x2, 0x0, 0x2, r3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f00000001c0)="be5c6e89cc2c9074d82d2b2916ddd90a001f2ba2df63feeef92c3c", 0x1b, 0x9, 0x0, 0x0, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f0000000280)="cc9da3bfe632c9c01a135089f515767f6dc52a71e37fe954742ed9b02c113444f9716dc8c41fd810675aa95840a64eca9f97ad4881d30e791b7085b3b6dcedb1951a922cb1cee40bd4544178a91e31b05885f4f5f2633d72f77fcf5a784cbb41fb90ec772389c77954a3b682a89cdd40991dd6b0a0c611bf96ff285c0418d34b751d10fd49a31f0530f09df2ca7f24", 0x8f, 0x7fff, 0x0, 0x0, r6}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x20, r1, &(0x7f00000003c0)="dd41f2c5db6ac819c71c1ba92270860bf2a1fb15b25aaad73a7d97edb43147934c9ebbbe9b9bdebe4020e9eeeeca44be70aba8c273d451bface15439fa88b7afbbd2ee956745f21028b2362e186b58406053dee9ba54ae24e40d62849e3611b4f24ba387f185703a4eb51708ec4e2ba82c2d55cb8b281dd96e0614b7a92316ab60d4a822a89ff5c533db9457166588f62f140238d9251ab68bfc5fe407333ccbfa3dab0fa03924c22c13a2f8d5304f5192445378a9ae69bac86bcd3f54a3d86bf9152fc14096592286e0c5db9660f4", 0xcf, 0x5, 0x0, 0x2, r7}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x6, 0x0, r1, &(0x7f0000000540)="af31c4385711e48333dcead864bb9f848cad9ba42cdcad65db53943ea2ea7d06df28176bf1872ca8df81462c915d9f97f84bd05740c23ef2867ca7380f3be03975fc69d8e24ea30658ce2705f160956c4a83b489407e951a79b8c323adc58e8e3d8a6c4d90cbdc49e0314f319a87b20579b11daeb03af2f976643dde08287c91f2a49bdd2d1916f7e57b6857e07aa7090ab6064e1e9a57e836b4995bac08c87eb33eddff661ca56cbd0c619edd96b98c69f1b85a4ae292aec74d501b8432c1861fa6e9ec9ef622e22aa47e2b437064adeda8da289130ec17650a32155155d60f0a35f1d0ce6198ea107b65d73cd9570cd0ef7542d06374e6776201a9df1a425f73c41eff7bd0d8fad4e65979e4d2099e12abc1b0b07b9babfc8780a15b0d587dc425ca7154cda3be247252bd9aa6025152554528683a2b4bad0f71e31e5cdcc4ddd156b1dff3c9e251eeef8a22a4748bd46c1c04220a921a09fe2b274bfa60421d1d1f1408e795eefa4896051673a1f8575651896839ee4dd0eb23f12cb0390caf50eb9a459dee23410ab0db99c7c41770b1e4bbc71b07e13ba4ec1300a3ed7b5bca63e8a25794dfa0e56f6c4941700d71c4679036943410c4fd6cb47cc7510e3b8ed6c6bccf81c9bf7b3f9bbe0b2347f65af59f04a6e3710dd3d0ac800efc8ccac717e13c49da102d106a06bd73fe7505cf69cd652578fd7206aa79da74b37c27877a72a2b46aa722425d3e55efba7b8436f031a274a5084a26789dcc5d7bb808cc742d7defcf3e83688095d11c4deed6e7abab37306303b376fb7537b9c55cad02f8f8ce6ba6b8f71577e2064c1f475de85633259b54b8bcfb784948057524bc98a57316068dc5f6f4d690e3ea7eedefb9c14cf0b54d71418f8738ef937981216ec1421094e1cdcf1618b44ecc4731587fa82b5d848f75a0e842c01779013913d989c70a6b225faf62a9dd73951038ff0f53a46638720d9863081c32d7cfad97de11f75c13de1441142e073c2ecccabf583c8600afc8f82dfd5948c33b9d16ec923722b81a9ec8ed752ab12628170743d116357b933110c4c76b170e85f2b1b4e2cfcfe90a913509d3a4870f94011c6ee0e2c555356331f5735de1701675da226e238e28c556d0acc851bb0e300a6961e3f5055d6a063448b67dd2eba72c5723c7b87a0ccf1a737e184e374f8ec6954c2345c85b42511e1bf9be56fc49ac930b7be8d203fe96289e15745c1c52a387d07d4955efb1b2894c7695329d3b674313ba2a1519947471e3944c21dff1e5cbd666962a7c3be08fdd41f937102a912503ae30881e2766e163907365658c04d5a630deacd19c852c5eda8af5d7d4d72d551f235b8cfc276c562e681f90d4d02603e8677a304a61ae0065055bb7763b7c1baaf38124efd30a02ded8f30f88530dc7d14efe3dc0fbd96cd9892b5414a472d1a6b9b98d1073d1f53434b5587f9364751b7206641e1a55337688214f60a23caa44a69e94d6fe22ad350e1ced945e6c34170e28350b3764a37d74d1ca0bbdd53178c4314f387b3344b3bc3a46e91d31268c941d9f85cc8d7a299129ac020bee1dc695e77dc6ea746079371345b7c431cafcac8a46a906e04e17b341ba980aac5444aac744beef35f1cd0c664fea293e2abf6562467d9727e8df0984dba54e92cecf5f649523f4d8a4542300843072ee0d59e2562373df23dcdbd9bb6adbb0c06d4ba4f4b35f617b20356a6ddf56c1c7e7166c1411d96d68fbdd6757b30955f295c52b780f121730c419195428ffa893fcc4d65006b36473f3449ef06d10c166e7519858696020aa3c16b7fdc1654ca482254b20f2ff1e0c35fe50668d282c2b428712ce1942325c69617dc5501c2b6195e7cba74e5dce2c20077dd2588aab4afe6b39c742d3d324dace2e9bfae11200a647ae40c581483ffbb0cacbc0389ad114f65c7e2830bad6601fb1a1bdad1f79ceff8cea1de0f8e0e7be5ba82abb91e69fed8bd4509d7ab3a8a0d3c271c5016c8f494a08324bf237eb6f9ff70e7c424d05e339723161f1163f37175913a13b9ab61398bba7e74110d162ab1f4a31c37e69f52ce655b99c7e395137f50d0e62813eb7a093a565e8aef2b56708a84799d482112c85a8854a51fc48fe474998d52b582bf0a8b4efa2f571be502a7eb924ab422d4cf5776c95c70466aa047c71e66797c5fd69f5ee8c7e85c70c8fd19993a2c3a580d71c196b743a9e1de03b5e4f3013aa0243197bf033c16ebd353c8b98460c8968ef962168d00af8fa8d5aab97721b4c6a77873ead40fe63f983af9e54e3a75f003c5139523e732f66224a549d10ec87fcc09c4386ee4ce940000260eac9be749e21c01b03a615f5db483c8828c6fead15c0e087011d301d729dcd2e9a33e5537b9940ad7f37eba8aae6e02bad68d99a01d8f8fdee6c3fd160c35b1e8f58614bfb1581925ba28a0976f0d70e628d7b1680728f5b9aea96ed92f28d18bbb7c5e87ee551959bda7bfe1cb7f3d285c493e773730340ad323006ccdaec972ba3fab89086cba8c7464a95bfd55af1a7320524847068579072a2dd2215df2d3253b33bbab1c8566aacb3f034ebe592607ab830ba92b08a826752a2f6d0ea9050e4f63f22115631abb54cdbc2e534e41f950ae2d96ea3fa955b15a9e8689e1c127fc4b3a5d3d7a7e8ea57b560bae8fc42d608f27ff23b6f45883dc496f44b777fdf98fe551602cf9fef4fcaaf901c2dc180b0891bec7f8e4723ad93c833d3e7d2263237745894b3abdbeb5eb86c7fe02f417a9494401a89ec7ae7b5746a1e7bfcc15f35192909b2d44f8bf0721e717a975e58ed3518f67a724361e5b1a0ac68f5027b06ebd00f090e428b6aaf04b78f854a010ff0b03044cd86491bf52a33351f8ba7cd5aa5d4f456ec6a4860df7b2731e1b69373386d0db999a9f5b509061d6f1128310ad92a04d6c9c4dad3302442ae700a53cf6016b1055c621bf8dd337e67e28ce5b56318fadc7fb051e94069bfbca910e6e7d601f8261d739d05419e599061c357d851db38c199c2bfad65d98483a945c21d9ac264266eb1634431537b9e067c89c99c0ca7e47f275ba5d1529aa7938a9a426f91f302615e0cffeb1cb574ce091978b20ee75f521ca82122de6b5aee739caffc9642f4a93fe4e1670ad4c4d6a17bd0e5796dc760a94dd8bfbfbc8be9485bf6b56c8fa02038ccf0757e5c4456d3f60ef633f92088393d2eed28d42ff3af91c7cb5810273e5ffd077d3351c26b9d7da8315daf7bb82ff401d655e19ef926a9a552a3c26096beca0bbcfd0b7f922db1a8f5cac9b043a21fe68c1768abea28a8a49a35c4ef6cb657cc6149dffa7359893920f5b18c805a7fd2ebafb842fbca0058b9a3c52d0d867c2bd5d79463b661a16db37fc93f70b233735f33468b968648c740a86baa6477e4d58d920cd837e5ff73e6f12c11d95ee54f29c4b3f55736371c7a278e0f36221d2b8f61a37f9dd2acac98a03da84f3c21f234d03c4b7fb1e3881baca34274fb0511bf3ef0ea1ea2187086a47f2c4b5f9f9fc9634daacdc9206e0b54bff505253f4123363e9b24e79e71f8840c7ff0ebe75d0da240dcf5dfefe38d857b1dce1c017001d5fafb612b24e95b7f03ec139d186a875e62933dff32bdc2ba4a2a626da35f205152a3fd2e3fd2af057712ec8631e97d379569d78063c99f6f3c0c112853bf93f50d6a26f11379b3a443067ad6665b83f1ce29fb834a396965c238d69b50a90621ce43eac825a52caefab19755e65ca7fc0976194ad5d9dac13862e966673c797da357b3c89021f1457e356e3e4b15f9cf407de38ab4608997f68873f457c382a82c96813cec9a3475030dbf880b5d954f1d4d9084ba83ad90c65a1ced4163908d609e0ed6893463546d3c0434a96aea43c29a2fe0c0b233ebcaedddafa3d1f2450253275693bd7ab3393e1d60ca1094beded125be2a0d02eb876dddfdebd37ac2170ee60e58a1f174e5cd39773d244f6c2fe96efeda207f9e73ad2bf87e7f755b223834b9cf17373082abd4b045621edcdd3bec5824f53f3ea6984ab877a668d97bec3cce8e59fd9990c5454e5741e86724001ab7b8dfd1c4cb826678dee38ed5b439c7782c7b9719e07b67ca9d26ffe7bfc76a936e7848ef0f90706260a25ab27c9ca3cbf3caa3a4717b05094df454e2288e7f5c6c2b56b534ebebc50aac5ed9c9b4d66cc3d5563b2476e3f2c743723bea27618195a53df9a210933bb4e0352ab2d4ae31f16d0276d0370d4f60a196d618f724569dc9ddcffed1b4e90a36fdf71cf97f2f53a6a35ffca44cc3fecd96a63a59895e720de508c270613b8c5a72383d7ba3d26bc2ae3f93d7a9feef1fa3b60d96bfc996734d95b75ac93f88fc6340564e8b876f61c4ffcbbf0ccb9748e3c206ef015527db6cf62687d013f269995c7801238bca1d794bbd978332158549a8b671cb2cb11cdf78b65fe147bf5817e363862b3ea0145ed5b1de207ee26541f068f238f936ef35e24443e80b29bd77518abcf6a9661d7dc001fb17a14cded9ef1c541c07959239e0b082a459c9e0e9614d4e7f93d520cf9abcafc151218e9e2c02c53821a62d3a1973fa12339ccd64417ed4f08627c25337ab3a6579985bdd3fa0cc1e830bcc2e3ad9b99e748bda1e392ecbbfb5788f0e5b046d10ffff03063d75ff84348fdd3e9ae86f99a4878075c33cbc9675f9a682e81681f86c9921aa8f85ce005d551853749ab0c5eb6280ac04541c6d48fefac8bbd1bc8e72a9734025db862e4b3aa24c8eeda86eb09c898de6152e469412a28ea53543e79a248727772d9ec04d99cd0801b99b946e058f4760b79c7f23cda391c446f0d71e6b0fc546ccd284065f20b2d283dcd69ffe58c164299cab08116e1fb78d18f32e6e4799548c77151b9ea55c24584cb48f48b4b755dc5923ab60922bc9a5f6d1fc9bb1470e6267053772a7e59a1d2228a035af635266ca3e649c3d471b94dbc4b05a9bb52409e9685efe6fb262c81b9dc61cf20e5adb4497114daf709fb6dec2eb68e0bc46c7ae282ce0cf444346f0331bac5ddccff24b6b480ae6186211cc6260e7f9bb60ea9e3e2b1b36a025f9a9bdac4cce4b5c6333fff1cb578f23aca7ff268cf857c4fb79730b12dbcac68d86a698a8a76b5c1f5bb582f2de024832396c6d7d3330c83f9f8db8a2f7ab5115967e73f596bf65f3d1702b0f470c9cd9629a848da94655f6766616971a38481e0f305f1bce501c945859f36723207d918fa86ee8e21ac7532bf1d3e37d64453f5d2be69707a31256af02df3818f01abbdb7fc914915c6ec6a785d4c7400be229873e9154b294ab948ea6a64bd17d96793da10b0577a0cb449ec37553d2208b5e7ce6ee6dd1ec3fe0ff92ce7b7c2fb35ee0bde9a5f6e22aaef84b2da4878f21225b378bcb52420a944642fe4daf6901f3084154a94a8adf952a6d127645ff8c5c24ffff2d4c3b3a34db2465ee6f6e4b605f2355082a0dec2982b70abef99268dd4a1c8b00aa318690bb2eeb9a2037cf349d85a59caee4e05ca48f455f3078eab8cbdef3eef3f66d85d615865f24e0c1d30e0217959f264433f32ec64362bca74d9e4efc053aad9b7264bf65115fd60a04ad82d9d35cf42ba2c3a49396b3b20d26004044f875c830f699c0047672229a8827f8506dbe7fd1b016fc9bac411aa9b5504a84595cf1130a46cb5278580452d300a5a9a11af8607d199405c7fea3007350dd9f63c7dbca68f0a7d4e3728aada351aa5535072679b7f51b3173d8a18800126f059e5c4bbe84d1a3", 0x1000, 0xfffffffffffffff7, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x6, 0x86e1, r1, &(0x7f0000001580)="50bd60936721d4599a", 0x9, 0x8, 0x0, 0x2, r8}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x6, 0x81, r1, &(0x7f0000001640)="992b789389b61b2cc5eda953e10bc30131bc0049da6b91ba4fe6e1fc897832e5fa1ed386684e4cc4daf55cffa814e56fd141dc266390aa462b803fb814865845967198fce546936dbe77283e08d0835262fc21c43831079bede62d2472a221410be3b9def30c50d5d82da0b2e88a715d636db0a123610360c178f1368db9d60dfb29e77c35901bbec5817d8f2ef559c38a5248b7c90bcf38425dd91a7c28b9d5544a64f25d637fdc8396faca126509a66bedcbb27abd5686ac85d1bef4331840ca8623c9c4c5c526aeeea4d9e18f6d49e2dc7049be0f4e0f422b87225144b66bb59f0554301723e7cb352941", 0xec, 0xc78b, 0x0, 0x2, 0xffffffffffffff9c}]) 12:25:51 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x8927, 0x0) [ 281.354279] FAULT_INJECTION: forcing a failure. [ 281.354279] name failslab, interval 1, probability 0, space 0, times 0 [ 281.365536] CPU: 0 PID: 9992 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 281.374035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.383397] Call Trace: [ 281.386001] dump_stack+0x244/0x39d [ 281.389661] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.389725] should_fail.cold.4+0xa/0x17 [ 281.389745] ? print_usage_bug+0xc0/0xc0 [ 281.389767] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.408200] ? graph_lock+0x270/0x270 [ 281.412021] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.417497] ? __lock_acquire+0x62f/0x4c20 [ 281.421743] ? graph_lock+0x270/0x270 [ 281.425554] ? __lock_is_held+0xb5/0x140 [ 281.429646] ? print_usage_bug+0xc0/0xc0 [ 281.429670] ? find_held_lock+0x36/0x1c0 [ 281.429696] ? __sigqueue_alloc+0x251/0x710 [ 281.429732] ? lock_downgrade+0x900/0x900 [ 281.446388] ? check_preemption_disabled+0x48/0x280 [ 281.451426] __should_failslab+0x124/0x180 [ 281.455735] should_failslab+0x9/0x14 [ 281.459567] kmem_cache_alloc+0x47/0x730 [ 281.463651] __sigqueue_alloc+0x3db/0x710 [ 281.467861] ? dequeue_signal+0x630/0x630 [ 281.472034] ? ext4_mark_iloc_dirty+0x199a/0x2f30 [ 281.472059] ? mark_held_locks+0x130/0x130 [ 281.472076] ? mark_held_locks+0x130/0x130 [ 281.472091] ? graph_lock+0x270/0x270 [ 281.472117] __send_signal+0xd1d/0x1bb0 [ 281.489235] ? prepare_signal+0xe50/0xe50 [ 281.489251] ? graph_lock+0x270/0x270 [ 281.489270] ? list_lru_add+0x414/0x950 [ 281.489289] ? lock_downgrade+0x900/0x900 [ 281.505164] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 281.514491] ? lock_acquire+0x1ed/0x520 [ 281.518477] ? force_sig_info+0x55/0x310 [ 281.518504] ? kasan_check_write+0x14/0x20 [ 281.518519] ? do_raw_spin_lock+0x14f/0x350 [ 281.518537] ? rwlock_bug.part.2+0x90/0x90 [ 281.531141] ? trace_hardirqs_on+0x310/0x310 [ 281.531159] ? find_held_lock+0x36/0x1c0 [ 281.531182] send_signal+0x4a/0xe0 [ 281.531203] force_sig_info+0x250/0x310 [ 281.531238] force_sig_fault+0x12c/0x1d0 [ 281.531273] ? force_sigsegv+0x110/0x110 [ 281.531295] ? kasan_check_write+0x14/0x20 [ 281.543969] ? up_read+0x225/0x2c0 [ 281.543993] __bad_area_nosemaphore+0x2dc/0x3a0 [ 281.544012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.544032] bad_area+0x69/0x80 [ 281.551538] __do_page_fault+0xae0/0xe40 [ 281.551555] ? trace_hardirqs_off+0xb8/0x310 [ 281.551582] do_page_fault+0xed/0x7d1 [ 281.551600] ? vmalloc_sync_all+0x30/0x30 [ 281.551616] ? error_entry+0x70/0xd0 12:25:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454cf, 0x3) 12:25:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9b0000, 0x9, 0x7fff, [], &(0x7f0000000040)={0x9b0906, 0x152, [], @value64=0xdba}}) getsockname$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x10) [ 281.551633] ? trace_hardirqs_off_caller+0xbb/0x300 [ 281.551649] ? trace_hardirqs_on_caller+0xc0/0x310 [ 281.551670] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.564006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.564026] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.564043] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 281.564061] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.564081] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.572294] ? page_fault+0x8/0x30 [ 281.572315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.572340] ? page_fault+0x8/0x30 [ 281.572356] page_fault+0x1e/0x30 [ 281.572368] RIP: 0033:0x4511ff [ 281.572384] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 281.572393] RSP: 002b:00007f9babf78a88 EFLAGS: 00010283 [ 281.572406] RAX: 00007f9babf78b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 281.572420] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f9babf78b30 12:25:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000040)=0x4) [ 281.585742] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 281.585751] R10: 0000000000000075 R11: 00000000004dde80 R12: 0000000000000004 [ 281.585758] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 281.701154] gfs2: not a GFS2 filesystem 12:25:52 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0a5c1f023c126285719070") sendmsg(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) write$binfmt_elf32(r0, 0x0, 0x0) 12:25:52 executing program 3: r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x80800) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000180)=r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x999, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000000)={0x5, 0x100000000, 0x8, 'queue1\x00', 0xe3ce}) 12:25:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x18, 0x80, 0x0, 0x9, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 12:25:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x2, 0x0) 12:25:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 12:25:52 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d8, 0x3) 12:25:52 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) r1 = userfaultfd(0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x23000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '/dev/snd/seq\x00'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@msize={'msize', 0x3d, 0x5}}, {@mmap='mmap'}, {@privport='privport'}, {@msize={'msize', 0x3d, 0x9}}], [{@subj_role={'subj_role', 0x3d, 'mime_type%'}}, {@appraise_type='appraise_type=imasig'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0xffffffffffffffda, 0x4, {{0x80000000, 0x10000, 0x1, r3}}}, 0x28) 12:25:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') close(r0) [ 282.053390] FAULT_INJECTION: forcing a failure. [ 282.053390] name failslab, interval 1, probability 0, space 0, times 0 [ 282.095420] CPU: 1 PID: 10038 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 282.104021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.113371] Call Trace: [ 282.115983] dump_stack+0x244/0x39d [ 282.119653] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.124851] ? __kernel_text_address+0xd/0x40 [ 282.129356] ? unwind_get_return_address+0x61/0xa0 [ 282.134300] should_fail.cold.4+0xa/0x17 [ 282.138373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.143511] ? kasan_kmalloc+0xc7/0xe0 [ 282.147403] ? __kmalloc_track_caller+0x157/0x760 [ 282.152257] ? memdup_user+0x2c/0xa0 [ 282.155981] ? graph_lock+0x270/0x270 [ 282.159784] ? do_syscall_64+0x1b9/0x820 [ 282.163849] ? graph_lock+0x270/0x270 [ 282.167669] ? graph_lock+0x270/0x270 [ 282.171502] ? find_held_lock+0x36/0x1c0 [ 282.175590] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.181053] ? lock_release+0xa10/0xa10 [ 282.185029] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.190482] ? usercopy_warn+0x110/0x110 [ 282.194553] __should_failslab+0x124/0x180 [ 282.198792] should_failslab+0x9/0x14 [ 282.202619] kmem_cache_alloc_trace+0x2d7/0x750 [ 282.207300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.212915] ? _copy_from_user+0xdf/0x150 [ 282.217088] copy_mount_options+0x5f/0x430 [ 282.221327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.226874] ksys_mount+0xd0/0x140 [ 282.230443] __x64_sys_mount+0xbe/0x150 [ 282.234430] do_syscall_64+0x1b9/0x820 [ 282.238328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.243701] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.248632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.253484] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.258509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.264054] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.269081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.273977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.279166] RIP: 0033:0x459fda 12:25:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x8000) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x8, {{0x2, 0x4e22, @local}}}, 0x88) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') close(r0) [ 282.282367] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 282.301272] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 282.308983] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 282.316269] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 282.323541] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 282.330810] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 282.338085] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:52 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}, 0x10) 12:25:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x0) 12:25:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) r1 = socket$inet(0x2, 0x0, 0x35) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x4, @loopback, 0x5}}, 0x200000000, 0x4, 0x101, 0x9, 0xbe8a}, &(0x7f0000000100)=0x98) syz_mount_image$erofs(&(0x7f00000001c0)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000240)="119fd94baca7039c9c78e43e8d38f504d7655dd4a473919d48b3b52528d338d9da2803d376182a0d0eb27ccfef7a1910bd1ae509ee4459e973d4ad1472f0f46bcc89690676874efdf18d0bb46f10331d9c997bafd80da50f78095fb498344f4209dab928d6292be933b272e6ac5895af9e9de9491773c69b7216eda3f27bd19b5eca1ffacdcfae77332a6a8bf70f01c337f1a2467fc476610ca6e00450c672a7fdf2662e759a10feafb2a86816d92f02a887040a83720d6cbcbb81bc10852ce14b997efec57813a6b8b9ca546cfc14286d1c58acddb7c02c61eff558c315722005ca96d3233fab9b481758", 0xeb, 0x1}, {&(0x7f0000000340)="70b5dd0c15373892c4784b4504443fd623650395735663615096a0037f7051465ae003decf5304988f40f8a4b1c28e3edb77eceda67620e64ef48ed1b7a2c33455bae2535590f836abc759b86c2b60aabf6afa3f976c9e48856d739e2abb85c39046dc96d9f85fb2c6ec9e2846f0f527a0c40c8d10c51f314fdfc90127be1e278dc1df27be70f32e1c727cf3a452035ca85e6b5e762c227e6b158eb36d3b1e839a84999fbc57a5af9d1609244717f5508e93a8594125e231dac5e142a2f7fb885cec66d01ff9b38a3d825936bff5ee8a155be2ae4d0cdc215439a2c149147324", 0xe0, 0x4}, {&(0x7f0000000440)="95fc14b5a6148f086c40628a345eadbd98412f81c444f7ce54674505735d55b482b896a89ed73d2899f44a9b1711d5c5c38c5e0c34f347af7667a292b69e01c75bc215de7cffb4d3d6c1d38cf84aada40fb007b7cd6259fe581076c1dff5e21395863d03c143573a8fa6529b43a605aede5e76a891b44631f1eee1fbedad456c", 0x80, 0xdf4}], 0x4000, &(0x7f0000000540)={[{@user_xattr='user_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@appraise='appraise'}, {@subj_user={'subj_user', 0x3d, 'lo+\\nodevmd5sum'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, 'b$'}}, {@subj_type={'subj_type'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em0\fbdev['}}, {@obj_user={'obj_user', 0x3d, '/dev/snd/seq\x00'}}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0x7}, &(0x7f0000000180)=0x8) r3 = open(&(0x7f0000000600)='./file0\x00', 0x200002, 0x40) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000640)) close(r0) 12:25:53 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000058020000400100000000000098030000980300009803000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x4d0) close(r0) 12:25:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d7, 0x3) 12:25:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1e, 0x0, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) [ 282.573971] FAULT_INJECTION: forcing a failure. [ 282.573971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 282.585835] CPU: 1 PID: 10068 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 282.585847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.585858] Call Trace: [ 282.606373] dump_stack+0x244/0x39d [ 282.610028] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.615250] ? mark_held_locks+0x130/0x130 [ 282.619500] ? set_next_entity+0x485/0xc60 [ 282.623748] ? __lock_acquire+0x62f/0x4c20 [ 282.628001] should_fail.cold.4+0xa/0x17 [ 282.632091] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.637213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.642866] ? __perf_event_task_sched_out+0x33a/0x1ca0 [ 282.642896] ? mark_held_locks+0x130/0x130 [ 282.652506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.658061] ? graph_lock+0x270/0x270 [ 282.661880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.667432] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 282.672649] ? find_held_lock+0x36/0x1c0 [ 282.676726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.682279] ? should_fail+0x22d/0xd01 [ 282.686181] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.691303] __alloc_pages_nodemask+0x34b/0xdd0 [ 282.695990] ? trace_hardirqs_on+0xbd/0x310 [ 282.700332] ? kasan_check_read+0x11/0x20 [ 282.704501] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 282.709602] ? compat_start_thread+0x80/0x80 [ 282.714576] ? find_held_lock+0x36/0x1c0 [ 282.718703] ? dispatch_ioctl+0x238/0x390 [ 282.722889] ? trace_hardirqs_off+0xb8/0x310 [ 282.727315] cache_grow_begin+0xa5/0x8c0 [ 282.731392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.736939] ? check_preemption_disabled+0x48/0x280 [ 282.741987] kmem_cache_alloc+0x66b/0x730 [ 282.746155] ? find_held_lock+0x36/0x1c0 [ 282.750240] getname_flags+0xd0/0x590 [ 282.754054] ? retint_kernel+0x2d/0x2d [ 282.757956] user_path_at_empty+0x2d/0x50 [ 282.762155] do_mount+0x180/0x1ff0 [ 282.762180] ? copy_mount_string+0x40/0x40 [ 282.762201] ? retint_kernel+0x2d/0x2d [ 282.773960] ? copy_mount_options+0x228/0x430 [ 282.778473] ? copy_mount_options+0x228/0x430 [ 282.782986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.788558] ? copy_mount_options+0x315/0x430 [ 282.793074] ksys_mount+0x12d/0x140 [ 282.796763] __x64_sys_mount+0xbe/0x150 [ 282.800778] do_syscall_64+0x1b9/0x820 [ 282.804695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.810080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.815027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.819886] ? trace_hardirqs_on_caller+0x310/0x310 12:25:53 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f000000c140)=[{{&(0x7f00000034c0)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0) [ 282.824929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.830483] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.835522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.840392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.845593] RIP: 0033:0x459fda [ 282.848813] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 282.867739] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 282.867756] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 282.867780] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 282.867789] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 282.867798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 282.867807] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 282.927026] gfs2: not a GFS2 filesystem 12:25:53 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:53 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$unix(0x1, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x60ff) truncate(&(0x7f0000000140)='./bus\x00', 0x800) r3 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 282.972669] erofs: read_super, device -> /dev/loop0 [ 282.978451] erofs: options -> user_xattr,noacl,nouser_xattr,appraise,subj_user=lo+\nodevmd5sum,fscontext=sysadm_u,seclabel,subj_type=b$,subj_type=,smackfsfloor=em0 bdev[,obj_user=/dev/snd/seq [ 283.049195] FAULT_INJECTION: forcing a failure. [ 283.049195] name failslab, interval 1, probability 0, space 0, times 0 [ 283.058890] erofs: cannot find valid erofs superblock [ 283.070786] CPU: 0 PID: 10097 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 283.079397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.088758] Call Trace: [ 283.091376] dump_stack+0x244/0x39d [ 283.095035] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.100260] ? find_held_lock+0x36/0x1c0 [ 283.104352] should_fail.cold.4+0xa/0x17 [ 283.108432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.113550] ? kasan_check_read+0x11/0x20 [ 283.117739] ? rcu_read_unlock_special+0x370/0x370 [ 283.122681] ? rcu_softirq_qs+0x20/0x20 [ 283.126664] ? unwind_dump+0x190/0x190 [ 283.130587] ? find_held_lock+0x36/0x1c0 [ 283.134799] ? perf_trace_random_read+0x6c8/0x700 [ 283.139686] ? perf_trace_sched_process_exec+0x860/0x860 [ 283.145146] ? save_stack+0xa9/0xd0 [ 283.148787] ? kmem_cache_alloc_trace+0x152/0x750 [ 283.153645] ? copy_mount_options+0x5f/0x430 [ 283.158099] __should_failslab+0x124/0x180 [ 283.162373] should_failslab+0x9/0x14 [ 283.166183] kmem_cache_alloc+0x2be/0x730 [ 283.170370] ? find_held_lock+0x36/0x1c0 [ 283.174435] getname_flags+0xd0/0x590 [ 283.178249] user_path_at_empty+0x2d/0x50 [ 283.182427] do_mount+0x180/0x1ff0 [ 283.182448] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 283.182467] ? rcu_pm_notify+0xc0/0xc0 [ 283.182487] ? copy_mount_string+0x40/0x40 12:25:53 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000240)=r1) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pipe(&(0x7f0000000040)) close(0xffffffffffffffff) 12:25:53 executing program 3: getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) syslog(0xf, 0x0, 0x0) close(r0) nanosleep(&(0x7f0000000040), &(0x7f0000000080)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2002, 0x0) [ 283.182510] ? copy_mount_options+0x5f/0x430 [ 283.182526] ? rcu_read_lock_sched_held+0x14f/0x180 [ 283.182542] ? kmem_cache_alloc_trace+0x353/0x750 [ 283.182571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.182592] ? copy_mount_options+0x315/0x430 [ 283.195575] ksys_mount+0x12d/0x140 [ 283.195598] __x64_sys_mount+0xbe/0x150 [ 283.195620] do_syscall_64+0x1b9/0x820 [ 283.195640] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.195658] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.195678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.250754] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.255786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.261309] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.266334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.271186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.276385] RIP: 0033:0x459fda [ 283.279588] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 12:25:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0045878, 0x0) [ 283.298492] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 283.306212] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 283.313478] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 283.320754] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 283.328014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 283.335294] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/244, 0xf4, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100), 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000240)) ioctl$VT_RELDISP(r1, 0x5605) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000400)={{0x6, 0x6, 0x0, 0xffffffff, 'syz0\x00', 0x7f41}, 0x2, 0x3, 0x5, r2, 0x7, 0x4, 'syz1\x00', &(0x7f0000000380)=['em1@posix_acl_accesss-vboxnet0\x00', '/dev/vga_arbiter\x00', '\x00', '/dev/vga_arbiter\x00', '/dev/snd/seq\x00', 'em1cpusetposix_acl_access\x00', '\\self^$nodeveth0\x00'], 0x7a, [], [0x5, 0x0, 0x7, 0x6]}) close(r1) 12:25:54 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0xfffffffeffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x3) 12:25:54 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags}) 12:25:54 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 283.603874] FAULT_INJECTION: forcing a failure. [ 283.603874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.615733] CPU: 1 PID: 10136 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 283.624312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.633674] Call Trace: [ 283.636278] dump_stack+0x244/0x39d [ 283.639922] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.639944] ? find_get_entries_tag+0x1400/0x1400 [ 283.639973] should_fail.cold.4+0xa/0x17 [ 283.654064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.659178] ? print_usage_bug+0xc0/0xc0 [ 283.663294] ? mark_held_locks+0x130/0x130 [ 283.667548] ? graph_lock+0x270/0x270 [ 283.671373] ? graph_lock+0x270/0x270 [ 283.675178] ? print_usage_bug+0xc0/0xc0 [ 283.679254] ? __lock_acquire+0x62f/0x4c20 [ 283.683525] ? find_held_lock+0x36/0x1c0 [ 283.687600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.693141] ? should_fail+0x22d/0xd01 [ 283.697035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.702151] __alloc_pages_nodemask+0x34b/0xdd0 [ 283.706826] ? rcu_read_unlock_special+0x370/0x370 [ 283.711768] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 283.716835] ? find_held_lock+0x36/0x1c0 [ 283.720959] ? trace_hardirqs_off+0xb8/0x310 [ 283.725377] cache_grow_begin+0xa5/0x8c0 [ 283.729442] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.734992] ? check_preemption_disabled+0x48/0x280 [ 283.740027] kmem_cache_alloc+0x66b/0x730 [ 283.744185] getname_flags+0xd0/0x590 [ 283.747993] user_path_at_empty+0x2d/0x50 [ 283.752152] do_mount+0x180/0x1ff0 [ 283.755698] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 283.761264] ? rcu_pm_notify+0xc0/0xc0 [ 283.765158] ? copy_mount_string+0x40/0x40 [ 283.769405] ? copy_mount_options+0x5f/0x430 [ 283.773816] ? rcu_read_lock_sched_held+0x14f/0x180 [ 283.778843] ? kmem_cache_alloc_trace+0x353/0x750 [ 283.783692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.789260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.794802] ? copy_mount_options+0x315/0x430 [ 283.799316] ksys_mount+0x12d/0x140 [ 283.802955] __x64_sys_mount+0xbe/0x150 [ 283.806936] do_syscall_64+0x1b9/0x820 [ 283.810838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.816213] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.821160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.826009] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.831044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.836584] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.841621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.846474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.851681] RIP: 0033:0x459fda [ 283.854877] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 283.873780] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 283.881498] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 283.888767] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 283.896035] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 12:25:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d9, 0x0) 12:25:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x105801) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000200)=0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001240)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001340)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000001380)={r2, 0x1, 0x6, @dev={[], 0x1d}}, 0x10b) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x74, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x1, @mcast2, 0x4000000000}, @in6={0xa, 0x4e22, 0x10001, @mcast1, 0xcd}, @in6={0xa, 0x4e21, 0x8001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x800}, @in={0x2, 0x4e24, @rand_addr=0x81}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r3, 0x0, 0xa19, 0x18}, &(0x7f0000000380)=0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x1, 0x70, 0x7, 0x7, 0x3f44e7e3, 0x2f, 0x0, 0x9, 0x200, 0xe, 0x5e, 0x5, 0x4, 0x7, 0x5a, 0x0, 0x9, 0x4, 0x7, 0x1000, 0x3, 0x5, 0x3, 0x200f97ac, 0x35a, 0x75, 0x5, 0x1, 0x2, 0x81, 0x100000000, 0x2, 0xfffffffffffffffb, 0x6, 0x4, 0x100000000, 0x2, 0x7, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x2, 0x6, 0xffff, 0x2, 0x9, 0x1c6, 0x51}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x2, 0x451a, 0x8008, 0x1, 0x0, 0x100000000, 0x8, 0x3f, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x9, 0x1, 0x5, 0x9, 0x0, r4}, 0x20) close(r0) 12:25:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x200000000f, &(0x7f0000000040)=0x1ff, 0xa) listen(r0, 0x0) 12:25:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000140)) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x20000, 0x0) close(r1) [ 283.903307] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 283.910579] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 283.922458] gfs2: not a GFS2 filesystem 12:25:54 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x3ff, 0x10000000000009, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000040), 0x0, 0x2}, 0x20) 12:25:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0045878, 0x3) [ 284.106670] FAULT_INJECTION: forcing a failure. [ 284.106670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.118543] CPU: 0 PID: 10163 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 284.127127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.136488] Call Trace: [ 284.139092] dump_stack+0x244/0x39d [ 284.142740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 284.147964] ? find_get_entries_tag+0x1400/0x1400 12:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac14141d001414100100000007000000ffffffffe0000002ac141413ac14141fffffffff7f0000017f000001"], 0x2c) r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffb) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000080)={0x1ff, 0x80, 0x4, 0x2, 0x5}) close(r0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) [ 284.152829] should_fail.cold.4+0xa/0x17 [ 284.152850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.152867] ? print_usage_bug+0xc0/0xc0 [ 284.152899] ? mark_held_locks+0x130/0x130 [ 284.152914] ? graph_lock+0x270/0x270 [ 284.152928] ? graph_lock+0x270/0x270 [ 284.152943] ? print_usage_bug+0xc0/0xc0 [ 284.152959] ? __lock_acquire+0x62f/0x4c20 [ 284.152983] ? find_held_lock+0x36/0x1c0 [ 284.153007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.153021] ? should_fail+0x22d/0xd01 [ 284.153041] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:25:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d6, 0x0) [ 284.153066] __alloc_pages_nodemask+0x34b/0xdd0 [ 284.153081] ? rcu_read_unlock_special+0x370/0x370 [ 284.153101] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 284.153125] ? find_held_lock+0x36/0x1c0 [ 284.153259] ? perf_trace_clk_duty_cycle+0x218/0x880 [ 284.153295] ? trace_hardirqs_off+0xb8/0x310 [ 284.153316] cache_grow_begin+0xa5/0x8c0 [ 284.153342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.153358] ? check_preemption_disabled+0x48/0x280 [ 284.153381] kmem_cache_alloc+0x66b/0x730 [ 284.153397] ? find_held_lock+0x36/0x1c0 12:25:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x6200, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)={0x4, 0x2, 0x5}) [ 284.153418] getname_flags+0xd0/0x590 [ 284.162588] user_path_at_empty+0x2d/0x50 [ 284.162610] do_mount+0x180/0x1ff0 [ 284.162644] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 284.162661] ? rcu_pm_notify+0xc0/0xc0 [ 284.162680] ? copy_mount_string+0x40/0x40 [ 284.162700] ? copy_mount_options+0x5f/0x430 [ 284.215092] ? rcu_read_lock_sched_held+0x14f/0x180 [ 284.277352] ? kmem_cache_alloc_trace+0x353/0x750 [ 284.277375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.277394] ? _copy_from_user+0xdf/0x150 12:25:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xc4, 0x0, {"052c592ef6cbd842ac551d7732f7cd4c59a8075e628c92035532ef28261b814025a70e34e3047b4ae72a370be2ea21d3f0e667311a06bd1320a1f5a7b5d0472696e573f7da6a02c3385680c967d6a72475833bd6733b087c3653db16ac59dc2138d75d7f28b4748c86f3f007127123cfbb340acc948d28a93cdd779960ede785f4f69cde88b12a52a5ac6b03e8962c74c14f83cb57d1baa8cc0ac425a46ae891dbd241667672446a2d"}}, {0x0, "90c495951e52bc65e50ce224961cce67a966fb81b488c11bc59586086d89c65e8055d1b7c95ddcf026308b81d06d3e9f07eab7fd8ae201b184e5a103ec123f105dbfcd9d869dd5833a84adfce605ac188d3b16b6b52ecc184e3f5e414a0debbb"}}, 0x0, 0x126, 0x0, 0x7}, 0x20) [ 284.277415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.311126] ? copy_mount_options+0x315/0x430 [ 284.315639] ksys_mount+0x12d/0x140 [ 284.319281] __x64_sys_mount+0xbe/0x150 [ 284.319305] do_syscall_64+0x1b9/0x820 [ 284.319331] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.319351] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.337536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.342395] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.342418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.342435] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.342459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.342488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.358044] RIP: 0033:0x459fda [ 284.358062] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 284.358072] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 284.358088] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:25:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:55 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000018c0)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000080)=@generic={0x0, "906a7f1f11066ce54bb5a0ae4ccf53de5bf618728de2fecae06c7ed7074a692180a490970dda8e6169128a6f8f49a69363d9aa2f9dcc4d0372281ec6b05eb00cd179488f584ea291494331e33aaab0e1a51eeb5255883dbc415518dda2f24226dd598290c1ce9ae6e1e7aa8ea061168444dc3d2f498869b5ba217663ac66"}, 0x80, 0x0}, 0x0) [ 284.358098] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 284.358123] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 284.358137] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 284.390269] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9c1, 0x2980) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000040)={0x200}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x7, 0x1497fc) socket$netlink(0x10, 0x3, 0x1f) [ 284.478407] gfs2: not a GFS2 filesystem 12:25:55 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000001, 0x400000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x8000, 0x7, 0x53d, 0x8, r0, 0x10000}, 0x2c) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000040)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) 12:25:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454e0, 0x3) [ 284.553853] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! 12:25:55 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x801054db, 0x0) 12:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x10001, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @local, @multicast2}, &(0x7f00000002c0)=0xc) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x80040, 0x0) bind$xdp(r1, &(0x7f0000000340)={0x2c, 0x1, r2, 0x39, r3}, 0x10) 12:25:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) socket$kcm(0x10, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x3, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8084, 0xb400b2bc16037242, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfff, 0x6, 0x9, 0x0, 0x3, 0xa4e, 0x7, 0x0, 0xad36, 0x0, 0x4, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0xb56b, 0x0, @perf_bp={0x0, 0x1}, 0x8000, 0x10000, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 12:25:55 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200001, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x200) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) [ 284.753263] FAULT_INJECTION: forcing a failure. [ 284.753263] name failslab, interval 1, probability 0, space 0, times 0 [ 284.808553] CPU: 0 PID: 10217 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 284.817245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.817254] Call Trace: [ 284.817279] dump_stack+0x244/0x39d [ 284.817303] ? dump_stack_print_info.cold.1+0x20/0x20 [ 284.838054] ? filename_lookup+0x39a/0x520 [ 284.842313] ? user_path_at_empty+0x40/0x50 [ 284.846654] ? do_mount+0x180/0x1ff0 [ 284.850380] ? ksys_mount+0x12d/0x140 [ 284.854198] ? do_syscall_64+0x1b9/0x820 [ 284.858296] should_fail.cold.4+0xa/0x17 [ 284.862391] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.867508] ? mntput+0x74/0xa0 [ 284.870830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.876393] ? graph_lock+0x270/0x270 [ 284.880214] ? find_held_lock+0x36/0x1c0 [ 284.884317] ? perf_trace_sched_process_exec+0x860/0x860 [ 284.889815] ? lock_downgrade+0x900/0x900 [ 284.889840] __should_failslab+0x124/0x180 [ 284.889861] should_failslab+0x9/0x14 [ 284.889878] kmem_cache_alloc_trace+0x2d7/0x750 [ 284.889900] ? kasan_check_write+0x14/0x20 [ 284.889922] vfs_new_fs_context+0x5e/0x77c [ 284.915206] do_mount+0x1816/0x1ff0 [ 284.918873] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 284.924451] ? copy_mount_string+0x40/0x40 [ 284.924474] ? copy_mount_options+0x5f/0x430 [ 284.924494] ? kmem_cache_alloc_trace+0x353/0x750 [ 284.937960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.943521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.943538] ? copy_mount_options+0x315/0x430 [ 284.943558] ksys_mount+0x12d/0x140 [ 284.953576] __x64_sys_mount+0xbe/0x150 [ 284.953597] do_syscall_64+0x1b9/0x820 [ 284.953631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.953650] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.953664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.953682] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.953702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.965175] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.990817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.990844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.990860] RIP: 0033:0x459fda [ 285.000721] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 285.027999] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 285.028014] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 285.028024] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 285.028034] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 12:25:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x20000) close(r1) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ff, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:25:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 12:25:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="2b6370754f3570696473202d7de461637075202d63707520b95640b50d6cef85a371ebb3ff93f4cabe3d7f2dfc07451ee2eb7e518627b46c1fcce457e242826d0bc7e8a5147341b7fe121455e53b996a8586607fdfc371496fbb72266d97d09c81503b85278052fb5eafde7eee8dc6ebaf8243d7413f95949a2f9d0290"], 0x15) close(r1) 12:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x40) close(r0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xd) [ 285.028043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 285.028052] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 12:25:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x3) 12:25:55 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000080)={0x5, 0x9, 0x40, 0x3, 0x2}) r2 = dup2(r0, r0) close(r2) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x1) close(r0) 12:25:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5452, 0x0) 12:25:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 12:25:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000100)={0x15, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000140)=""/213) [ 285.344127] FAULT_INJECTION: forcing a failure. [ 285.344127] name failslab, interval 1, probability 0, space 0, times 0 [ 285.400791] CPU: 1 PID: 10260 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 285.409439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.418799] Call Trace: [ 285.421411] dump_stack+0x244/0x39d [ 285.425056] ? dump_stack_print_info.cold.1+0x20/0x20 [ 285.430269] ? is_bpf_text_address+0xd3/0x170 [ 285.434780] should_fail.cold.4+0xa/0x17 [ 285.438847] ? __save_stack_trace+0x8d/0xf0 [ 285.443173] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.448289] ? save_stack+0xa9/0xd0 [ 285.451928] ? kasan_kmalloc+0xc7/0xe0 [ 285.455814] ? kmem_cache_alloc_trace+0x152/0x750 [ 285.460676] ? legacy_init_fs_context+0x187/0x230 [ 285.465523] ? vfs_new_fs_context+0x3f4/0x77c [ 285.470023] ? do_mount+0x1816/0x1ff0 [ 285.473843] ? ksys_mount+0x12d/0x140 [ 285.477648] ? __x64_sys_mount+0xbe/0x150 [ 285.481798] ? do_syscall_64+0x1b9/0x820 [ 285.485868] ? find_held_lock+0x36/0x1c0 [ 285.489941] ? xfs_reflink_trim_around_shared+0x78/0x950 [ 285.495403] ? check_preemption_disabled+0x48/0x280 [ 285.500423] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.505883] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.511429] __should_failslab+0x124/0x180 [ 285.515672] should_failslab+0x9/0x14 [ 285.519478] kmem_cache_alloc_trace+0x2d7/0x750 [ 285.524150] ? legacy_init_fs_context+0x187/0x230 [ 285.528997] ? rcu_read_lock_sched_held+0x14f/0x180 [ 285.534014] ? kmem_cache_alloc_trace+0x353/0x750 [ 285.538876] ? rcu_read_lock_sched_held+0x14f/0x180 [ 285.543904] apparmor_fs_context_alloc+0x43/0xa0 [ 285.548685] security_fs_context_alloc+0x54/0xb0 [ 285.553452] vfs_new_fs_context+0x446/0x77c [ 285.557782] do_mount+0x1816/0x1ff0 [ 285.561415] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.566973] ? copy_mount_string+0x40/0x40 [ 285.571216] ? copy_mount_options+0x5f/0x430 [ 285.575639] ? kmem_cache_alloc_trace+0x353/0x750 [ 285.580518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.586273] ? copy_mount_options+0x315/0x430 [ 285.590782] ksys_mount+0x12d/0x140 [ 285.594415] __x64_sys_mount+0xbe/0x150 [ 285.598400] do_syscall_64+0x1b9/0x820 [ 285.602297] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.607678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.612610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.617457] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.622484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.628022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.633048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.637904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.643093] RIP: 0033:0x459fda [ 285.646295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 285.665194] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 285.672912] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 285.680195] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 285.687531] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 285.694857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 285.702173] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000300)) close(r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x68, 0x2840) write$P9_RMKNOD(r2, &(0x7f00000003c0)={0x14, 0x13, 0x2, {0x80, 0x4, 0x8}}, 0x14) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x3, 0x3, 0x3, 0x7}, 0x2, 0x0, 0x7ff}) fcntl$getflags(r3, 0xb) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="020200082e0000002abd7000ffdbdf2502000100000004d600ff790400d1028bc40000400800120001000300bd6b6e0071c5eebd336c4fab3b870aa0b3ff0101000006007f00000100000600000000000000fe8000000000000000000000000000bbe000000100000000000000000000000005001a00ac140000000000000000000000000000000108001404180018000300b100e72e8af9c08e948f436b947d3a2a1336c17b7d3a8346d46e335fc3bf32b6d07e67b3ce6cfd0583090adc1bcc25d673ee52c2260bcc705229c116f6e69f927a0cec365d437caea88dda44213302ce92e4e4def88a65933b5fda1f4f938527f148bf3108fecce716915d1f2b398fb4bc00f5fd10830ccf60615b30c889bd7f698a34b0df35080000000000000077a138bfb199b2a3b9f29e502091e09673b1475f9545786bf3b19a872816937bb2eb4f95200eb5bdd00d5614de945c24799c524000000000dfff0005001a00fe8000000000000000000000000000bb000000000000000000000000000000000000008941449d63c040e39b54ef3d9b03af27fb19d32d7c4a54416e9da5b8196d4c242096865cadaf04ed75bcaa8ab9afb31b0a54de839cb50b6f1401030ebe37e5797810c08338cb24b2c23c063edaf394e9aa707965e62cffc1bcc2cd888e91116a017a607f017d12c556751407e8665307f6a9ba7aeaa2c4f9e9a70f8692541a726dca1697b8193d93c1acbe7a893b74183412b8f557b2c12c5efa72204c554759e026e96581b6b8c6eeff341f7c3cbd230b9ec08c5c5d55394d8b43e3c1fb161f56f77021a42434866556fbb3d5671754377a5acfa16bfd6e4cf9ad6b24b8a6b315f1792a57222920174b00000000000000000000000000000000"], 0x170}}, 0x20000001) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000002c0)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000340)=0x5073, 0x4) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, 0xc00, 0x101, 0x400, 0x4, 0x4, 0xf4, 0x4, 0x3, 0x4}) 12:25:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 12:25:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x6) 12:25:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454cf, 0x0) 12:25:56 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet6_int(r1, 0x29, 0x7f, &(0x7f00000000c0), &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 12:25:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) unlink(&(0x7f0000000300)='./file0\x00') [ 285.999037] FAULT_INJECTION: forcing a failure. [ 285.999037] name failslab, interval 1, probability 0, space 0, times 0 [ 286.025707] CPU: 1 PID: 10295 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 286.034315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.034322] Call Trace: [ 286.034348] dump_stack+0x244/0x39d [ 286.034373] ? dump_stack_print_info.cold.1+0x20/0x20 [ 286.034405] should_fail.cold.4+0xa/0x17 [ 286.059293] ? unwind_get_return_address+0x61/0xa0 [ 286.064239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.069378] ? save_stack+0x43/0xd0 [ 286.073011] ? kasan_kmalloc+0xc7/0xe0 [ 286.076931] ? kmem_cache_alloc_trace+0x152/0x750 [ 286.081815] ? apparmor_fs_context_alloc+0x43/0xa0 [ 286.086755] ? security_fs_context_alloc+0x54/0xb0 [ 286.091691] ? find_held_lock+0x36/0x1c0 [ 286.095801] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.101258] ? check_preemption_disabled+0x48/0x280 [ 286.106291] __should_failslab+0x124/0x180 [ 286.110534] should_failslab+0x9/0x14 [ 286.114432] __kmalloc_track_caller+0x2d1/0x760 [ 286.119232] ? __bpf_trace_module_free+0x10/0x10 [ 286.124000] ? apparmor_fs_context_alloc+0x43/0xa0 [ 286.128933] ? rcu_read_lock_sched_held+0x14f/0x180 [ 286.133953] ? vfs_parse_fs_string+0x191/0x2b0 [ 286.138545] kmemdup_nul+0x31/0xa0 [ 286.142100] vfs_parse_fs_string+0x191/0x2b0 [ 286.146513] ? vfs_parse_fs_param+0x4d0/0x4d0 [ 286.151029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.156576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.162124] do_mount+0x773/0x1ff0 [ 286.165689] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.171244] ? copy_mount_string+0x40/0x40 [ 286.175493] ? copy_mount_options+0x5f/0x430 [ 286.179906] ? kmem_cache_alloc_trace+0x353/0x750 [ 286.184752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.190298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.195843] ? copy_mount_options+0x315/0x430 [ 286.200353] ksys_mount+0x12d/0x140 [ 286.203989] __x64_sys_mount+0xbe/0x150 [ 286.207972] do_syscall_64+0x1b9/0x820 [ 286.211868] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.217275] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.222208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.227063] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.232087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.237630] ? prepare_exit_to_usermode+0x291/0x3b0 [ 286.242671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.247525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.252716] RIP: 0033:0x459fda [ 286.255927] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 286.274830] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 286.282541] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 286.289808] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 12:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0xfff, 0x4) [ 286.297080] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 286.304353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 286.311622] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x4000000000089f4, &(0x7f0000000000)={"736974300000000400", @ifru_data=&(0x7f0000000040)="7f09fc6cad2a1535ad9c46b282f7d04684b00ad0c202555b9a3fe7530f915fde"}) 12:25:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x25) 12:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x86, 0x20000) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), 0x4) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:25:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5460, 0x0) 12:25:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbd7e, 0x7, &(0x7f0000000480)=[{&(0x7f0000000140)="11cd39c9933211f787da8878d9a605963ef985d4f0daaee31af119438f9dd97bbfbe7f34fe640ffe256685de408d520bc907a320003ee3ede331729dfa7b322868bcb3b4fe2ab71d654cd23df26bb8517226c07b8e73c6a5bdeee6bc1f2de9f9979674903dd6d6d9822b3a8e98064df66f2d56a784dd4a6a311636fa97f7179c36157ff79563ca8bbcfdfb11f4b8bbde5379c0cb149b8f8fb84e5cb0e805ee6ae193337938f0f63c22323e0e55ca79ebcd7d007a6cf37cad33a0a9a04df656e301890168c65b8f0c0a37372ea4795a4baeb12ec83dc95337", 0xd8, 0x7fffffff}, {&(0x7f0000000080)="7865d3ef36e332a1433f6f8f513ec6dae032", 0x12, 0x3}, {&(0x7f0000000240)="7af5e39dfc346fc64e166457476a5bd5dfed55f0326d9749b3b242a4f2943052fe3b3a15ac44703173d1d429da05164bbf7226bba24412405269df6edd75e45166469b035adb9a5b190d217b9e62ee614338f36f903911cf0fbaaba7e531080810cb27997b3fe3c64133e959895e5dd72c7a7ecceb6382d20a8cc4508fcb3134ed66ed92786d42c575b088abc7afece8cffd", 0x92, 0x3ff}, {&(0x7f00000000c0)='3$', 0x2, 0x8}, {&(0x7f0000000300)="fb9e9f4f90e0210c0cb133dc82e2153e01a23f49ab88b1b34ac6dd8e2fac5b4f78e4108524b3905d6da70455c9c9b7982a3ef3aa7f98a3063d459d2e0208368a5b7b6c8e588ee60792e45f4d982ccdbc5462698cf5ac943e91d1f401f07d0e36fe89c486b9418986ca6873791b667a4a724188ece3e80094fa84ded8a857bddc", 0x80, 0x5850}, {&(0x7f0000000380)="679028bbe78c20fa1d2690e1d94dd3f0446d730b347c1529dfd709e1bc16bfebecbf479845b9", 0x26, 0x8001}, {&(0x7f00000003c0)="376ca232665248a2064a99a3ecbc9f6d0c9080e9712d2fb938689b310d973ca44f771abc175747ab21020708f1d44fb432b6132ef3409d4274e5e676ee6b99abe15f85c9781bbf94f3cd28d0cdb95189a3ba5745a118d16dc560ca1f54e8b1c9a01998a20ffe389938b3d9e95f888dcdf2171cc7b3a845e812672da991dac89fbd3b5061c1cf35615372a114fb6d91f9429940f7c0f169aff42d5a6d2976974a33bbfe8032bc2735f69d062e9d8b7ab404321046488722cb07c400253406", 0xbe, 0x9}], 0x84, &(0x7f0000000540)={[{@errors_remount='errors=remount-ro'}, {@discard_size={'discard', 0x3d, 0x1000}}], [{@context={'context', 0x3d, 'staff_u'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 12:25:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) [ 286.634364] JFS: discard option not supported on device [ 286.640537] jfs: Unrecognized mount option "context=staff_u" or missing value 12:25:57 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 286.709494] JFS: discard option not supported on device [ 286.727073] jfs: Unrecognized mount option "context=staff_u" or missing value 12:25:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) r3 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0xa0, 0x0, &(0x7f0000000180)=[@acquire_done={0x40106309, r2}, @request_death={0x400c630e, 0x4, 0x3}, @decrefs={0x40046307, 0x3}, @acquire_done={0x40106309, r3, 0x3}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18, &(0x7f0000000100)=[@flat={0x776a2a85, 0xa, r4, 0x3}, @ptr={0x70742a85, 0x0, &(0x7f00000000c0), 0x1, 0x4, 0x34}], &(0x7f0000000140)=[0x0, 0x38, 0x60]}, 0xafd1}}, @enter_looper, @request_death={0x400c630e, 0x2, 0x3}], 0x94, 0x0, &(0x7f0000000280)="3954cb7f62ae13a2f10ab25f40b36d8f5396d7c1eee9cc0d3d32fb4adfe3459051a1443b17dfee2c4fa2ce836a63099610fae3add08dca0983c8c4bae4cd7bb29bc75e518b6a40b1eee06b016383045df5cf3d5d1e92ef0108247cf5484e01965a73f7b24e1d067f9beab956f50b0a12fe4ad6d8d6dd0627c1f62afd7f750b341dff7929cf90af20937eb7ceedcf2cfcc351d0a8"}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d8, 0x0) [ 286.827846] FAULT_INJECTION: forcing a failure. [ 286.827846] name failslab, interval 1, probability 0, space 0, times 0 [ 286.842593] CPU: 0 PID: 10356 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 286.851190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.860553] Call Trace: [ 286.863187] dump_stack+0x244/0x39d [ 286.866849] ? dump_stack_print_info.cold.1+0x20/0x20 [ 286.872052] should_fail.cold.4+0xa/0x17 [ 286.876120] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.881234] ? kernel_text_address+0x79/0xf0 [ 286.885645] ? __kernel_text_address+0xd/0x40 [ 286.890281] ? __save_stack_trace+0x8d/0xf0 [ 286.894621] ? find_held_lock+0x36/0x1c0 [ 286.898698] ? find_held_lock+0x36/0x1c0 [ 286.902765] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.908250] __should_failslab+0x124/0x180 [ 286.912491] should_failslab+0x9/0x14 [ 286.916295] __kmalloc_track_caller+0x2d1/0x760 [ 286.920969] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.926535] ? rcu_pm_notify+0xc0/0xc0 [ 286.930438] ? apparmor_fs_context_parse_param+0x1d9/0x490 [ 286.936067] krealloc+0x65/0xb0 [ 286.939351] apparmor_fs_context_parse_param+0x1d9/0x490 [ 286.944807] security_fs_context_parse_param+0x5a/0xb0 [ 286.950102] vfs_parse_fs_param+0x1ea/0x4d0 [ 286.954424] vfs_parse_fs_string+0x1d5/0x2b0 [ 286.958846] ? vfs_parse_fs_param+0x4d0/0x4d0 [ 286.963354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.968893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.974440] do_mount+0x773/0x1ff0 [ 286.977979] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.983520] ? copy_mount_string+0x40/0x40 [ 286.987772] ? copy_mount_options+0x5f/0x430 [ 286.992181] ? kmem_cache_alloc_trace+0x353/0x750 [ 286.997041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.002577] ? _copy_from_user+0xdf/0x150 [ 287.006726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.012262] ? copy_mount_options+0x315/0x430 [ 287.016780] ksys_mount+0x12d/0x140 [ 287.020416] __x64_sys_mount+0xbe/0x150 [ 287.024395] do_syscall_64+0x1b9/0x820 [ 287.028300] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.033676] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.038606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.043456] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.048475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.054011] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.059074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.063961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.069148] RIP: 0033:0x459fda [ 287.072346] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 287.091263] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 287.098969] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 287.106273] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 287.113553] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 287.120818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1001}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x3}}, 0x18) close(r0) [ 287.128082] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket(0x400000000000a, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth1_to_bond\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000200fe8000000000000000000000000000aa"], 0x1}}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:25:57 executing program 3: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1b, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000006000000000000000400000003a90100ff0300009500000009000000"], &(0x7f00000000c0)='GPL\x00', 0xfff, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0x5}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x80) recvmsg(0xffffffffffffff9c, &(0x7f0000001900)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/34, 0x22}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/2, 0x2}, {&(0x7f0000001340)=""/235, 0xeb}, {&(0x7f0000001440)=""/187, 0xbb}, {&(0x7f0000001500)=""/233, 0xe9}, {&(0x7f0000001600)=""/182, 0xb6}, {&(0x7f00000016c0)=""/13, 0xd}, {&(0x7f0000001700)=""/25, 0x19}], 0x9, &(0x7f0000001800)=""/218, 0xda, 0x80}, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000001940)={0x7fffffff, 0x100000000, 0x6, 0x0, 0x0, [{r1, 0x0, 0x6}, {r2, 0x0, 0x7}, {r3, 0x0, 0x5}, {r4, 0x0, 0x7}, {r5, 0x0, 0x6}, {r6, 0x0, 0x9}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r7) 12:25:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x8) 12:25:57 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x48000) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x2, 0xffffffff, 0x1f, 0x9, 0x2, 0x101b, 0x101}) 12:25:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x400000000000a, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) 12:25:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x4020940d, 0x0) 12:25:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x101001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r1, 0x100000000}}, 0x10) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) 12:25:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) signalfd(r0, &(0x7f0000000000)={0x9}, 0x8) 12:25:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x62, 0xa, 0xff00}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2"}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r1}, 0x10) [ 287.571710] FAULT_INJECTION: forcing a failure. [ 287.571710] name failslab, interval 1, probability 0, space 0, times 0 [ 287.630867] CPU: 1 PID: 10401 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 287.639469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.648835] Call Trace: [ 287.651443] dump_stack+0x244/0x39d [ 287.655085] ? dump_stack_print_info.cold.1+0x20/0x20 [ 287.655104] ? __x64_sys_mount+0xbe/0x150 [ 287.655121] ? do_syscall_64+0x1b9/0x820 [ 287.655139] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.655161] should_fail.cold.4+0xa/0x17 [ 287.677967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.683098] ? check_preemption_disabled+0x48/0x280 [ 287.688144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.693709] ? check_preemption_disabled+0x48/0x280 [ 287.698745] ? find_held_lock+0x36/0x1c0 [ 287.702847] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.708310] ? rcu_pm_notify+0xc0/0xc0 [ 287.712234] __should_failslab+0x124/0x180 [ 287.716990] should_failslab+0x9/0x14 [ 287.720840] __kmalloc_track_caller+0x2d1/0x760 [ 287.725535] ? vfs_parse_fs_string+0x1fd/0x2b0 12:25:58 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x208080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000180)="ed064fd42515a4481fc4791395ce9f78bb8f09fe850e7c7a3528ca27b59e14bf345f667fa125b7e2e851584233df6b95c16c32512b779083a2ad3853d2e6d201870f221e4b22f7af80d53f33bf1d3cd72c939421bf96424497f972a4c9245026fb8d3b2b8e0d86535796fff007aec133c3d4bfddae9d5a1521476ae66dcc5ced56d602151bacacae6d42516d3b6d17d3074e9973eaf5bdb793117737503387a28b3f6cbe113c1c49a8ba8d975d83f575f3cfc639c27d4ca48d8e3520c6df95f4ebc091cd53a968102b4b05f4ae58fecc81ab5b1afda7748f1720f7ea139df7ad0fd5901ed038a04bb5839687bb88ab6eb7a784bd734c3172", &(0x7f0000000280)="75150d714af76f8a6d94fd0621ed036b140d55b153b782f91cfdf5e25d9aa967336bdb6fb84a295569c8a562652cffc8e4c058ae12f7cd981a588b84406fb5436f5ffb9213dba97e997fd4096a4b416a73a433a7a137e86295bf5f1e65417918d873b7de2d40db88c17c2dc0b8dbe22c2ea249570c4d3083d832bdaa11ce0b9a31004df64856", 0x3}, 0x20) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x2, &(0x7f00000000c0)=0x1000}) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) 12:25:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) sendmsg(r1, &(0x7f0000002580)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x3ff, @local, 0x4}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)="6e14f855796d1c2683c0de1c4ea67b978c61961516d8ef53e0e7e002b6ce9c161eb0c03c59409388e808", 0x2a}, {&(0x7f0000000140)="fc00660b1192f8295ac3ffbcbdaa1f73c43fc0662f0d17609bef94f0751090ab878ebaa888e6fda4d16e9549f43c1bb9eaba8b0fff5e5cfc7c1e41ab3b9f9577d7c7a975b239db5af6c473942db622ed6955bf29635806b1352961f400c9f6abdc2b95a786bd87aa63a83e29bb8cada7", 0x70}, {&(0x7f00000001c0)="bd49da0dd0f8a7f6e0a50ae2ccb6088b6bb3af25fde99f9262264ece116be3b8b488e007fb6e58750d8173216cd2d8b23c3ee8ecae617570118ea5bf85af5f6bc38fbc7438116a92cb3c8d0c940ae0d43fae5567d9367b5a775388d96c0b8e0b142f2873bf6467f57405e04e685f561b00702a1402251c8a69d52e1a8a667a83e526d4800ad48f8265571f30363d7127558a6ed27875893c4276", 0x9a}, {&(0x7f0000000280)="6671f435d14b557676ff518ef1de70fe08b82a80f7fd61c1c9ab1bdff669bfe8a9540f6503a2e3a4", 0x28}, {&(0x7f00000002c0)="b641df4fb8b197c9619f1e2f949dc8d3c442c25a1e23467f50f970ac278c694d161aa3cc305fb44d2eb3d1ec04b85716655f14d64c5c30e317a1a3bb7d8dc143e891eef88917cb7ac312b3a3b3325dd4f5a989ca3a7bc9005803ce08b0822a0e48a696adc9a47fbf62322260dc04d9a3b677f4175514730f9a9ed3a84ccdc7b6e929671876", 0x85}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="1a01b08f0be16621e67be37953bacb11f15e2cd16c", 0x15}], 0x7, &(0x7f0000001440)=[{0x1010, 0x0, 0x8, "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"}, {0x30, 0x1, 0x3f, "82338e15e334caad0518ffb84eebfa8821972dae06cefab97dc6"}, {0xd0, 0x84, 0xa000000, "9df7a75300bf2871a01457966550ed94707a8f5e0cc8672949dee5a3a4d0a2b4f4c459296ff5854286c8ad32223dbf1541e91b341dd736a4cbc8f912500dec41ba6a99164335c73886eea7790e663da9b9d87c6e07234ca07709538ab76971b171c890464d05738b05749a1c3b02f3574d7b4dbcc8bbdf0d4840412720b0d635b815d5b22dc97425a4de56c39ee4338aac204026841271db3c776a80078a4e812422370fea3c9d1397225bfcf5469021743ae300433cb193d9c9b2d48d7152"}, {0x30, 0x197, 0xe9, "6f3076a41911f18d92fc4073d44635f59b42a3e1df6de24944976ef96c5a"}], 0x1140, 0x8000}, 0x20000000) close(r0) r2 = syz_open_dev$audion(&(0x7f00000025c0)='/dev/audio#\x00', 0x9, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000002600)={0x0, 0x0, 0x80000001, 0x40, 0x9, 0x400}) prctl$PR_GET_FP_MODE(0x2e) r3 = fcntl$getown(r1, 0x9) ptrace$peekuser(0x3, r3, 0x7) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 287.730133] ? legacy_parse_monolithic+0xde/0x1e0 [ 287.734991] kmemdup+0x24/0x50 [ 287.738198] legacy_parse_monolithic+0xde/0x1e0 [ 287.742891] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 287.747691] do_mount+0x803/0x1ff0 [ 287.751255] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 287.756804] ? copy_mount_string+0x40/0x40 [ 287.761051] ? copy_mount_options+0x5f/0x430 [ 287.765470] ? kmem_cache_alloc_trace+0x353/0x750 [ 287.770320] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.775876] ? _copy_from_user+0xdf/0x150 [ 287.780032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.785588] ? copy_mount_options+0x315/0x430 [ 287.790108] ksys_mount+0x12d/0x140 [ 287.793744] __x64_sys_mount+0xbe/0x150 [ 287.797749] do_syscall_64+0x1b9/0x820 [ 287.801659] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.807028] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.811958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.816815] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.821864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.827404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.832427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.837280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.842471] RIP: 0033:0x459fda [ 287.845664] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 287.864608] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 287.872362] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x3, 0xe, 0x1ff) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 287.879644] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 287.886916] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 287.894182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 287.901450] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xcb4, 0x200) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000280)=""/101) r2 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r3, 0x0, 0x9, 0x8000, 0xfffffffffffffffe, 0xfffffffffffffffd}, &(0x7f0000000180)=0x14) chdir(&(0x7f0000000240)='./file0\x00') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:25:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454dc, 0x0) 12:25:58 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xc1ed, 0xffffffff, 0x22ba, 0x0, 0x0, 0x8, 0x4100, 0xc, 0x3, 0x800, 0x8, 0x10000, 0x8, 0x8, 0x7ff, 0x7fffffff, 0x300000000000000, 0x100000000, 0x6, 0x7, 0x40, 0xa0c, 0xfffffffffffff54c, 0x60, 0x5, 0x800, 0x1, 0x6, 0x8, 0x253, 0xfffffffffffffff7, 0x7fffffff, 0x3f, 0x0, 0xa, 0x5, 0x0, 0x2, 0x2, @perf_config_ext={0x13, 0x1}, 0x2, 0x100000000, 0x3, 0x0, 0x3f, 0x4, 0x100000000000000}, r1, 0x10, r0, 0x1) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x22100) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) close(r2) 12:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x24740) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x9f}, 0x8, 0x5, 0x1}) 12:25:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000240)=0x5, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x800, @loopback}, 0x1c) 12:25:58 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x3ff}, 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x15, 0x0, 0x8, {0x400}}, 0xfffffecd) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000140)=0x2) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) [ 288.201919] FAULT_INJECTION: forcing a failure. [ 288.201919] name failslab, interval 1, probability 0, space 0, times 0 [ 288.231935] CPU: 0 PID: 10454 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 288.240546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.249902] Call Trace: [ 288.249934] dump_stack+0x244/0x39d [ 288.249959] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.249984] ? mark_held_locks+0x130/0x130 [ 288.265608] should_fail.cold.4+0xa/0x17 [ 288.269672] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 288.275383] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.280508] ? is_bpf_text_address+0xac/0x170 [ 288.285013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.290560] ? find_held_lock+0x36/0x1c0 [ 288.294648] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.300112] __should_failslab+0x124/0x180 [ 288.304359] should_failslab+0x9/0x14 [ 288.308161] kmem_cache_alloc+0x2be/0x730 [ 288.312335] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.317889] ? rcu_pm_notify+0xc0/0xc0 [ 288.321780] getname_kernel+0x54/0x370 [ 288.325683] kern_path+0x1e/0x40 [ 288.329051] lookup_bdev+0x10c/0x250 [ 288.332766] ? blkdev_open+0x280/0x280 [ 288.336657] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 288.341695] blkdev_get_by_path+0x1f/0xe0 [ 288.345899] gfs2_mount+0xc0/0x712 [ 288.349448] ? check_preemption_disabled+0x48/0x280 [ 288.354469] ? fill_super+0x1a10/0x1a10 [ 288.358452] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.364011] ? rcu_pm_notify+0xc0/0xc0 [ 288.367912] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.373486] ? alloc_pages_current+0x17b/0x350 [ 288.378092] ? fill_super+0x1a10/0x1a10 [ 288.382071] legacy_get_tree+0x12f/0x260 [ 288.386135] ? security_fs_context_validate+0x80/0xa0 [ 288.391337] vfs_get_tree+0x1cb/0x5c0 [ 288.395139] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 288.399898] do_mount+0x82a/0x1ff0 [ 288.403443] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.408989] ? copy_mount_string+0x40/0x40 [ 288.413242] ? copy_mount_options+0x5f/0x430 [ 288.417656] ? kmem_cache_alloc_trace+0x353/0x750 [ 288.422507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.428046] ? _copy_from_user+0xdf/0x150 [ 288.432199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.437773] ? copy_mount_options+0x315/0x430 [ 288.442277] ksys_mount+0x12d/0x140 [ 288.445976] __x64_sys_mount+0xbe/0x150 [ 288.449985] do_syscall_64+0x1b9/0x820 [ 288.453898] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.459265] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.464197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.469051] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.474075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.479616] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.484641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.489499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.494693] RIP: 0033:0x459fda [ 288.497911] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 288.516810] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 288.524521] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 288.531820] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 288.539088] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 288.546355] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:25:59 executing program 4: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) utime(0x0, &(0x7f0000000040)) 12:25:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xc0000, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x1, {{0xa, 0x4e24, 0x200001e, @ipv4={[], [], @local}, 0xc8}}, {{0xa, 0x4e22, 0x80000000, @local, 0x9}}}, 0x480) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) r3 = fcntl$dupfd(r0, 0x406, r2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0xfffffffffffffd17) close(r2) 12:25:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x894c, 0x0) [ 288.553623] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x622ec88eed40f253, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'ip_vti0\x00', 0x3}) shutdown(r1, 0x1) 12:25:59 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000240)=0x0) r3 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, &(0x7f0000000180)=0x8) io_submit(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000100)}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r5) 12:25:59 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, 0x0, 0x400) sendfile(r2, r2, 0x0, 0x400bf99) [ 288.788591] FAULT_INJECTION: forcing a failure. [ 288.788591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.816928] CPU: 0 PID: 10481 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 288.825523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.834911] Call Trace: [ 288.837507] dump_stack+0x244/0x39d [ 288.841170] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.846416] should_fail.cold.4+0xa/0x17 [ 288.850501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.855620] ? kasan_check_read+0x11/0x20 [ 288.859771] ? graph_lock+0x270/0x270 [ 288.863588] ? rcu_read_unlock_special+0x370/0x370 [ 288.868514] ? rcu_softirq_qs+0x20/0x20 [ 288.872486] ? unwind_dump+0x190/0x190 [ 288.876386] ? find_held_lock+0x36/0x1c0 [ 288.880501] ? lock_release+0xa10/0xa10 [ 288.884475] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.889937] ? save_stack+0xa9/0xd0 [ 288.893572] ? __might_sleep+0x95/0x190 [ 288.897557] __alloc_pages_nodemask+0x34b/0xdd0 [ 288.902245] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 288.907271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.912808] ? check_preemption_disabled+0x48/0x280 [ 288.917832] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.923371] ? rcu_pm_notify+0xc0/0xc0 [ 288.927284] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.932827] alloc_pages_current+0x173/0x350 [ 288.937244] get_zeroed_page+0x14/0x50 [ 288.941131] legacy_validate+0x133/0x220 [ 288.945194] ? logfc+0x770/0x770 [ 288.948574] vfs_get_tree+0x144/0x5c0 [ 288.952393] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 288.957155] do_mount+0x82a/0x1ff0 [ 288.960699] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.966253] ? copy_mount_string+0x40/0x40 [ 288.970517] ? copy_mount_options+0x5f/0x430 [ 288.974960] ? kmem_cache_alloc_trace+0x353/0x750 [ 288.979804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.985373] ? _copy_from_user+0xdf/0x150 [ 288.989527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.995068] ? copy_mount_options+0x315/0x430 [ 288.999604] ksys_mount+0x12d/0x140 [ 289.003242] __x64_sys_mount+0xbe/0x150 [ 289.007228] do_syscall_64+0x1b9/0x820 [ 289.011118] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.016485] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.021414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.026282] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.031304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.036846] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.041874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.046743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.051932] RIP: 0033:0x459fda [ 289.055128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 289.074025] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 289.081733] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:25:59 executing program 0: socketpair(0xa, 0x80000, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 289.089012] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 289.096276] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 289.103555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 289.110822] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:25:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc020660b, 0x0) 12:25:59 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:25:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:25:59 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x20, 0x0, 0x7}}, 0x14) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[0x0, 0xee01, 0xffffffffffffffff]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x76, 0x7d, 0x2, {{0x0, 0x54, 0xff, 0x1f, {0x40, 0x3, 0x3}, 0x20000000, 0x0, 0x9, 0xf4a1, 0x10, "00ac730000000000ec973f820f7c4000", 0x0, "", 0x10, "00ac730000000000ec973f820f7c4000", 0x1, '\\'}, 0xd, '/dev/net/tun\x00', r1, r2, r3}}, 0x76) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x3) 12:25:59 executing program 4: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r0 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000180)=""/4096) [ 289.307258] FAULT_INJECTION: forcing a failure. [ 289.307258] name failslab, interval 1, probability 0, space 0, times 0 [ 289.381019] CPU: 1 PID: 10510 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 289.389650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.399010] Call Trace: [ 289.401611] dump_stack+0x244/0x39d [ 289.405272] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.410486] ? __x64_sys_mount+0xbe/0x150 [ 289.414657] ? do_syscall_64+0x1b9/0x820 [ 289.418753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.424131] should_fail.cold.4+0xa/0x17 [ 289.428200] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.433321] ? check_preemption_disabled+0x48/0x280 [ 289.438366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.443932] ? check_preemption_disabled+0x48/0x280 [ 289.448958] ? find_held_lock+0x36/0x1c0 [ 289.453038] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.458489] ? rcu_pm_notify+0xc0/0xc0 [ 289.462389] __should_failslab+0x124/0x180 [ 289.466629] should_failslab+0x9/0x14 [ 289.470438] __kmalloc_track_caller+0x2d1/0x760 [ 289.475115] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 289.479701] ? legacy_parse_monolithic+0xde/0x1e0 [ 289.484550] kmemdup+0x24/0x50 [ 289.487744] legacy_parse_monolithic+0xde/0x1e0 [ 289.492417] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 289.497190] do_mount+0x803/0x1ff0 [ 289.500759] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.506333] ? copy_mount_string+0x40/0x40 [ 289.510595] ? copy_mount_options+0x5f/0x430 [ 289.515004] ? kmem_cache_alloc_trace+0x353/0x750 [ 289.519870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.525448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.530987] ? copy_mount_options+0x315/0x430 [ 289.535492] ksys_mount+0x12d/0x140 [ 289.539173] __x64_sys_mount+0xbe/0x150 [ 289.543167] do_syscall_64+0x1b9/0x820 [ 289.547061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.552434] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.557372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.562271] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.567294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.572838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.577868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.582874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.588069] RIP: 0033:0x459fda [ 289.591265] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 289.610166] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 289.617874] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 289.625139] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 12:26:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x8924, 0x0) [ 289.632412] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 289.639716] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 289.646998] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 12:26:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x1, 0x0, 0x6}, 0x10001}}, 0x18) 12:26:00 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = accept4(r0, &(0x7f00000002c0)=@ethernet, &(0x7f0000000340)=0x80, 0x80800) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)={@empty, @loopback, 0x1, 0x3, [@dev={0xac, 0x14, 0x14, 0x13}, @local, @empty]}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp6\x00') connect$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x3, @empty}}, 0x1e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xce58) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000240)={0xfffffffffffffff8, 0x4, 0x3, 0x545, &(0x7f0000000140)=[{}, {}, {}, {}]}) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000000)={0x80000, 0x0, [0x1, 0x8, 0x3, 0x100000000, 0x6, 0x1, 0x7, 0x1]}) 12:26:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername(r0, 0x0, &(0x7f0000000140)) 12:26:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) r3 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r5) 12:26:00 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwrite64(r1, &(0x7f0000000580)="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", 0x200, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) write(r0, &(0x7f0000000280)="555d7ff6dc7092e7fdd4046624c5a89a3d25157f50eb8e4bc6a32c7e89a2c18a60a850e34f313240e481eee5cbe0c52ede99749be6dd69c902cd28a4b1e5e970c910d23e2466cea4dd3bb9188fd1775a4d08d4a499562c3b18621202e398eb873d4ba71245ae200d2b186f492fe0784b7bd090536de2cb56ee898d579b9fa68d281bd4b69e37643d5cff391bb41a1222a080ccd389e7cd754746432e8ca0af", 0x9f) fcntl$setstatus(r1, 0x4, 0x4401) io_setup(0x9, &(0x7f0000000040)=0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x4) io_submit(r2, 0x33, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) io_setup(0x4, &(0x7f0000000000)) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x3) 12:26:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0x0) [ 289.946597] FAULT_INJECTION: forcing a failure. [ 289.946597] name failslab, interval 1, probability 0, space 0, times 0 12:26:00 executing program 4: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x20031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) [ 290.056301] CPU: 1 PID: 10552 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 290.064919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.074313] Call Trace: [ 290.076921] dump_stack+0x244/0x39d [ 290.080568] ? dump_stack_print_info.cold.1+0x20/0x20 [ 290.085789] ? __x64_sys_mount+0xbe/0x150 [ 290.089947] ? do_syscall_64+0x1b9/0x820 [ 290.094031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.099431] should_fail.cold.4+0xa/0x17 [ 290.103545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.108678] ? check_preemption_disabled+0x48/0x280 [ 290.113744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.119308] ? check_preemption_disabled+0x48/0x280 [ 290.124342] ? find_held_lock+0x36/0x1c0 [ 290.128431] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.133887] ? rcu_pm_notify+0xc0/0xc0 [ 290.137793] __should_failslab+0x124/0x180 [ 290.142047] should_failslab+0x9/0x14 [ 290.145862] __kmalloc_track_caller+0x2d1/0x760 [ 290.150564] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 290.155178] ? legacy_parse_monolithic+0xde/0x1e0 [ 290.160096] kmemdup+0x24/0x50 [ 290.163308] legacy_parse_monolithic+0xde/0x1e0 [ 290.168003] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 290.172771] do_mount+0x803/0x1ff0 [ 290.176345] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 290.181904] ? copy_mount_string+0x40/0x40 [ 290.186158] ? copy_mount_options+0x5f/0x430 [ 290.190582] ? kmem_cache_alloc_trace+0x353/0x750 [ 290.195486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.201039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.206603] ? copy_mount_options+0x315/0x430 [ 290.211112] ksys_mount+0x12d/0x140 [ 290.214756] __x64_sys_mount+0xbe/0x150 [ 290.218744] do_syscall_64+0x1b9/0x820 [ 290.222644] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.228021] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.232963] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.237820] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.242861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.248413] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.253445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.258322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.263519] RIP: 0033:0x459fda [ 290.266719] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 290.285640] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 290.293373] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffc) close(r0) 12:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="d3e1050869c2766afabb14abb714319fd4551065e6ecfb42f0abc13e072dbefadccf10d933b35f38f5ad1d33d06ea11dcecf5ab36009d8b2ab0900f0b014f0c4a07864aa1daf8d8759ca597e085136a4e00e10", 0x53, 0x8}], 0x1, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000001c0)={0x3, 0x953, 0x1, 0xfff, 0x401, 0x3f}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) [ 290.300645] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 290.307919] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 290.315190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 290.322467] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) fcntl$setown(r0, 0x8, r2) close(r1) 12:26:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond_slave_0\x00', 0x3ffc}) 12:26:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 12:26:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) getegid() setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040)={0x9, 0x800, 0x5, 0x9, 0x4, 0xf67a, 0xd4, 0x98, 0x5, 0x8, 0xcbf}, 0xb) fcntl$setlease(r0, 0x400, 0x1) 12:26:01 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 290.563695] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 290.657366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.670142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:26:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000100)={0x100, 0x3147504d, 0x2, 0x7, 0x2, @stepwise={{0x20, 0x2d3}, {0x0, 0x7}, {0x5, 0x293}}}) r1 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x10000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f00000001c0)={0x3, 0x1, [0x7ff, 0x3ff, 0x2, 0x1, 0x6, 0xbd7e, 0x2d]}) open$dir(&(0x7f00000002c0)='./file0\x00', 0x740, 0x8) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x288000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="87521850dcaea118001400", @ANYRES16=r3, @ANYBLOB="bc95fe8c5553b05a00082dbd707e8cdbdf250300000004000500"], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x4044001) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000200)) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0xf9b2, 0x9, 0x0, 0x1, 0x2, 0x0, 0x4, 0x0, 0x7, 0x1, 0x5, 0x2, 0x1f, 0x20, 0x2, 0x21}}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000240)=""/117) close(r1) [ 290.705140] FAULT_INJECTION: forcing a failure. [ 290.705140] name failslab, interval 1, probability 0, space 0, times 0 12:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x20000) close(r0) [ 290.825562] device bond_slave_0 entered promiscuous mode [ 290.827470] CPU: 0 PID: 10600 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 290.839631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.848986] Call Trace: [ 290.851583] dump_stack+0x244/0x39d [ 290.855252] ? dump_stack_print_info.cold.1+0x20/0x20 [ 290.860490] ? __kernel_text_address+0xd/0x40 [ 290.864996] ? unwind_get_return_address+0x61/0xa0 [ 290.869991] should_fail.cold.4+0xa/0x17 [ 290.874080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.879201] ? save_stack+0x43/0xd0 [ 290.882849] ? kasan_kmalloc+0xc7/0xe0 [ 290.886743] ? kmem_cache_alloc_trace+0x152/0x750 [ 290.891649] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 290.896853] ? __list_lru_init+0x4d6/0x840 [ 290.901098] ? graph_lock+0x270/0x270 [ 290.904903] ? gfs2_mount+0x1a7/0x712 [ 290.908714] ? legacy_get_tree+0x12f/0x260 [ 290.912972] ? vfs_get_tree+0x1cb/0x5c0 [ 290.916958] ? do_mount+0x82a/0x1ff0 [ 290.916974] ? ksys_mount+0x12d/0x140 [ 290.916990] ? __x64_sys_mount+0xbe/0x150 [ 290.917006] ? do_syscall_64+0x1b9/0x820 [ 290.917027] ? find_held_lock+0x36/0x1c0 [ 290.917048] ? __lock_is_held+0xb5/0x140 [ 290.917076] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.924578] __should_failslab+0x124/0x180 [ 290.924598] should_failslab+0x9/0x14 [ 290.924615] kmem_cache_alloc_trace+0x2d7/0x750 [ 290.924631] ? __kmalloc_node+0x3c/0x70 [ 290.924646] ? __kmalloc_node+0x3c/0x70 [ 290.924666] ? rcu_read_lock_sched_held+0x14f/0x180 [ 290.972904] __memcg_init_list_lru_node+0x185/0x2d0 [ 290.977954] ? kvfree_rcu+0x20/0x20 [ 290.981597] ? __kmalloc_node+0x50/0x70 [ 290.985590] __list_lru_init+0x4d6/0x840 [ 290.989681] ? list_lru_destroy+0x500/0x500 [ 290.994018] ? up_write+0x7b/0x220 [ 290.997569] ? down_write_nested+0x130/0x130 [ 291.001992] ? down_read+0x120/0x120 [ 291.005721] ? init_wait_entry+0x1c0/0x1c0 [ 291.009968] ? prealloc_shrinker+0x172/0x340 [ 291.014402] alloc_super+0x907/0xb40 [ 291.018127] ? destroy_unused_super.part.10+0x110/0x110 [ 291.023517] ? sget_userns+0x17c/0x850 [ 291.027431] ? lock_downgrade+0x900/0x900 [ 291.031612] ? kasan_check_read+0x11/0x20 [ 291.035773] ? do_raw_spin_trylock+0x270/0x270 [ 291.040363] ? security_capable+0x99/0xc0 [ 291.044527] sget_userns+0x278/0x850 [ 291.048332] ? gfs2_kill_sb+0x1a0/0x1a0 [ 291.052330] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 291.057782] ? vfs_get_super+0x270/0x270 [ 291.061856] ? kasan_check_read+0x11/0x20 [ 291.066016] ? do_raw_spin_unlock+0xa7/0x330 [ 291.070431] ? do_raw_spin_trylock+0x270/0x270 [ 291.075029] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.080613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.086157] ? ns_capable_common+0x13f/0x170 [ 291.090580] ? gfs2_kill_sb+0x1a0/0x1a0 [ 291.094555] sget+0x10b/0x150 [ 291.097669] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 291.103126] gfs2_mount+0x1a7/0x712 [ 291.106758] ? fill_super+0x1a10/0x1a10 [ 291.110743] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.116302] ? rcu_pm_notify+0xc0/0xc0 [ 291.120212] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.125773] ? alloc_pages_current+0x17b/0x350 [ 291.130375] ? fill_super+0x1a10/0x1a10 [ 291.134363] legacy_get_tree+0x12f/0x260 [ 291.138434] ? security_fs_context_validate+0x80/0xa0 [ 291.143638] vfs_get_tree+0x1cb/0x5c0 [ 291.147470] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 291.152250] do_mount+0x82a/0x1ff0 [ 291.155805] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.161364] ? copy_mount_string+0x40/0x40 [ 291.165618] ? copy_mount_options+0x5f/0x430 [ 291.170038] ? kmem_cache_alloc_trace+0x353/0x750 [ 291.174903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.180444] ? _copy_from_user+0xdf/0x150 [ 291.184607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.190161] ? copy_mount_options+0x315/0x430 [ 291.194675] ksys_mount+0x12d/0x140 [ 291.198333] __x64_sys_mount+0xbe/0x150 [ 291.202338] do_syscall_64+0x1b9/0x820 [ 291.206250] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.211627] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.216566] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.221425] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.226455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.232001] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.237044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.241913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.247104] RIP: 0033:0x459fda [ 291.250295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 291.269198] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 291.276919] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 291.284201] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 291.291468] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 291.298721] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 291.305994] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 291.325389] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.392273] device bond_slave_0 left promiscuous mode [ 291.411904] device bond_slave_0 entered promiscuous mode [ 291.472989] syz-executor5 (10557) used greatest stack depth: 10888 bytes left 12:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x7ff, 0x5, 0x3, 'queue1\x00', 0x1000}) 12:26:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x9, 0x6131, 0xfffffffffffffe00, 'queue1\x00', 0x6624}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb8, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa0}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x800) close(r1) 12:26:02 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/154, &(0x7f0000000200)=0x9a) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000500)={0x1, {{0x2, 0x4e22, @rand_addr=0x2}}}, 0x88) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, &(0x7f0000000600)=""/209, 0xd1, 0x1, &(0x7f0000000480)={0x2, 0x4e22, @loopback}, 0x10) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:26:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x81, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x10, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, "00ac730000000000ec973f820f7c4000"}}, {@fsname={'fsname', 0x3d, "00ac730000000000ec973f820f7c4000"}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x7f, 0x3f, 0x33, 0x65, 0x7f, 0x7a, 0x31], 0x2d, [0x77, 0x35, 0x67, 0x30], 0x2d, [0x7d, 0x77, 0x39, 0x3a], 0x2d, [0x0, 0x35, 0x31, 0x33], 0x2d, [0x37, 0x0, 0x31, 0x66, 0x77, 0x64, 0x7b, 0x30]}}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) fcntl$setflags(r1, 0x2, 0x1) 12:26:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d7, 0x0) [ 291.747870] FAULT_INJECTION: forcing a failure. [ 291.747870] name failslab, interval 1, probability 0, space 0, times 0 [ 291.793482] IPVS: length: 154 != 24 [ 291.820898] CPU: 0 PID: 10627 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 291.829491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.829498] Call Trace: [ 291.829524] dump_stack+0x244/0x39d [ 291.829549] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.829580] should_fail.cold.4+0xa/0x17 [ 291.829602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.829638] ? graph_lock+0x270/0x270 [ 291.829688] ? save_stack+0xa9/0xd0 [ 291.829705] ? save_stack+0x43/0xd0 [ 291.829721] ? kasan_kmalloc+0xc7/0xe0 [ 291.829735] ? __kmalloc+0x15b/0x760 [ 291.829758] ? find_held_lock+0x36/0x1c0 [ 291.829780] ? __lock_is_held+0xb5/0x140 [ 291.829811] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.829844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.829864] ? check_preemption_disabled+0x48/0x280 [ 291.829892] __should_failslab+0x124/0x180 [ 291.829915] should_failslab+0x9/0x14 [ 291.829933] kmem_cache_alloc_node_trace+0x270/0x740 [ 291.829961] __kmalloc_node+0x3c/0x70 [ 291.829980] kvmalloc_node+0x65/0xf0 [ 291.830002] __list_lru_init+0x5d9/0x840 [ 291.830022] ? list_lru_destroy+0x500/0x500 [ 291.830042] ? up_write+0x7b/0x220 [ 291.830060] ? down_write_nested+0x130/0x130 [ 291.830076] ? down_read+0x120/0x120 [ 291.830098] ? init_wait_entry+0x1c0/0x1c0 [ 291.830113] ? prealloc_shrinker+0x172/0x340 [ 291.830160] alloc_super+0x907/0xb40 [ 291.830188] ? destroy_unused_super.part.10+0x110/0x110 [ 291.830202] ? sget_userns+0x17c/0x850 [ 291.830220] ? lock_downgrade+0x900/0x900 12:26:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x7, 0x5f9, 0x2, 0x0, 0x100000001}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r1) 12:26:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101080, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x80, 0x81, 0x9, 0x7f}, {0x2e33d01a, 0x40, 0x1, 0x4}, {0x7fffffff, 0x7f, 0x81, 0x7}, {0x40, 0x3f, 0x6, 0x100000000}, {0x4a, 0x6, 0x4, 0x5}, {0xffff, 0x1, 0xffffffffffffff7f, 0x7ff}, {0x1000, 0x6, 0x0, 0xfff}]}, 0x10) close(r0) [ 291.830264] ? kasan_check_read+0x11/0x20 [ 291.830282] ? do_raw_spin_trylock+0x270/0x270 [ 291.830302] ? security_capable+0x99/0xc0 [ 291.830338] sget_userns+0x278/0x850 [ 291.830359] ? gfs2_kill_sb+0x1a0/0x1a0 [ 291.830382] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 291.830407] ? vfs_get_super+0x270/0x270 [ 291.864106] ? kasan_check_read+0x11/0x20 [ 291.864121] ? do_raw_spin_unlock+0xa7/0x330 [ 291.864142] ? do_raw_spin_trylock+0x270/0x270 [ 291.871391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.871450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.871466] ? ns_capable_common+0x13f/0x170 [ 291.871485] ? gfs2_kill_sb+0x1a0/0x1a0 [ 291.871514] sget+0x10b/0x150 [ 291.871546] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 291.871563] gfs2_mount+0x1a7/0x712 [ 291.871581] ? fill_super+0x1a10/0x1a10 [ 291.871615] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.871632] ? rcu_pm_notify+0xc0/0xc0 [ 291.871655] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.871678] ? alloc_pages_current+0x17b/0x350 [ 291.871707] ? fill_super+0x1a10/0x1a10 [ 291.871730] legacy_get_tree+0x12f/0x260 [ 291.879314] ? security_fs_context_validate+0x80/0xa0 [ 291.879342] vfs_get_tree+0x1cb/0x5c0 [ 291.879362] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 291.887483] do_mount+0x82a/0x1ff0 [ 291.887503] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.887529] ? copy_mount_string+0x40/0x40 [ 291.898559] ? copy_mount_options+0x5f/0x430 [ 291.898592] ? kmem_cache_alloc_trace+0x353/0x750 [ 291.898611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:26:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x89c5, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x8, 0xb, 0xe, 0x7, 0xfffffffffffffffc, 0xfffffffffffffff9}], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, [], r0, 0x2}, 0x48) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r2) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x1, 0xb6, 0x8, 0x9, 0x3}) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$setlease(r1, 0x400, 0x1) shmctl$SHM_LOCK(r3, 0xb) [ 291.907850] ? _copy_from_user+0xdf/0x150 [ 291.907872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.907892] ? copy_mount_options+0x315/0x430 [ 291.916775] ksys_mount+0x12d/0x140 [ 291.916796] __x64_sys_mount+0xbe/0x150 [ 291.916817] do_syscall_64+0x1b9/0x820 [ 291.924333] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.924354] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.924374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.932742] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.932762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x10201) r2 = syz_open_pts(r1, 0x105000) syz_open_pts(r1, 0x200000) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x81, 0x0, 0x5, 0x1000, 0x3, 0x4, 0x101, 0x6, 0x3f, 0x1, 0x80000000, 0x2}) setsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000200)=0x80000001, 0x4) close(r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, &(0x7f0000000180)=0x4) [ 291.932779] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.932800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.932825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.932837] RIP: 0033:0x459fda [ 291.932855] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 291.953102] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 291.953117] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 291.953126] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 291.953136] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 291.953144] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 291.953153] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:02 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 292.384682] FAULT_INJECTION: forcing a failure. [ 292.384682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.396689] CPU: 1 PID: 10670 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 292.405270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.414637] Call Trace: [ 292.417248] dump_stack+0x244/0x39d [ 292.420891] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.426102] should_fail.cold.4+0xa/0x17 12:26:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff16, 0x0, 0x0, 0x2, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x4000000000000000, 0x7fffffff, 0x0, 0x0, 0x8786, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8804, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x12180) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000040)={0xfffffffffffffffe, 0x1, 0x8, 0x6, 0x4}) [ 292.430171] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.435294] ? mark_held_locks+0x130/0x130 [ 292.439572] ? mark_held_locks+0x130/0x130 [ 292.443839] ? print_usage_bug+0xc0/0xc0 [ 292.447930] ? mark_held_locks+0x130/0x130 [ 292.447956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.457725] ? should_fail+0x22d/0xd01 [ 292.457743] ? __lock_acquire+0x62f/0x4c20 [ 292.457761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.457801] __alloc_pages_nodemask+0x34b/0xdd0 [ 292.457823] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 292.480704] ? find_held_lock+0x36/0x1c0 [ 292.484807] ? trace_hardirqs_off+0xb8/0x310 [ 292.489245] cache_grow_begin+0xa5/0x8c0 [ 292.489264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.489281] ? check_preemption_disabled+0x48/0x280 [ 292.489304] kmem_cache_alloc_trace+0x684/0x750 [ 292.489320] ? lock_release+0xa10/0xa10 [ 292.489344] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.508620] alloc_super+0xd4/0xb40 [ 292.508644] ? destroy_unused_super.part.10+0x110/0x110 [ 292.508656] ? sget_userns+0x17c/0x850 [ 292.508675] ? lock_downgrade+0x900/0x900 12:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 292.535098] ? kasan_check_read+0x11/0x20 [ 292.539268] ? do_raw_spin_unlock+0xa7/0x330 [ 292.543696] ? do_raw_spin_trylock+0x270/0x270 [ 292.548320] ? security_capable+0x99/0xc0 [ 292.552502] sget_userns+0x278/0x850 [ 292.556260] ? gfs2_kill_sb+0x1a0/0x1a0 [ 292.560261] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 292.565725] ? vfs_get_super+0x270/0x270 [ 292.569798] ? kasan_check_read+0x11/0x20 [ 292.569813] ? do_raw_spin_unlock+0xa7/0x330 [ 292.569836] ? do_raw_spin_trylock+0x270/0x270 [ 292.569859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.578444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.578464] ? ns_capable_common+0x13f/0x170 [ 292.586674] IPVS: length: 154 != 24 [ 292.588566] ? gfs2_kill_sb+0x1a0/0x1a0 [ 292.588580] sget+0x10b/0x150 [ 292.588597] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 292.588629] gfs2_mount+0x1a7/0x712 [ 292.618350] ? fill_super+0x1a10/0x1a10 [ 292.622343] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.627896] ? rcu_pm_notify+0xc0/0xc0 12:26:03 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2040, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0x8000, 0x0, 'client0\x00', 0xffffffff80000005, "8f856dc1378c6340", "db3ea5d875739cb42047e836d80476f0d1bbc2efc77a65db2025adc0cc1c1f75", 0x4, 0x8000}) timer_create(0x0, &(0x7f0000000200)={0x0, 0x1b, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000002c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000300)={0x1000, 0x1, 0xfffffffffffffff9, 0x5, 0x100000001}) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0x258, 0x1000, {"6a6d7590deccd89547f61446ca9687fe43fe42f862aef024dfd8df005a50a071ba012dfdf97e8b88310af038e89e5289a33d0f2e5a4af1a094966bd04d5e946e7337eb97e4fd7628c3afa3fb25f2f5e00cda5edac7d65d9a84aed8d0f204ecc1d2cd66519465f071c8cbd77d750093e2514beaec54bf79808a153eaf29c3c36749cd94b8150d1586443bf3b9e1256c7320befcaedc6543b0a99daef7f72b3f5624e76e4864d14f3503a17ea03015dbb3641c5743ba83dd38c46ebb177af0ea1a81080165484e8078c0510fcbaf8467eefc2263f0e7"}}, {0x0, "8ee1614996a6e8f72c1b6f99864bfbf96ad1b434032ff8e286"}}, &(0x7f0000000000)=""/164, 0x10b, 0x1, 0x1}, 0x20) [ 292.631852] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.637501] ? alloc_pages_current+0x17b/0x350 [ 292.642097] ? fill_super+0x1a10/0x1a10 [ 292.646085] legacy_get_tree+0x12f/0x260 [ 292.650234] ? security_fs_context_validate+0x80/0xa0 [ 292.655445] vfs_get_tree+0x1cb/0x5c0 [ 292.659269] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 292.664047] do_mount+0x82a/0x1ff0 [ 292.667604] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.673165] ? copy_mount_string+0x40/0x40 [ 292.677422] ? copy_mount_options+0x5f/0x430 [ 292.681852] ? kmem_cache_alloc_trace+0x353/0x750 [ 292.681875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.681898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.681920] ? copy_mount_options+0x315/0x430 [ 292.692298] ksys_mount+0x12d/0x140 [ 292.692320] __x64_sys_mount+0xbe/0x150 [ 292.692341] do_syscall_64+0x1b9/0x820 [ 292.692361] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.692380] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.692402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.729598] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.734637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.740205] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.745288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.750157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.755357] RIP: 0033:0x459fda [ 292.758564] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 292.777471] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:26:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x4, &(0x7f00000001c0)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x0}, 0x48) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f00000000c0), 0x1000001d1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) tee(r1, r0, 0xfffffffffffffffd, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r2, 0x40086610, &(0x7f0000000240)) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f00000003c0), 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast2}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) [ 292.785196] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 292.792522] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 292.799800] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 292.807082] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 292.814361] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = shmget(0x3, 0x4000, 0x54000d83, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000140)=""/4096) 12:26:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0xc0045878, 0x0) 12:26:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x14) 12:26:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2df, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200001, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/149, 0x95}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/17, 0x11}], 0x3, 0x0) close(r2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x1, 0x3ff, 0x7fff, 0x8, 0x0, 0x100000000, 0x80800, 0x8, 0x4, 0x7, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffff5969, 0x5, 0x9, 0x4f, 0x54ff1e67, 0x2, 0x5, 0x9, 0x3, 0xff, 0x2, 0x2400000, 0x4, 0x1, 0xfffffffffffffff9, 0x6e, 0x3, 0x5, 0x5, 0xb42, 0x3, 0xcf, 0x10000, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x4000, 0x9, 0x3, 0x5, 0x2, 0x80000000, 0x100000000}, r3, 0x6, r0, 0x2) [ 292.920156] gfs2: not a GFS2 filesystem 12:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)={0x6, 0x7, 0x0, [{0x3f, 0x5, 0x9, 0x7fffffff, 0x1000, 0x9, 0x9}, {0x7f82, 0xffffffff9d14aaf2, 0x3, 0x6, 0x0, 0x8000, 0x3}, {0x81, 0x7fff, 0x6, 0xfffffffffffffff7, 0x0, 0xf0, 0xff}, {0x8, 0x6594, 0xa61, 0x9, 0xe6, 0x2a, 0x8b20}, {0x80000000, 0x10001, 0x7ff, 0x9, 0x0, 0x2, 0xe02}, {0x800000000, 0x2, 0x9, 0xa4e, 0xffff, 0xfffffffffffffa23, 0x3ff}, {0x7fff, 0x5, 0x1, 0xaf16, 0x9, 0x4, 0x200}]}) close(r0) 12:26:03 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x64, 0x800) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x1f) [ 293.092181] FAULT_INJECTION: forcing a failure. [ 293.092181] name failslab, interval 1, probability 0, space 0, times 0 12:26:03 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'security.', '/dev/snd/seq\x00'}, &(0x7f0000000040)='/dev/snd/seq\x00', 0xd, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$TIOCCONS(r2, 0x541d) close(r1) 12:26:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d1, 0x0) [ 293.169017] CPU: 1 PID: 10718 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 293.177658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.177665] Call Trace: [ 293.177691] dump_stack+0x244/0x39d [ 293.177713] ? dump_stack_print_info.cold.1+0x20/0x20 [ 293.198464] should_fail.cold.4+0xa/0x17 [ 293.202543] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.207688] ? graph_lock+0x270/0x270 [ 293.211521] ? save_stack+0xa9/0xd0 [ 293.215175] ? save_stack+0x43/0xd0 [ 293.218841] ? kasan_kmalloc+0xc7/0xe0 [ 293.218857] ? __kmalloc+0x15b/0x760 [ 293.218878] ? find_held_lock+0x36/0x1c0 [ 293.226472] ? __lock_is_held+0xb5/0x140 [ 293.226506] ? perf_trace_sched_process_exec+0x860/0x860 [ 293.234616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.234634] ? check_preemption_disabled+0x48/0x280 [ 293.234659] __should_failslab+0x124/0x180 [ 293.245652] should_failslab+0x9/0x14 [ 293.245670] kmem_cache_alloc_node_trace+0x270/0x740 [ 293.245710] __kmalloc_node+0x3c/0x70 [ 293.254939] kvmalloc_node+0x65/0xf0 [ 293.254958] __list_lru_init+0x5d9/0x840 [ 293.254976] ? list_lru_destroy+0x500/0x500 [ 293.279752] ? up_write+0x7b/0x220 [ 293.283308] ? down_write_nested+0x130/0x130 [ 293.287727] ? down_read+0x120/0x120 [ 293.291458] ? init_wait_entry+0x1c0/0x1c0 [ 293.295710] ? prealloc_shrinker+0x172/0x340 [ 293.300139] alloc_super+0x907/0xb40 [ 293.303880] ? destroy_unused_super.part.10+0x110/0x110 [ 293.309275] ? sget_userns+0x17c/0x850 [ 293.313190] ? lock_downgrade+0x900/0x900 [ 293.317360] ? kasan_check_read+0x11/0x20 [ 293.321519] ? do_raw_spin_trylock+0x270/0x270 [ 293.326130] ? security_capable+0x99/0xc0 [ 293.330296] sget_userns+0x278/0x850 [ 293.334021] ? gfs2_kill_sb+0x1a0/0x1a0 [ 293.338027] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 293.343484] ? vfs_get_super+0x270/0x270 [ 293.347563] ? kasan_check_read+0x11/0x20 [ 293.351719] ? do_raw_spin_unlock+0xa7/0x330 [ 293.356140] ? do_raw_spin_trylock+0x270/0x270 [ 293.360742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.366316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.371866] ? ns_capable_common+0x13f/0x170 [ 293.376299] ? gfs2_kill_sb+0x1a0/0x1a0 [ 293.380284] sget+0x10b/0x150 [ 293.383427] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 293.388888] gfs2_mount+0x1a7/0x712 [ 293.392556] ? fill_super+0x1a10/0x1a10 [ 293.396551] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.402103] ? rcu_pm_notify+0xc0/0xc0 [ 293.402141] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 293.402168] ? alloc_pages_current+0x17b/0x350 [ 293.402185] ? fill_super+0x1a10/0x1a10 [ 293.416221] legacy_get_tree+0x12f/0x260 [ 293.416252] ? security_fs_context_validate+0x80/0xa0 [ 293.416275] vfs_get_tree+0x1cb/0x5c0 [ 293.433296] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 293.433317] do_mount+0x82a/0x1ff0 [ 293.433337] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.433358] ? copy_mount_string+0x40/0x40 [ 293.451400] ? copy_mount_options+0x5f/0x430 [ 293.455832] ? kmem_cache_alloc_trace+0x353/0x750 [ 293.455856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.455878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.455898] ? copy_mount_options+0x315/0x430 [ 293.466289] ksys_mount+0x12d/0x140 [ 293.476356] __x64_sys_mount+0xbe/0x150 [ 293.476378] do_syscall_64+0x1b9/0x820 [ 293.476398] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.476417] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.484018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.484038] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.484057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.484078] ? prepare_exit_to_usermode+0x291/0x3b0 12:26:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000300), 0x8) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x200000) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000380)={@multicast1, @remote}, 0x8) shutdown(r2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000001c0)={'nat\x00', 0x0, 0x3, 0x9a, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000100)=""/154}, &(0x7f0000000280)=0x78) fremovexattr(r2, &(0x7f0000000340)=@random={'osx.', 'wlan1\x00'}) 12:26:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x30140) close(r0) [ 293.503132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.503161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.503173] RIP: 0033:0x459fda [ 293.503190] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 293.503205] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 293.513763] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 293.528790] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 293.528800] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 293.528809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 293.528819] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:04 executing program 4: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) write(r2, &(0x7f00000000c0), 0x1000001d1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) tee(r1, r0, 0xfffffffffffffffd, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 12:26:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) accept4(r1, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x80000) 12:26:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/65) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='/dev/snd/seq\x00', 0x1000000000000004) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) close(r0) write$P9_RSTATFS(r1, &(0x7f00000001c0)={0x43, 0x9, 0x2, {0xffff, 0x7, 0x81, 0x9, 0x2c, 0xf81, 0x6, 0x101, 0x73b2}}, 0x43) 12:26:04 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 293.750740] FAULT_INJECTION: forcing a failure. [ 293.750740] name failslab, interval 1, probability 0, space 0, times 0 [ 293.766856] CPU: 0 PID: 10753 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 293.775461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.775473] Call Trace: [ 293.787424] dump_stack+0x244/0x39d [ 293.791071] ? dump_stack_print_info.cold.1+0x20/0x20 [ 293.796275] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 293.801569] ? rcu_read_unlock_special+0x370/0x370 [ 293.806512] should_fail.cold.4+0xa/0x17 [ 293.806534] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.806552] ? kernel_text_address+0x79/0xf0 [ 293.806572] ? unwind_get_return_address+0x61/0xa0 [ 293.825059] ? __save_stack_trace+0x8d/0xf0 [ 293.825078] ? graph_lock+0x270/0x270 [ 293.825103] ? find_held_lock+0x36/0x1c0 [ 293.837313] ? __lock_is_held+0xb5/0x140 [ 293.841408] ? perf_trace_sched_process_exec+0x860/0x860 12:26:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) socketpair(0x2, 0xb, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x31, &(0x7f0000000040)=0x4, 0x4) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x401054d5, 0x0) [ 293.841424] ? check_preemption_disabled+0x48/0x280 [ 293.841466] __should_failslab+0x124/0x180 [ 293.841501] should_failslab+0x9/0x14 [ 293.841518] kmem_cache_alloc_trace+0x2d7/0x750 [ 293.841537] ? __kmalloc_node+0x3c/0x70 [ 293.868676] ? __kmalloc_node+0x3c/0x70 [ 293.872698] ? rcu_read_lock_sched_held+0x14f/0x180 [ 293.877722] __memcg_init_list_lru_node+0x185/0x2d0 [ 293.882758] ? kvfree_rcu+0x20/0x20 [ 293.886409] ? __kmalloc_node+0x50/0x70 [ 293.890401] __list_lru_init+0x4d6/0x840 [ 293.894479] ? list_lru_destroy+0x500/0x500 [ 293.898820] ? up_write+0x7b/0x220 [ 293.902371] ? down_write_nested+0x130/0x130 [ 293.906786] ? down_read+0x120/0x120 [ 293.910517] ? init_wait_entry+0x1c0/0x1c0 [ 293.914762] ? prealloc_shrinker+0x172/0x340 [ 293.919219] alloc_super+0x907/0xb40 [ 293.922968] ? destroy_unused_super.part.10+0x110/0x110 [ 293.922982] ? sget_userns+0x17c/0x850 [ 293.923001] ? lock_downgrade+0x900/0x900 [ 293.923026] ? kasan_check_read+0x11/0x20 [ 293.923047] ? do_raw_spin_trylock+0x270/0x270 [ 293.932291] ? security_capable+0x99/0xc0 [ 293.932318] sget_userns+0x278/0x850 [ 293.932344] ? gfs2_kill_sb+0x1a0/0x1a0 [ 293.932367] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 293.940668] ? vfs_get_super+0x270/0x270 [ 293.940683] ? kasan_check_read+0x11/0x20 [ 293.940698] ? do_raw_spin_unlock+0xa7/0x330 [ 293.940713] ? do_raw_spin_trylock+0x270/0x270 [ 293.940739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.940780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.940799] ? ns_capable_common+0x13f/0x170 [ 293.949523] ? gfs2_kill_sb+0x1a0/0x1a0 12:26:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 293.949538] sget+0x10b/0x150 [ 293.949557] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 293.949575] gfs2_mount+0x1a7/0x712 [ 293.949594] ? fill_super+0x1a10/0x1a10 [ 293.949614] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.949633] ? rcu_pm_notify+0xc0/0xc0 [ 293.949659] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 293.957346] ? alloc_pages_current+0x17b/0x350 [ 293.957364] ? fill_super+0x1a10/0x1a10 [ 293.957391] legacy_get_tree+0x12f/0x260 [ 293.957410] ? security_fs_context_validate+0x80/0xa0 [ 293.957429] vfs_get_tree+0x1cb/0x5c0 [ 293.966946] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 293.966968] do_mount+0x82a/0x1ff0 [ 293.966987] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.967009] ? copy_mount_string+0x40/0x40 [ 293.967030] ? copy_mount_options+0x5f/0x430 [ 293.975566] ? kmem_cache_alloc_trace+0x353/0x750 [ 293.975588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.975607] ? _copy_from_user+0xdf/0x150 [ 293.975628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.975663] ? copy_mount_options+0x315/0x430 12:26:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xb43c0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 12:26:04 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/null\x00', 0x101000, 0x0) sendmsg$key(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000e00)={0x2, 0x13, 0x3214, 0x0, 0x30, 0x0, 0x70bd2c, 0x25dfdbff, [@sadb_x_filter={0x5, 0x1a, @in=@rand_addr=0x800, @in=@remote, 0x10, 0x10, 0x4}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x2}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x4}, @in={0x2, 0x4e24, @multicast2}}, @sadb_x_filter={0x5, 0x1a, @in6=@local, @in=@multicast2, 0xa, 0x14, 0x4}, @sadb_x_policy={0x8, 0x12, 0x3, 0x2, 0x0, 0x6e6bb4, 0x2, {0x6, 0xff, 0x8, 0xc28b, 0x0, 0x2, 0x0, @in6, @in6=@mcast2}}, @sadb_sa={0x2, 0x1, 0x4d4, 0x6, 0xffffffffffff7d93, 0xf7, 0x4, 0x80000001}, @sadb_x_sa2={0x2, 0x13, 0x3f, 0x0, 0x0, 0x70bd2c, 0x34ff}, @sadb_x_sec_ctx={0xd, 0x18, 0x5, 0x7fff, 0x5e, "3215b333d7a8745e1faaf145cfa7552a01fe07c867fbea5dc16e38a30792cce67f8328cdf6433f05733229a7595064f5e739f33bfa03952f2caaa144333be20058a7f8719a55ed3922cf0f85a15a9cbf15413d8694650b9b0774837e8721"}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d4}]}, 0x180}}, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000140)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x200000) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0xfffffffffffffff5, 0x4, {0x7, 0x1c, 0x3, 0x200202, 0x1, 0x4, 0x0, 0xfffffffffffffffc}}, 0x50) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) write$FUSE_ENTRY(r2, &(0x7f0000000b00)={0x90, 0x0, 0x8, {0x4, 0x3, 0x600000000, 0x46, 0x2, 0x2, {0x0, 0x0, 0x800, 0x0, 0x50f, 0x766, 0x3, 0x3, 0x8, 0x5, 0x80, r3, r4, 0x1f, 0x2}}}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000200)={0x5a, 0xbc, 0xd8, {r5, r6+10000000}, 0x9, 0x4}) sendmmsg$alg(r1, &(0x7f0000000980)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="7197c0df8f762c8b1d999c5d1b", 0xd}, {&(0x7f00000002c0)="55528d32dbde62be47ba8ccfe89a0cd676c9cc646998e2d7c17dc5d6fa298fb52f082d6d2ce5f61d7485e635017bfed7b083c0f35e57f4cd756274f12ddc4d81668402e2c75ef765e8ee4d1613ee6169976c428a19bcb7e4e68f4c7cbee8d8e3f4fe651ee811ac821dea65747d95471f8719cb443e0d2eac905e05c26dfad6940d22eb1252ce7bbdaa875af755146976f38ffadd754ed0c60d3daaa274ff689490bd9e0e94eef5913268", 0xaa}, {&(0x7f0000000380)="668d444b3c3e4d0e02e8899f468d58c79e4395cb2b98c50a07aad452081fa20dda0e5f5b85ea2da3f7a60de986a9ae2fb7afd757528b18faa1503bd3e107", 0x3e}, {&(0x7f00000003c0)="62efb729573ead130d029fa3cfab34fd6fd58db8acf97a0f27a4bf385e5263a8a3d49c378d9fd168303b31802b38b247b8cd0371019491e7088a1c34", 0x3c}, {&(0x7f0000000400)="534110043a3089ccfd92bc2f7476a4b4a42bc59be84d68cd21cde972c89fa26a27ff0d9aa9cb879753c3652e42bf2e330b9ff50e4cf99bdb87be8ddb3975180e03457d22be71183ddfa1c1b4d5ae79fa1286c18ab07f5dc9cd1e50146b81a532efacf67484f58b84e78ab4993c29e4c014601b14613de4b7456833a29ba3b3a81b91168313e18e194b83b400d0b297c3fd256358f0b758cf9349b9142434d6864ddc27329147261b37d5542b40df1bf7", 0xb0}, {&(0x7f00000004c0)="b9298dd5628551ee224c27d3", 0xc}], 0x6, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x63fe}, @op={0x18}, @iv={0x118, 0x117, 0x2, 0xff, "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"}, @assoc={0x18, 0x117, 0x4, 0xd27b}, @iv={0xd0, 0x117, 0x2, 0xb8, "962ccbf5449fb6f7ecf0c6f9c725cf711e9945828ed09c0960aa1cdf8bc9312103303628b218413c0ab1cecb35818a9ad97b513701992140fc55738f26564b0e7ea58ab71e74aab3d2780f202d3f55095642ec079e6d23e1608963c0b36f8bedc7ad109635438c4bf3c4ef800ee587c06f43493c477cb39351c0c383afbdb0b6d9f89b90f02c8abd40bf5320bf851f91b4710082a60d5c532bc7d6818e0bbb46fffd10ace07ab56215864872188c4481f2c7df5ffc068938"}, @assoc={0x18, 0x117, 0x4, 0xa2}], 0x278, 0x404c801}, {0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000800)="fec4844e554599bf19907c53576e3fa929817f4a8ebc056af949907bd0add999be498c66eefbcf8097b76427eac4ce523cee7cf67b0e5af8ee89db9fb06d181166c015af58c4eace733ea221fab7169739d01ad7ba107c2457ef74eb44f2bff765b58817d4656910b383eefb5b9498a525645c77151b6e90aa68a4b3a09f6ad7", 0x80}], 0x1, &(0x7f00000008c0)=[@iv={0x20, 0x117, 0x2, 0x8, "d3da88aa68c30698"}, @iv={0x48, 0x117, 0x2, 0x2e, "fc6a9b872bc12330b5d16dea44192c49523f51c89f0d62102219b71ea6087056090f7c803676ca7ef762a566fea8"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x98, 0x20000010}], 0x2, 0x80) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000bc0)={0x0, 0x9a, "9e0c484a637204579205a9bf30dc589b42b97f83c28d0ba89dc132cb3e0e1db8f1757d4eb83933e542862646de114345132637295a9a091b910b7c0c7209591862dbfa45fefc2c66444c298bf95dd50f0f98d6392d63cdbb939bf8596ccc74dc083a4968bf8e93d4e38c5e4050f3f8b208a2a772dbb8626c755409691fc3270d4a14cdd30c3f8649a84f8b9689b03352cd861a61109a2a796562"}, &(0x7f0000000c80)=0xa2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000cc0)={r7, @in={{0x2, 0x4e20, @broadcast}}, 0x7fffffff, 0xfffffffffffffff7, 0xfff, 0x2, 0x82}, &(0x7f0000000d80)=0x98) [ 293.985809] ksys_mount+0x12d/0x140 [ 293.985831] __x64_sys_mount+0xbe/0x150 [ 293.985854] do_syscall_64+0x1b9/0x820 [ 293.985873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.985893] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.995834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.995855] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.995874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.995890] ? prepare_exit_to_usermode+0x291/0x3b0 [ 293.995910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.003016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.003029] RIP: 0033:0x459fda [ 294.003046] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 294.003055] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 294.003069] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 294.003083] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 12:26:04 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 294.012137] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 294.012147] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 294.012156] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff22, 0x0, 0x0, 0xfffffffffffffe98) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) close(r2) [ 294.322049] FAULT_INJECTION: forcing a failure. [ 294.322049] name failslab, interval 1, probability 0, space 0, times 0 [ 294.358284] CPU: 1 PID: 10783 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 294.366904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.366911] Call Trace: [ 294.366935] dump_stack+0x244/0x39d [ 294.366960] ? dump_stack_print_info.cold.1+0x20/0x20 [ 294.366982] ? __kernel_text_address+0xd/0x40 [ 294.367004] ? unwind_get_return_address+0x61/0xa0 [ 294.397293] should_fail.cold.4+0xa/0x17 [ 294.401367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.401394] ? save_stack+0x43/0xd0 [ 294.401414] ? kasan_kmalloc+0xc7/0xe0 [ 294.414030] ? kmem_cache_alloc_trace+0x152/0x750 [ 294.418890] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 294.418905] ? __list_lru_init+0x4d6/0x840 [ 294.418924] ? graph_lock+0x270/0x270 [ 294.418937] ? gfs2_mount+0x1a7/0x712 [ 294.418958] ? legacy_get_tree+0x12f/0x260 [ 294.440171] ? vfs_get_tree+0x1cb/0x5c0 [ 294.444156] ? do_mount+0x82a/0x1ff0 [ 294.447877] ? ksys_mount+0x12d/0x140 [ 294.451689] ? __x64_sys_mount+0xbe/0x150 [ 294.455855] ? do_syscall_64+0x1b9/0x820 [ 294.459933] ? find_held_lock+0x36/0x1c0 [ 294.464010] ? __lock_is_held+0xb5/0x140 [ 294.468079] ? rndis_wlan_do_link_up_work+0xb08/0xdf0 [ 294.473291] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.478773] __should_failslab+0x124/0x180 [ 294.483025] should_failslab+0x9/0x14 [ 294.486843] kmem_cache_alloc_trace+0x2d7/0x750 [ 294.491527] ? __kmalloc_node+0x3c/0x70 [ 294.495514] ? __kmalloc_node+0x3c/0x70 [ 294.499501] ? rcu_read_lock_sched_held+0x14f/0x180 [ 294.504537] __memcg_init_list_lru_node+0x185/0x2d0 [ 294.509565] ? kvfree_rcu+0x20/0x20 [ 294.513203] ? __kmalloc_node+0x50/0x70 [ 294.517205] __list_lru_init+0x4d6/0x840 [ 294.521292] ? list_lru_destroy+0x500/0x500 [ 294.525627] ? up_write+0x7b/0x220 [ 294.529179] ? down_write_nested+0x130/0x130 [ 294.533597] ? down_read+0x120/0x120 [ 294.537325] ? init_wait_entry+0x1c0/0x1c0 [ 294.541567] ? prealloc_shrinker+0x172/0x340 [ 294.546003] alloc_super+0x907/0xb40 [ 294.549737] ? destroy_unused_super.part.10+0x110/0x110 [ 294.555110] ? sget_userns+0x17c/0x850 [ 294.559012] ? lock_downgrade+0x900/0x900 [ 294.563187] ? kasan_check_read+0x11/0x20 [ 294.567356] ? do_raw_spin_trylock+0x270/0x270 [ 294.571954] ? security_capable+0x99/0xc0 [ 294.576123] sget_userns+0x278/0x850 [ 294.579857] ? gfs2_kill_sb+0x1a0/0x1a0 [ 294.583864] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 294.589316] ? vfs_get_super+0x270/0x270 [ 294.593373] ? kasan_check_read+0x11/0x20 [ 294.597510] ? do_raw_spin_unlock+0xa7/0x330 [ 294.601906] ? do_raw_spin_trylock+0x270/0x270 [ 294.606482] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.612019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.617545] ? ns_capable_common+0x13f/0x170 12:26:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"6c6f000000000000361200", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_getnetconf={0x1c, 0x52, 0x15, 0x0, 0x0, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}]}, 0x350}}, 0x0) [ 294.621948] ? gfs2_kill_sb+0x1a0/0x1a0 [ 294.625922] sget+0x10b/0x150 [ 294.629031] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 294.634470] gfs2_mount+0x1a7/0x712 [ 294.638088] ? fill_super+0x1a10/0x1a10 [ 294.642071] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 294.647616] ? rcu_pm_notify+0xc0/0xc0 [ 294.651514] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 294.657059] ? alloc_pages_current+0x17b/0x350 [ 294.661642] ? fill_super+0x1a10/0x1a10 [ 294.665633] legacy_get_tree+0x12f/0x260 [ 294.669714] ? security_fs_context_validate+0x80/0xa0 [ 294.674919] vfs_get_tree+0x1cb/0x5c0 [ 294.678734] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 294.683522] do_mount+0x82a/0x1ff0 [ 294.687076] ? copy_mount_string+0x40/0x40 [ 294.691324] ? retint_kernel+0x2d/0x2d [ 294.691351] ? copy_mount_options+0x239/0x430 [ 294.691370] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 294.691388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.691408] ? copy_mount_options+0x315/0x430 [ 294.699884] ksys_mount+0x12d/0x140 [ 294.699907] __x64_sys_mount+0xbe/0x150 12:26:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb000c0000080000000000199ac0f1ca9a7443"], 0x0) 12:26:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xf03, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x3f) close(r0) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000040)) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) [ 294.699930] do_syscall_64+0x1b9/0x820 [ 294.699949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.699968] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.699982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.700004] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.746944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.752500] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.757534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.762403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.767604] RIP: 0033:0x459fda [ 294.770808] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 294.789726] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 294.789743] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 294.789753] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 294.789764] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 12:26:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x280040, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x80) close(r1) alarm(0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) write$P9_RREMOVE(r1, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) ptrace$peek(0x1, r2, &(0x7f0000000040)) [ 294.789774] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 294.789783] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000040)="d59da85cdc53252a01a035780e839a6472218db5cb519bc2f1", 0x19, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) pipe2(&(0x7f0000000080), 0x4000) 12:26:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x50) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 12:26:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454df, 0x0) 12:26:05 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:05 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000500)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x1}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x7ff, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000200)) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) close(r3) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x644202) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000140)={0x14, 0x8d, &(0x7f0000000080)="a8da6899f633d65ff1cf83e2e5103f2dc544f2b7df9dfcbf410e00207944db411a6a21609d08408cba48669404812a4aa7bc555c088b4cdc45d5d01a11d385c9a0a1f64921d8b61922b9876b735452c656407651dd110c54feeeb9df320bdb83e9bf6eaa8861020986492cdfbe9e61af62666c047f50fdea8136e57abea9333f2f0b77ec09c5b2c618d3ac3d78"}) [ 295.031946] FAULT_INJECTION: forcing a failure. [ 295.031946] name failslab, interval 1, probability 0, space 0, times 0 [ 295.084529] CPU: 1 PID: 10820 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 295.093214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.093222] Call Trace: [ 295.093257] dump_stack+0x244/0x39d [ 295.093284] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.093305] ? __kernel_text_address+0xd/0x40 [ 295.093325] ? unwind_get_return_address+0x61/0xa0 [ 295.093355] should_fail.cold.4+0xa/0x17 [ 295.123552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.123587] ? save_stack+0x43/0xd0 [ 295.123602] ? kasan_kmalloc+0xc7/0xe0 [ 295.123617] ? kmem_cache_alloc_trace+0x152/0x750 [ 295.123633] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 295.123651] ? __list_lru_init+0x4d6/0x840 [ 295.136442] ? graph_lock+0x270/0x270 [ 295.136458] ? gfs2_mount+0x1a7/0x712 [ 295.136475] ? legacy_get_tree+0x12f/0x260 [ 295.136497] ? vfs_get_tree+0x1cb/0x5c0 [ 295.145222] ? do_mount+0x82a/0x1ff0 [ 295.145251] ? ksys_mount+0x12d/0x140 [ 295.145267] ? __x64_sys_mount+0xbe/0x150 [ 295.145284] ? do_syscall_64+0x1b9/0x820 [ 295.145305] ? find_held_lock+0x36/0x1c0 [ 295.182077] ? __lock_is_held+0xb5/0x140 [ 295.182109] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.182135] __should_failslab+0x124/0x180 [ 295.190275] should_failslab+0x9/0x14 [ 295.190294] kmem_cache_alloc_trace+0x2d7/0x750 [ 295.190309] ? __kmalloc_node+0x3c/0x70 [ 295.190325] ? __kmalloc_node+0x3c/0x70 [ 295.190343] ? rcu_read_lock_sched_held+0x14f/0x180 [ 295.190363] __memcg_init_list_lru_node+0x185/0x2d0 [ 295.190381] ? kvfree_rcu+0x20/0x20 [ 295.190398] ? __kmalloc_node+0x50/0x70 [ 295.190419] __list_lru_init+0x4d6/0x840 [ 295.190439] ? list_lru_destroy+0x500/0x500 [ 295.190459] ? up_write+0x7b/0x220 [ 295.190474] ? down_write_nested+0x130/0x130 [ 295.190490] ? down_read+0x120/0x120 [ 295.190512] ? init_wait_entry+0x1c0/0x1c0 [ 295.200024] ? prealloc_shrinker+0x172/0x340 [ 295.200055] alloc_super+0x907/0xb40 [ 295.200080] ? destroy_unused_super.part.10+0x110/0x110 [ 295.200092] ? sget_userns+0x17c/0x850 [ 295.200111] ? lock_downgrade+0x900/0x900 [ 295.200134] ? kasan_check_read+0x11/0x20 [ 295.208163] ? do_raw_spin_trylock+0x270/0x270 [ 295.208183] ? security_capable+0x99/0xc0 [ 295.208209] sget_userns+0x278/0x850 [ 295.208236] ? gfs2_kill_sb+0x1a0/0x1a0 [ 295.208258] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 295.216891] ? vfs_get_super+0x270/0x270 [ 295.216908] ? kasan_check_read+0x11/0x20 [ 295.216924] ? do_raw_spin_unlock+0xa7/0x330 [ 295.216939] ? do_raw_spin_trylock+0x270/0x270 [ 295.216967] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 295.225964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.225983] ? ns_capable_common+0x13f/0x170 [ 295.226005] ? gfs2_kill_sb+0x1a0/0x1a0 [ 295.226021] sget+0x10b/0x150 [ 295.234653] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 295.234673] gfs2_mount+0x1a7/0x712 [ 295.234691] ? fill_super+0x1a10/0x1a10 [ 295.234713] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 295.234733] ? rcu_pm_notify+0xc0/0xc0 [ 295.242762] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 295.242787] ? alloc_pages_current+0x17b/0x350 [ 295.242805] ? fill_super+0x1a10/0x1a10 [ 295.242825] legacy_get_tree+0x12f/0x260 [ 295.242853] ? security_fs_context_validate+0x80/0xa0 [ 295.242873] vfs_get_tree+0x1cb/0x5c0 [ 295.250731] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 295.258838] do_mount+0x82a/0x1ff0 [ 295.258861] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 295.258884] ? copy_mount_string+0x40/0x40 [ 295.258905] ? copy_mount_options+0x5f/0x430 [ 295.267531] ? kmem_cache_alloc_trace+0x353/0x750 [ 295.267553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.267572] ? _copy_from_user+0xdf/0x150 [ 295.267593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.267613] ? copy_mount_options+0x315/0x430 [ 295.276676] ksys_mount+0x12d/0x140 [ 295.276700] __x64_sys_mount+0xbe/0x150 [ 295.276721] do_syscall_64+0x1b9/0x820 [ 295.276746] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.463491] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.468422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.473286] ? trace_hardirqs_on_caller+0x310/0x310 [ 295.478307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.483849] ? prepare_exit_to_usermode+0x291/0x3b0 [ 295.488877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.493742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.498928] RIP: 0033:0x459fda [ 295.502148] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 295.521058] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 295.528760] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:26:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 295.536047] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 295.543337] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 295.550596] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 295.557868] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) 12:26:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 12:26:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:06 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x0) 12:26:06 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x100, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xe34}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x28}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x29}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4000000000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9b1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xae}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x15}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb77}]}, 0x100}}, 0x4008000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000200)) socket$rds(0x15, 0x5, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x3) 12:26:06 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 295.780849] FAULT_INJECTION: forcing a failure. [ 295.780849] name failslab, interval 1, probability 0, space 0, times 0 12:26:06 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) semget$private(0x0, 0x2001, 0x0) [ 295.895720] CPU: 1 PID: 10855 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 295.904352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.904359] Call Trace: [ 295.904386] dump_stack+0x244/0x39d [ 295.904409] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.904430] ? __kernel_text_address+0xd/0x40 [ 295.904450] ? unwind_get_return_address+0x61/0xa0 [ 295.904474] should_fail.cold.4+0xa/0x17 [ 295.938702] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:26:06 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) getgroups(0x2, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee01]) fchown(r0, 0x0, r1) [ 295.943838] ? save_stack+0x43/0xd0 [ 295.947485] ? kasan_kmalloc+0xc7/0xe0 [ 295.951379] ? kmem_cache_alloc_trace+0x152/0x750 [ 295.951396] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 295.951409] ? __list_lru_init+0x4d6/0x840 [ 295.951427] ? graph_lock+0x270/0x270 [ 295.951440] ? gfs2_mount+0x1a7/0x712 [ 295.951457] ? legacy_get_tree+0x12f/0x260 [ 295.951478] ? vfs_get_tree+0x1cb/0x5c0 [ 295.965721] ? do_mount+0x82a/0x1ff0 [ 295.965737] ? ksys_mount+0x12d/0x140 [ 295.965753] ? __x64_sys_mount+0xbe/0x150 [ 295.965773] ? do_syscall_64+0x1b9/0x820 [ 295.981552] ? find_held_lock+0x36/0x1c0 [ 295.981575] ? __lock_is_held+0xb5/0x140 [ 295.981607] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.981647] __should_failslab+0x124/0x180 [ 295.989136] should_failslab+0x9/0x14 [ 295.989155] kmem_cache_alloc_trace+0x2d7/0x750 [ 295.989170] ? __kmalloc_node+0x3c/0x70 [ 295.989191] ? __kmalloc_node+0x3c/0x70 [ 296.005505] ? rcu_read_lock_sched_held+0x14f/0x180 [ 296.005530] __memcg_init_list_lru_node+0x185/0x2d0 [ 296.005549] ? kvfree_rcu+0x20/0x20 [ 296.005570] ? __kmalloc_node+0x50/0x70 [ 296.015268] __list_lru_init+0x4d6/0x840 [ 296.015289] ? list_lru_destroy+0x500/0x500 [ 296.015310] ? up_write+0x7b/0x220 [ 296.015326] ? down_write_nested+0x130/0x130 [ 296.015342] ? down_read+0x120/0x120 [ 296.015363] ? init_wait_entry+0x1c0/0x1c0 [ 296.023809] ? prealloc_shrinker+0x172/0x340 [ 296.023845] alloc_super+0x907/0xb40 [ 296.023871] ? destroy_unused_super.part.10+0x110/0x110 [ 296.023883] ? sget_userns+0x17c/0x850 [ 296.023902] ? lock_downgrade+0x900/0x900 12:26:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000300)={&(0x7f00000002c0)=[0x7, 0x9, 0x1b20], 0x3, 0x6e7, 0x5, 0x400, 0x38, 0x20, {0xfffffffffffffb20, 0x8, 0x100000000, 0x3, 0x4, 0x6, 0x8, 0x100000001, 0x3, 0x2, 0x3, 0x4037, 0x800000000, 0x6, "dd502a0d6b55d081e399dea09ee2f9191f477bd6b1b4e6d520a379231532c238"}}) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x2f, "4e569ea90f37a24bf02d799abfc7346fc8f6e9fce23e63355cd35fe74aa160f9af1634d3aefa77788cbbff1221ebd6"}, &(0x7f0000000200)=0x37) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r2, 0x2}, &(0x7f0000000280)=0x8) write$P9_RRENAMEAT(r1, &(0x7f0000000380)={0x7, 0x4b, 0x1}, 0x7) close(r0) [ 296.023926] ? kasan_check_read+0x11/0x20 [ 296.031867] ? do_raw_spin_trylock+0x270/0x270 [ 296.031887] ? security_capable+0x99/0xc0 [ 296.031913] sget_userns+0x278/0x850 [ 296.031930] ? gfs2_kill_sb+0x1a0/0x1a0 [ 296.031953] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 296.031970] ? vfs_get_super+0x270/0x270 [ 296.041985] ? kasan_check_read+0x11/0x20 [ 296.042001] ? do_raw_spin_unlock+0xa7/0x330 [ 296.042017] ? do_raw_spin_trylock+0x270/0x270 [ 296.042044] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 12:26:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0x0, 0x0) [ 296.042084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.042104] ? ns_capable_common+0x13f/0x170 [ 296.049692] ? gfs2_kill_sb+0x1a0/0x1a0 [ 296.049707] sget+0x10b/0x150 [ 296.049730] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 296.058102] gfs2_mount+0x1a7/0x712 [ 296.058121] ? fill_super+0x1a10/0x1a10 [ 296.058144] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.058162] ? rcu_pm_notify+0xc0/0xc0 [ 296.058189] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.066132] ? alloc_pages_current+0x17b/0x350 12:26:06 executing program 3: syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x1100082) r0 = memfd_create(0x0, 0x0) pwritev(r0, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x6) [ 296.066150] ? fill_super+0x1a10/0x1a10 [ 296.066169] legacy_get_tree+0x12f/0x260 [ 296.066187] ? security_fs_context_validate+0x80/0xa0 [ 296.066220] vfs_get_tree+0x1cb/0x5c0 [ 296.074195] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 296.074217] do_mount+0x82a/0x1ff0 [ 296.074247] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.074271] ? copy_mount_string+0x40/0x40 [ 296.074292] ? copy_mount_options+0x5f/0x430 [ 296.082404] ? kmem_cache_alloc_trace+0x353/0x750 [ 296.082425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.082444] ? _copy_from_user+0xdf/0x150 [ 296.082465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.082483] ? copy_mount_options+0x315/0x430 [ 296.082508] ksys_mount+0x12d/0x140 [ 296.091746] __x64_sys_mount+0xbe/0x150 [ 296.091768] do_syscall_64+0x1b9/0x820 [ 296.091788] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.091807] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.091822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.091847] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.100127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:26:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1}) truncate(&(0x7f0000000040)='./file0\x00', 0x10000) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xd71, 0x400) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000180)={0x6, 0x401, 0x2, {0x77359400}, 0xe0, 0x400}) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f00000000c0)) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000140)=0x9) close(r3) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000200)={0x81, 0x31303453, 0x3082322e, 0x401, 0x0, @discrete={0x2d, 0x5}}) prctl$PR_CAPBSET_DROP(0x18, 0x1d) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 296.100145] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.100169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.100195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.100208] RIP: 0033:0x459fda [ 296.100242] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 296.108961] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 296.108977] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 296.108987] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 296.108997] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 296.109007] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 296.109016] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:07 executing program 3: mq_open(&(0x7f0000000240)="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", 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000040)='eth0\x00') 12:26:07 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:07 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x80080) r1 = memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0}, 0x8c4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r1, 0x0, 0x4800000) 12:26:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454e0, 0x0) [ 296.583513] FAULT_INJECTION: forcing a failure. [ 296.583513] name failslab, interval 1, probability 0, space 0, times 0 [ 296.614221] CPU: 0 PID: 10900 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 296.622872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.632235] Call Trace: [ 296.632262] dump_stack+0x244/0x39d [ 296.632288] ? dump_stack_print_info.cold.1+0x20/0x20 [ 296.632310] ? __kernel_text_address+0xd/0x40 [ 296.632337] ? unwind_get_return_address+0x61/0xa0 [ 296.632369] should_fail.cold.4+0xa/0x17 [ 296.657252] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.657281] ? save_stack+0x43/0xd0 [ 296.657300] ? kasan_kmalloc+0xc7/0xe0 [ 296.669909] ? kmem_cache_alloc_trace+0x152/0x750 [ 296.674774] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 296.679969] ? __list_lru_init+0x4d6/0x840 [ 296.679989] ? graph_lock+0x270/0x270 [ 296.680002] ? gfs2_mount+0x1a7/0x712 [ 296.680019] ? legacy_get_tree+0x12f/0x260 [ 296.680035] ? vfs_get_tree+0x1cb/0x5c0 [ 296.680050] ? do_mount+0x82a/0x1ff0 [ 296.680066] ? ksys_mount+0x12d/0x140 [ 296.680085] ? __x64_sys_mount+0xbe/0x150 [ 296.688118] ? do_syscall_64+0x1b9/0x820 [ 296.688141] ? find_held_lock+0x36/0x1c0 [ 296.688162] ? __lock_is_held+0xb5/0x140 [ 296.688192] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.696215] __should_failslab+0x124/0x180 [ 296.696253] should_failslab+0x9/0x14 [ 296.737598] kmem_cache_alloc_trace+0x2d7/0x750 [ 296.742272] ? __kmalloc_node+0x3c/0x70 [ 296.746255] ? __kmalloc_node+0x3c/0x70 [ 296.750251] ? rcu_read_lock_sched_held+0x14f/0x180 [ 296.755285] __memcg_init_list_lru_node+0x185/0x2d0 [ 296.760308] ? kvfree_rcu+0x20/0x20 [ 296.763946] ? __kmalloc_node+0x50/0x70 [ 296.767932] __list_lru_init+0x4d6/0x840 [ 296.772006] ? list_lru_destroy+0x500/0x500 [ 296.776341] ? up_write+0x7b/0x220 [ 296.779887] ? down_write_nested+0x130/0x130 [ 296.784301] ? down_read+0x120/0x120 [ 296.788027] ? init_wait_entry+0x1c0/0x1c0 [ 296.792266] ? prealloc_shrinker+0x172/0x340 [ 296.796691] alloc_super+0x907/0xb40 [ 296.800418] ? destroy_unused_super.part.10+0x110/0x110 [ 296.805780] ? sget_userns+0x17c/0x850 [ 296.809676] ? lock_downgrade+0x900/0x900 [ 296.813840] ? kasan_check_read+0x11/0x20 [ 296.817992] ? do_raw_spin_trylock+0x270/0x270 [ 296.822585] ? security_capable+0x99/0xc0 [ 296.826749] sget_userns+0x278/0x850 [ 296.830470] ? gfs2_kill_sb+0x1a0/0x1a0 [ 296.834456] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 296.839919] ? vfs_get_super+0x270/0x270 [ 296.843986] ? kasan_check_read+0x11/0x20 [ 296.848136] ? do_raw_spin_unlock+0xa7/0x330 [ 296.852547] ? do_raw_spin_trylock+0x270/0x270 [ 296.857151] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 296.862719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.868265] ? ns_capable_common+0x13f/0x170 [ 296.872683] ? gfs2_kill_sb+0x1a0/0x1a0 [ 296.876658] sget+0x10b/0x150 [ 296.879772] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 296.885246] gfs2_mount+0x1a7/0x712 [ 296.888902] ? fill_super+0x1a10/0x1a10 [ 296.892888] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.898431] ? rcu_pm_notify+0xc0/0xc0 [ 296.902339] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.907901] ? alloc_pages_current+0x17b/0x350 [ 296.912488] ? fill_super+0x1a10/0x1a10 [ 296.916469] legacy_get_tree+0x12f/0x260 [ 296.920538] ? security_fs_context_validate+0x80/0xa0 [ 296.925736] vfs_get_tree+0x1cb/0x5c0 [ 296.929552] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 296.934317] do_mount+0x82a/0x1ff0 [ 296.937883] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.943429] ? copy_mount_string+0x40/0x40 [ 296.947676] ? copy_mount_options+0x5f/0x430 [ 296.952091] ? kmem_cache_alloc_trace+0x353/0x750 [ 296.956940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.962487] ? _copy_from_user+0xdf/0x150 [ 296.966645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.972190] ? copy_mount_options+0x315/0x430 [ 296.976710] ksys_mount+0x12d/0x140 [ 296.980360] __x64_sys_mount+0xbe/0x150 [ 296.984351] do_syscall_64+0x1b9/0x820 [ 296.988273] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.993663] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.998597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.003447] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.008471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.014014] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.019049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.023923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.029124] RIP: 0033:0x459fda [ 297.032345] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 297.051259] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 297.058971] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 297.066250] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 297.073524] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 297.080793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 297.088072] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x10, 0x9, 0xfff}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x800, 0x2, [0x7fe000000, 0x7]}, &(0x7f0000000100)=0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80041270, &(0x7f0000000040)) 12:26:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 12:26:07 executing program 3: r0 = memfd_create(&(0x7f0000000240)="3a2b6c6f230060766fdc2e0738dd41c97e2706edd6b4b2218216a1c508f7f35f9d795cb6e36202dc87ae64a8d02058d8ff1909655030e13f3607b1a7dd209444fed0167fc2ce93f869", 0x0) pwritev(r0, &(0x7f0000002300)=[{&(0x7f00000002c0)="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", 0xd41}], 0x1, 0x17) 12:26:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x20008040) 12:26:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)='1m', 0x2) 12:26:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5451, 0x0) 12:26:07 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount$fuseblk(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80008, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x24020400) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 12:26:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @local, 'ip6tnl0\x00'}}, 0x80, 0x0}}], 0x1, 0x40) [ 297.429412] FAULT_INJECTION: forcing a failure. [ 297.429412] name failslab, interval 1, probability 0, space 0, times 0 [ 297.449867] CPU: 0 PID: 10940 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 297.458500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.467860] Call Trace: [ 297.470479] dump_stack+0x244/0x39d [ 297.474131] ? dump_stack_print_info.cold.1+0x20/0x20 12:26:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000180)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "ffacc7cd201ff47241eb1ffb8b075e4b5b1acdae7fa0d77869e018771fe0ddfbcf943340d88ce03af453d29c3b8fdd0ffd00e1d01e56f7214fcf2b21088a60"}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40488c1}, 0x0) [ 297.479347] ? __kernel_text_address+0xd/0x40 [ 297.483856] ? unwind_get_return_address+0x61/0xa0 [ 297.488808] should_fail.cold.4+0xa/0x17 [ 297.492888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.498019] ? save_stack+0x43/0xd0 [ 297.501660] ? kasan_kmalloc+0xc7/0xe0 [ 297.505564] ? kmem_cache_alloc_trace+0x152/0x750 [ 297.510423] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 297.515653] ? __list_lru_init+0x4d6/0x840 [ 297.519907] ? graph_lock+0x270/0x270 [ 297.523742] ? gfs2_mount+0x1a7/0x712 [ 297.527562] ? legacy_get_tree+0x12f/0x260 [ 297.527580] ? vfs_get_tree+0x1cb/0x5c0 [ 297.527597] ? do_mount+0x82a/0x1ff0 [ 297.527613] ? ksys_mount+0x12d/0x140 [ 297.527629] ? __x64_sys_mount+0xbe/0x150 [ 297.527649] ? do_syscall_64+0x1b9/0x820 [ 297.539563] ? find_held_lock+0x36/0x1c0 [ 297.539586] ? __lock_is_held+0xb5/0x140 [ 297.539619] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.539648] __should_failslab+0x124/0x180 [ 297.539668] should_failslab+0x9/0x14 [ 297.539685] kmem_cache_alloc_trace+0x2d7/0x750 12:26:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) [ 297.539700] ? __kmalloc_node+0x3c/0x70 [ 297.539719] ? __kmalloc_node+0x3c/0x70 [ 297.586348] ? rcu_read_lock_sched_held+0x14f/0x180 [ 297.591404] __memcg_init_list_lru_node+0x185/0x2d0 [ 297.596436] ? kvfree_rcu+0x20/0x20 [ 297.600076] ? __kmalloc_node+0x50/0x70 [ 297.604075] __list_lru_init+0x4d6/0x840 [ 297.608155] ? list_lru_destroy+0x500/0x500 [ 297.612527] ? up_write+0x7b/0x220 [ 297.616081] ? down_write_nested+0x130/0x130 [ 297.620500] ? down_read+0x120/0x120 [ 297.620523] ? init_wait_entry+0x1c0/0x1c0 [ 297.620538] ? prealloc_shrinker+0x172/0x340 [ 297.620568] alloc_super+0x907/0xb40 [ 297.620592] ? destroy_unused_super.part.10+0x110/0x110 [ 297.620605] ? sget_userns+0x17c/0x850 [ 297.620622] ? lock_downgrade+0x900/0x900 [ 297.620650] ? kasan_check_read+0x11/0x20 [ 297.628598] ? do_raw_spin_trylock+0x270/0x270 [ 297.628618] ? security_capable+0x99/0xc0 [ 297.628644] sget_userns+0x278/0x850 [ 297.628662] ? gfs2_kill_sb+0x1a0/0x1a0 [ 297.628684] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 297.628701] ? vfs_get_super+0x270/0x270 [ 297.680323] ? kasan_check_read+0x11/0x20 [ 297.684472] ? do_raw_spin_unlock+0xa7/0x330 [ 297.688881] ? do_raw_spin_trylock+0x270/0x270 [ 297.693482] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.699053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.704595] ? ns_capable_common+0x13f/0x170 [ 297.709033] ? gfs2_kill_sb+0x1a0/0x1a0 [ 297.713025] sget+0x10b/0x150 [ 297.716131] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 297.721570] gfs2_mount+0x1a7/0x712 [ 297.725202] ? fill_super+0x1a10/0x1a10 [ 297.729183] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 297.734726] ? rcu_pm_notify+0xc0/0xc0 [ 297.738624] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 297.744164] ? alloc_pages_current+0x17b/0x350 [ 297.748751] ? fill_super+0x1a10/0x1a10 [ 297.752735] legacy_get_tree+0x12f/0x260 [ 297.756803] ? security_fs_context_validate+0x80/0xa0 [ 297.762011] vfs_get_tree+0x1cb/0x5c0 [ 297.765816] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 297.770581] do_mount+0x82a/0x1ff0 [ 297.774127] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 297.779659] ? copy_mount_string+0x40/0x40 [ 297.783892] ? copy_mount_options+0x5f/0x430 [ 297.788319] ? kmem_cache_alloc_trace+0x353/0x750 [ 297.793166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.798707] ? _copy_from_user+0xdf/0x150 [ 297.802853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.808381] ? copy_mount_options+0x315/0x430 [ 297.812867] ksys_mount+0x12d/0x140 [ 297.816516] __x64_sys_mount+0xbe/0x150 [ 297.820511] do_syscall_64+0x1b9/0x820 [ 297.824405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.829775] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.834711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.839555] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.844575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.850125] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.855150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.860006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.865212] RIP: 0033:0x459fda 12:26:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x501000) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000080)={0x0, 0x380000, 0x20, &(0x7f0000000040)=0x3f}) [ 297.868453] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 297.887385] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 297.895102] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 297.902364] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 297.909655] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 297.916954] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 297.924220] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:08 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, 0x0) 12:26:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000200)="766574000000000000000002bd6800") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) gettid() 12:26:08 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cb, 0x0) 12:26:08 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 12:26:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, 0x0, 0x4, 0x519}, 0x14}}, 0x0) [ 298.162703] FAULT_INJECTION: forcing a failure. [ 298.162703] name failslab, interval 1, probability 0, space 0, times 0 [ 298.175622] CPU: 1 PID: 10978 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 298.184237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.193602] Call Trace: [ 298.196222] dump_stack+0x244/0x39d [ 298.199888] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.205134] ? graph_lock+0x270/0x270 [ 298.208953] should_fail.cold.4+0xa/0x17 [ 298.213051] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.218184] ? find_held_lock+0x36/0x1c0 [ 298.222277] ? graph_lock+0x270/0x270 [ 298.226094] ? graph_lock+0x270/0x270 [ 298.229921] ? lock_downgrade+0x900/0x900 [ 298.234090] ? find_held_lock+0x36/0x1c0 [ 298.238178] ? __lock_is_held+0xb5/0x140 [ 298.242273] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.247745] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.253236] ? __kmalloc_node+0x3c/0x70 [ 298.257252] __should_failslab+0x124/0x180 [ 298.261511] should_failslab+0x9/0x14 [ 298.265334] __kmalloc+0x2e0/0x760 [ 298.268897] ? __kmalloc_node+0x50/0x70 [ 298.272889] ? __list_lru_init+0x151/0x840 [ 298.277156] __list_lru_init+0x151/0x840 [ 298.281245] ? list_lru_destroy+0x500/0x500 [ 298.285585] ? up_write+0x7b/0x220 [ 298.289140] ? down_read+0x120/0x120 [ 298.292875] ? init_wait_entry+0x1c0/0x1c0 [ 298.297145] ? prealloc_shrinker+0x172/0x340 [ 298.301600] alloc_super+0x933/0xb40 [ 298.305332] ? destroy_unused_super.part.10+0x110/0x110 [ 298.310708] ? sget_userns+0x17c/0x850 [ 298.314610] ? lock_downgrade+0x900/0x900 [ 298.318791] ? kasan_check_read+0x11/0x20 [ 298.322966] ? do_raw_spin_trylock+0x270/0x270 [ 298.327579] ? security_capable+0x99/0xc0 [ 298.331748] sget_userns+0x278/0x850 [ 298.335474] ? gfs2_kill_sb+0x1a0/0x1a0 [ 298.339472] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 298.344938] ? vfs_get_super+0x270/0x270 [ 298.349011] ? kasan_check_read+0x11/0x20 [ 298.353172] ? do_raw_spin_unlock+0xa7/0x330 [ 298.357598] ? do_raw_spin_trylock+0x270/0x270 [ 298.362202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.367788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.373351] ? ns_capable_common+0x13f/0x170 [ 298.377775] ? gfs2_kill_sb+0x1a0/0x1a0 [ 298.381760] sget+0x10b/0x150 [ 298.384879] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 298.390351] gfs2_mount+0x1a7/0x712 [ 298.394023] ? fill_super+0x1a10/0x1a10 [ 298.398018] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.403578] ? rcu_pm_notify+0xc0/0xc0 [ 298.407493] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.413053] ? alloc_pages_current+0x17b/0x350 [ 298.417662] ? fill_super+0x1a10/0x1a10 [ 298.421650] legacy_get_tree+0x12f/0x260 [ 298.425731] ? security_fs_context_validate+0x80/0xa0 [ 298.430939] vfs_get_tree+0x1cb/0x5c0 [ 298.434753] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 298.439529] do_mount+0x82a/0x1ff0 [ 298.443087] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.448656] ? copy_mount_string+0x40/0x40 [ 298.452907] ? copy_mount_options+0x5f/0x430 [ 298.457341] ? kmem_cache_alloc_trace+0x353/0x750 [ 298.462201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.467762] ? _copy_from_user+0xdf/0x150 [ 298.471930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.477479] ? copy_mount_options+0x315/0x430 [ 298.481991] ksys_mount+0x12d/0x140 [ 298.485638] __x64_sys_mount+0xbe/0x150 [ 298.489634] do_syscall_64+0x1b9/0x820 [ 298.493539] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.498918] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.503872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.508727] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.513758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.519307] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.524345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.529213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.534419] RIP: 0033:0x459fda [ 298.537627] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 298.556543] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 298.564267] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 298.571544] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 298.578822] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 298.586107] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 298.593403] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 [ 298.608598] : renamed from vet 12:26:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = dup2(r0, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)="0000000000000000000000c6cac4004c489ebf2cd887ca60d2123a52edd4f2b6ef5423d895afd79799ddccf3a529533ade0a7a4ef1e5ddf7b909524f5ae22e8c6ea4ba8e93c13f0bb76731b263c33a11fb3bde24af5aded53132beef8dc8e5ccb3a66098fd941556a6e14ba9015aee986e8cccec01cb1087704f0358b950d48994c6d9e4743a0a03925561ac9399", r1}, 0xcf) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000050050000200100002001000000000000a0020000a0020000800400008004000080040000800400008004000004000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000efffffffff0f0000000e00000000000000cce3ec53d7ff2f8db1138b641b5b67e0e693de8b144d666c1c4c52eac8e6d18eb0ac9eaf204400c5bf24d7e1d1ed1aa0003199e3486200675acd49862c6b7af304329ac2f5a9225a7fc1a0026e2fa4022a2b5a682cea60554a70cee5599dc5da68798eec8a72a9726a473682c39c752c2f20e54ef540cc4c3719820f2e7dc4af84a508035b42970a6fe6f1676e3b860a5810161b262de9574ca8a1b566332a4811"], @ANYBLOB="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"], 0x5b0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:09 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 298.788311] FAULT_INJECTION: forcing a failure. [ 298.788311] name failslab, interval 1, probability 0, space 0, times 0 [ 298.816401] CPU: 1 PID: 10997 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 298.825015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.834383] Call Trace: [ 298.836989] dump_stack+0x244/0x39d [ 298.840663] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.845880] ? graph_lock+0x270/0x270 [ 298.849719] should_fail.cold.4+0xa/0x17 [ 298.853797] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.858943] ? find_held_lock+0x36/0x1c0 [ 298.863022] ? graph_lock+0x270/0x270 [ 298.866841] ? graph_lock+0x270/0x270 [ 298.870656] ? lock_downgrade+0x900/0x900 [ 298.874850] ? find_held_lock+0x36/0x1c0 [ 298.878926] ? __lock_is_held+0xb5/0x140 [ 298.878956] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.878972] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.878993] ? __kmalloc_node+0x3c/0x70 [ 298.897914] __should_failslab+0x124/0x180 [ 298.902180] should_failslab+0x9/0x14 [ 298.905992] __kmalloc+0x2e0/0x760 [ 298.909546] ? __kmalloc_node+0x50/0x70 [ 298.913533] ? __list_lru_init+0x151/0x840 [ 298.917779] __list_lru_init+0x151/0x840 [ 298.917801] ? list_lru_destroy+0x500/0x500 [ 298.917821] ? up_write+0x7b/0x220 [ 298.917852] ? down_read+0x120/0x120 [ 298.917874] ? init_wait_entry+0x1c0/0x1c0 [ 298.937770] ? prealloc_shrinker+0x172/0x340 [ 298.942201] alloc_super+0x933/0xb40 [ 298.945938] ? destroy_unused_super.part.10+0x110/0x110 [ 298.945951] ? sget_userns+0x17c/0x850 [ 298.945971] ? lock_downgrade+0x900/0x900 [ 298.945994] ? kasan_check_read+0x11/0x20 [ 298.963521] ? do_raw_spin_trylock+0x270/0x270 [ 298.968118] ? security_capable+0x99/0xc0 [ 298.972289] sget_userns+0x278/0x850 [ 298.976032] ? gfs2_kill_sb+0x1a0/0x1a0 [ 298.980063] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 298.985524] ? vfs_get_super+0x270/0x270 [ 298.985540] ? kasan_check_read+0x11/0x20 [ 298.985556] ? do_raw_spin_unlock+0xa7/0x330 [ 298.985571] ? do_raw_spin_trylock+0x270/0x270 [ 298.985599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 299.008313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.013880] ? ns_capable_common+0x13f/0x170 [ 299.018303] ? gfs2_kill_sb+0x1a0/0x1a0 [ 299.022287] sget+0x10b/0x150 [ 299.025408] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 299.030880] gfs2_mount+0x1a7/0x712 [ 299.030898] ? fill_super+0x1a10/0x1a10 [ 299.030919] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.030937] ? rcu_pm_notify+0xc0/0xc0 [ 299.030963] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.030984] ? alloc_pages_current+0x17b/0x350 [ 299.058087] ? fill_super+0x1a10/0x1a10 [ 299.058108] legacy_get_tree+0x12f/0x260 [ 299.058128] ? security_fs_context_validate+0x80/0xa0 [ 299.058149] vfs_get_tree+0x1cb/0x5c0 [ 299.058169] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 299.079921] do_mount+0x82a/0x1ff0 [ 299.083491] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.089049] ? copy_mount_string+0x40/0x40 [ 299.093309] ? copy_mount_options+0x5f/0x430 [ 299.097735] ? kmem_cache_alloc_trace+0x353/0x750 [ 299.102600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.102619] ? copy_mount_options+0x315/0x430 [ 299.102642] ksys_mount+0x12d/0x140 [ 299.102664] __x64_sys_mount+0xbe/0x150 [ 299.102686] do_syscall_64+0x1b9/0x820 [ 299.102709] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.120338] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.120355] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.120375] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.120395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.120413] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.120436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.120460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.134604] RIP: 0033:0x459fda [ 299.134621] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 12:26:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454d2, 0x0) 12:26:09 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) [ 299.134631] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 299.134647] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 299.134657] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 299.134667] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 299.134681] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 299.159908] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:09 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) setrlimit(0x0, 0x0) 12:26:09 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) getrusage(0x1, &(0x7f0000000000)) 12:26:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x0) [ 299.471014] FAULT_INJECTION: forcing a failure. [ 299.471014] name failslab, interval 1, probability 0, space 0, times 0 [ 299.486766] CPU: 0 PID: 11021 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 299.495369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.504732] Call Trace: [ 299.507367] dump_stack+0x244/0x39d [ 299.511031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.516261] ? __kernel_text_address+0xd/0x40 [ 299.520771] ? unwind_get_return_address+0x61/0xa0 [ 299.525726] should_fail.cold.4+0xa/0x17 [ 299.529825] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.534959] ? save_stack+0x43/0xd0 [ 299.538593] ? kasan_kmalloc+0xc7/0xe0 [ 299.542496] ? kmem_cache_alloc_trace+0x152/0x750 [ 299.547354] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 299.552560] ? __list_lru_init+0x4d6/0x840 [ 299.556809] ? graph_lock+0x270/0x270 [ 299.560647] ? gfs2_mount+0x1a7/0x712 [ 299.564477] ? legacy_get_tree+0x12f/0x260 [ 299.568739] ? vfs_get_tree+0x1cb/0x5c0 [ 299.572734] ? do_mount+0x82a/0x1ff0 [ 299.576464] ? ksys_mount+0x12d/0x140 [ 299.580279] ? __x64_sys_mount+0xbe/0x150 [ 299.584898] ? do_syscall_64+0x1b9/0x820 [ 299.588977] ? find_held_lock+0x36/0x1c0 [ 299.593056] ? __lock_is_held+0xb5/0x140 [ 299.597210] ? __sctp_write_space+0x5c8/0x780 [ 299.601739] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.607214] __should_failslab+0x124/0x180 [ 299.611488] should_failslab+0x9/0x14 [ 299.615306] kmem_cache_alloc_trace+0x2d7/0x750 [ 299.620003] ? __kmalloc_node+0x3c/0x70 [ 299.623983] ? __kmalloc_node+0x3c/0x70 [ 299.627968] ? rcu_read_lock_sched_held+0x14f/0x180 [ 299.632999] __memcg_init_list_lru_node+0x185/0x2d0 [ 299.638024] ? kvfree_rcu+0x20/0x20 [ 299.641673] ? __kmalloc_node+0x50/0x70 [ 299.645663] __list_lru_init+0x4d6/0x840 [ 299.649755] ? list_lru_destroy+0x500/0x500 [ 299.654090] ? up_write+0x7b/0x220 [ 299.657639] ? down_write_nested+0x130/0x130 [ 299.662062] ? down_read+0x120/0x120 [ 299.665837] ? init_wait_entry+0x1c0/0x1c0 [ 299.670094] ? prealloc_shrinker+0x172/0x340 [ 299.674525] alloc_super+0x907/0xb40 [ 299.678271] ? destroy_unused_super.part.10+0x110/0x110 [ 299.683644] ? sget_userns+0x17c/0x850 [ 299.687551] ? lock_downgrade+0x900/0x900 [ 299.691721] ? kasan_check_read+0x11/0x20 [ 299.695884] ? do_raw_spin_trylock+0x270/0x270 [ 299.700549] ? security_capable+0x99/0xc0 [ 299.704720] sget_userns+0x278/0x850 [ 299.708483] ? gfs2_kill_sb+0x1a0/0x1a0 [ 299.712461] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 299.717915] ? vfs_get_super+0x270/0x270 [ 299.721981] ? kasan_check_read+0x11/0x20 [ 299.726154] ? do_raw_spin_unlock+0xa7/0x330 [ 299.730574] ? do_raw_spin_trylock+0x270/0x270 [ 299.735176] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 299.740778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.746323] ? ns_capable_common+0x13f/0x170 [ 299.750752] ? gfs2_kill_sb+0x1a0/0x1a0 [ 299.754749] sget+0x10b/0x150 [ 299.757872] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 299.763341] gfs2_mount+0x1a7/0x712 [ 299.766982] ? fill_super+0x1a10/0x1a10 12:26:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {0x0}, {0x0}], 0x5}}], 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) [ 299.770976] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.776527] ? rcu_pm_notify+0xc0/0xc0 [ 299.780442] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.786025] ? alloc_pages_current+0x17b/0x350 [ 299.790615] ? fill_super+0x1a10/0x1a10 [ 299.794598] legacy_get_tree+0x12f/0x260 [ 299.798690] ? security_fs_context_validate+0x80/0xa0 [ 299.803899] vfs_get_tree+0x1cb/0x5c0 [ 299.807705] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 299.812489] do_mount+0x82a/0x1ff0 [ 299.816092] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.816116] ? copy_mount_string+0x40/0x40 [ 299.816139] ? copy_mount_options+0x5f/0x430 [ 299.816162] ? kmem_cache_alloc_trace+0x353/0x750 [ 299.835172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.840732] ? _copy_from_user+0xdf/0x150 [ 299.844912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.850463] ? copy_mount_options+0x315/0x430 [ 299.854990] ksys_mount+0x12d/0x140 [ 299.858617] __x64_sys_mount+0xbe/0x150 [ 299.862621] do_syscall_64+0x1b9/0x820 [ 299.866558] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.870157] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 299.871942] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.871958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.871977] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.871995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.872010] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.872038] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:26:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000280)=0x803, 0x4) [ 299.872063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.925070] RIP: 0033:0x459fda [ 299.928274] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 299.947171] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 299.947187] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 299.947196] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 12:26:10 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000300000000000019078ac231eaa9864afd3287a907800000000450000000010000000000000ac2314aaac141400"], 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0xef, {0x2, 0x4e22, @dev}, {0x2, 0x4e23, @empty}, {0x2, 0x4e20, @broadcast}, 0x80, 0x7f, 0x10000, 0x5, 0x10001, 0x0, 0x6, 0x0, 0x3}) 12:26:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff3d, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 12:26:10 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 299.947205] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 299.947214] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 299.947223] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:10 executing program 3: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000580)='./file0/bus\x00', 0x0) execve(0x0, 0x0, 0x0) 12:26:10 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:10 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000580)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) execveat(0xffffffffffffffff, &(0x7f0000000380)='./control\x00', 0x0, 0x0, 0x0) 12:26:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) 12:26:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454e1, 0x0) 12:26:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x12002, 0x0) ioctl$TIOCEXCL(r1, 0x540c) 12:26:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil, 0x0) [ 300.292813] FAULT_INJECTION: forcing a failure. [ 300.292813] name failslab, interval 1, probability 0, space 0, times 0 [ 300.354530] CPU: 0 PID: 11076 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 300.363151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.363158] Call Trace: [ 300.363183] dump_stack+0x244/0x39d [ 300.363206] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.383966] ? __kernel_text_address+0xd/0x40 [ 300.388478] ? unwind_get_return_address+0x61/0xa0 [ 300.393435] should_fail.cold.4+0xa/0x17 [ 300.397514] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.402649] ? save_stack+0x43/0xd0 [ 300.402665] ? kasan_kmalloc+0xc7/0xe0 [ 300.402681] ? kmem_cache_alloc_trace+0x152/0x750 [ 300.402697] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 300.402711] ? __list_lru_init+0x4d6/0x840 [ 300.402733] ? graph_lock+0x270/0x270 [ 300.420281] ? gfs2_mount+0x1a7/0x712 [ 300.420299] ? legacy_get_tree+0x12f/0x260 [ 300.420315] ? vfs_get_tree+0x1cb/0x5c0 [ 300.420337] ? do_mount+0x82a/0x1ff0 [ 300.420353] ? ksys_mount+0x12d/0x140 [ 300.420372] ? __x64_sys_mount+0xbe/0x150 [ 300.432200] ? do_syscall_64+0x1b9/0x820 [ 300.432223] ? find_held_lock+0x36/0x1c0 [ 300.432257] ? __lock_is_held+0xb5/0x140 [ 300.440586] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.452247] __should_failslab+0x124/0x180 [ 300.452268] should_failslab+0x9/0x14 [ 300.452286] kmem_cache_alloc_trace+0x2d7/0x750 [ 300.452301] ? __kmalloc_node+0x3c/0x70 [ 300.452316] ? __kmalloc_node+0x3c/0x70 [ 300.452341] ? rcu_read_lock_sched_held+0x14f/0x180 [ 300.452362] __memcg_init_list_lru_node+0x185/0x2d0 [ 300.464583] ? kvfree_rcu+0x20/0x20 [ 300.464601] ? __kmalloc_node+0x50/0x70 [ 300.464627] __list_lru_init+0x4d6/0x840 [ 300.504372] ? list_lru_destroy+0x500/0x500 [ 300.512419] ? up_write+0x7b/0x220 [ 300.512435] ? down_write_nested+0x130/0x130 [ 300.512450] ? down_read+0x120/0x120 [ 300.512470] ? init_wait_entry+0x1c0/0x1c0 [ 300.512484] ? prealloc_shrinker+0x172/0x340 [ 300.512526] alloc_super+0x907/0xb40 [ 300.520432] ? destroy_unused_super.part.10+0x110/0x110 [ 300.520444] ? sget_userns+0x17c/0x850 [ 300.520464] ? lock_downgrade+0x900/0x900 [ 300.546338] ? kasan_check_read+0x11/0x20 [ 300.546358] ? do_raw_spin_trylock+0x270/0x270 [ 300.546379] ? security_capable+0x99/0xc0 [ 300.567295] sget_userns+0x278/0x850 [ 300.571025] ? gfs2_kill_sb+0x1a0/0x1a0 [ 300.575013] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 300.575028] ? vfs_get_super+0x270/0x270 [ 300.575044] ? kasan_check_read+0x11/0x20 [ 300.575064] ? do_raw_spin_unlock+0xa7/0x330 [ 300.593507] ? do_raw_spin_trylock+0x270/0x270 [ 300.593534] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 12:26:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x5d9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x0) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) sendto(r2, &(0x7f0000000280)="cd7188cc6246dee52cc0dfe9c3c258ab6f4c0c6064446560583810a2866509a9f4fd51099926f494cb4b5cf666ab312e169899d41f86b525a96af4628e7ae29f", 0x40, 0x4000, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) rt_sigpending(0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x3) r5 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xc25, 0x62, 0x7, 0x273908f8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffff800, 0x2, 0x5, 0x10000, 0x1, 0x1, 0x1, 0x100000000, 0xffff, 0x0, 0x800, 0x1000, 0x1986, 0x1000, 0x6, 0x0, 0x8, 0x80000001, 0x7f, 0x1, 0x3, 0x0, 0x67cf, 0x0, 0x9, 0xc45e, 0x0, 0x9, 0x3, @perf_bp={0x0, 0x8}, 0x20000, 0x8, 0x1f, 0x3, 0xfffffffffffffff7, 0x6}, 0xffffffffffffffff, 0x5, r5, 0xb) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) ioctl$BLKROGET(r6, 0x125e, &(0x7f0000000100)) prctl$PR_CAPBSET_READ(0x17, 0x23) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f00000002c0)={0x7, {{0xa, 0x4e24, 0x1ff, @loopback, 0xfaf}}, {{0xa, 0x0, 0xc91d, @loopback, 0x2}}}, 0x108) readahead(r4, 0xffffffffffffff35, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 300.593576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.603680] ? ns_capable_common+0x13f/0x170 [ 300.603702] ? gfs2_kill_sb+0x1a0/0x1a0 [ 300.603715] sget+0x10b/0x150 [ 300.603739] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 300.626166] gfs2_mount+0x1a7/0x712 [ 300.629809] ? fill_super+0x1a10/0x1a10 [ 300.633804] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.639366] ? rcu_pm_notify+0xc0/0xc0 [ 300.643289] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 300.648855] ? alloc_pages_current+0x17b/0x350 [ 300.653455] ? fill_super+0x1a10/0x1a10 [ 300.657444] legacy_get_tree+0x12f/0x260 [ 300.661522] ? security_fs_context_validate+0x80/0xa0 [ 300.666728] vfs_get_tree+0x1cb/0x5c0 [ 300.670543] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 300.675318] do_mount+0x82a/0x1ff0 [ 300.678879] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.684434] ? copy_mount_string+0x40/0x40 [ 300.688693] ? copy_mount_options+0x5f/0x430 [ 300.693145] ? kmem_cache_alloc_trace+0x353/0x750 [ 300.698005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.703562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.709114] ? copy_mount_options+0x315/0x430 [ 300.713804] ksys_mount+0x12d/0x140 [ 300.717468] __x64_sys_mount+0xbe/0x150 [ 300.721458] do_syscall_64+0x1b9/0x820 [ 300.725370] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.730749] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.735711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.740570] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.745604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.751170] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.756204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.761089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.766292] RIP: 0033:0x459fda [ 300.769518] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 300.788430] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 300.796801] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 300.796819] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 300.811386] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 300.818672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 300.825961] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:11 executing program 4: getrandom(&(0x7f0000000000)=""/10, 0xfffffd47, 0x3) 12:26:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cd, 0x0) 12:26:11 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x40003) [ 301.042842] FAULT_INJECTION: forcing a failure. [ 301.042842] name failslab, interval 1, probability 0, space 0, times 0 [ 301.077726] CPU: 0 PID: 11108 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 301.086341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.095699] Call Trace: [ 301.098313] dump_stack+0x244/0x39d [ 301.101979] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.107193] ? __kernel_text_address+0xd/0x40 [ 301.111708] ? unwind_get_return_address+0x61/0xa0 [ 301.116659] should_fail.cold.4+0xa/0x17 [ 301.120757] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.125887] ? save_stack+0x43/0xd0 [ 301.129543] ? kasan_kmalloc+0xc7/0xe0 [ 301.133473] ? kmem_cache_alloc_trace+0x152/0x750 12:26:11 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000600)={'syz'}, &(0x7f0000000800)='b', 0x1, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) 12:26:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) [ 301.138329] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 301.143622] ? __list_lru_init+0x4d6/0x840 [ 301.147884] ? graph_lock+0x270/0x270 [ 301.151694] ? gfs2_mount+0x1a7/0x712 [ 301.155509] ? legacy_get_tree+0x12f/0x260 [ 301.159826] ? vfs_get_tree+0x1cb/0x5c0 [ 301.163809] ? do_mount+0x82a/0x1ff0 [ 301.167534] ? ksys_mount+0x12d/0x140 [ 301.171362] ? __x64_sys_mount+0xbe/0x150 [ 301.175525] ? do_syscall_64+0x1b9/0x820 [ 301.179607] ? find_held_lock+0x36/0x1c0 [ 301.183690] ? __lock_is_held+0xb5/0x140 [ 301.187777] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.193263] __should_failslab+0x124/0x180 [ 301.197522] should_failslab+0x9/0x14 [ 301.201353] kmem_cache_alloc_trace+0x2d7/0x750 [ 301.206049] ? __kmalloc_node+0x3c/0x70 [ 301.210063] __memcg_init_list_lru_node+0x185/0x2d0 [ 301.215096] ? kvfree_rcu+0x20/0x20 [ 301.218757] ? __kmalloc_node+0x50/0x70 [ 301.222765] __list_lru_init+0x4d6/0x840 [ 301.226845] ? list_lru_destroy+0x500/0x500 [ 301.231179] ? up_write+0x7b/0x220 [ 301.234734] ? down_write_nested+0x130/0x130 [ 301.239154] ? down_read+0x120/0x120 [ 301.242885] ? init_wait_entry+0x1c0/0x1c0 [ 301.242900] ? prealloc_shrinker+0x172/0x340 [ 301.242927] alloc_super+0x907/0xb40 [ 301.242952] ? destroy_unused_super.part.10+0x110/0x110 [ 301.242967] ? sget_userns+0x17c/0x850 [ 301.264586] ? lock_downgrade+0x900/0x900 [ 301.268770] ? kasan_check_read+0x11/0x20 [ 301.272933] ? do_raw_spin_trylock+0x270/0x270 [ 301.277555] ? security_capable+0x99/0xc0 [ 301.281723] sget_userns+0x278/0x850 [ 301.285452] ? gfs2_kill_sb+0x1a0/0x1a0 12:26:11 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) close(r0) [ 301.289452] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 301.294916] ? vfs_get_super+0x270/0x270 [ 301.298988] ? kasan_check_read+0x11/0x20 [ 301.303145] ? do_raw_spin_unlock+0xa7/0x330 [ 301.307567] ? do_raw_spin_trylock+0x270/0x270 [ 301.312169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.317756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.323311] ? ns_capable_common+0x13f/0x170 [ 301.327746] ? gfs2_kill_sb+0x1a0/0x1a0 [ 301.331732] sget+0x10b/0x150 [ 301.334868] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 301.340360] gfs2_mount+0x1a7/0x712 [ 301.344006] ? fill_super+0x1a10/0x1a10 [ 301.347993] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 301.353542] ? rcu_pm_notify+0xc0/0xc0 [ 301.357449] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 301.363009] ? alloc_pages_current+0x17b/0x350 [ 301.367607] ? fill_super+0x1a10/0x1a10 [ 301.371600] legacy_get_tree+0x12f/0x260 [ 301.375699] ? security_fs_context_validate+0x80/0xa0 [ 301.380906] vfs_get_tree+0x1cb/0x5c0 [ 301.384720] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 301.389497] do_mount+0x82a/0x1ff0 [ 301.393056] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 301.398613] ? copy_mount_string+0x40/0x40 [ 301.402891] ? copy_mount_options+0x5f/0x430 [ 301.407329] ? kmem_cache_alloc_trace+0x353/0x750 [ 301.412207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 301.417772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.423319] ? copy_mount_options+0x315/0x430 [ 301.427840] ksys_mount+0x12d/0x140 [ 301.431502] __x64_sys_mount+0xbe/0x150 [ 301.435499] do_syscall_64+0x1b9/0x820 [ 301.439409] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 12:26:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x0) [ 301.444785] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.449725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.454617] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.459645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.465209] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.470262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.475137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.480367] RIP: 0033:0x459fda 12:26:12 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0xfffffffffffffe30) [ 301.483573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 301.502479] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 301.510192] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 301.517466] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 301.524757] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 301.532035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:26:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x490043, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x5000000, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2}, 0x8) [ 301.539328] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x5d9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x0) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) sendto(r2, &(0x7f0000000280)="cd7188cc6246dee52cc0dfe9c3c258ab6f4c0c6064446560583810a2866509a9f4fd51099926f494cb4b5cf666ab312e169899d41f86b525a96af4628e7ae29f", 0x40, 0x4000, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) rt_sigpending(0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x3) r5 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xc25, 0x62, 0x7, 0x273908f8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffff800, 0x2, 0x5, 0x10000, 0x1, 0x1, 0x1, 0x100000000, 0xffff, 0x0, 0x800, 0x1000, 0x1986, 0x1000, 0x6, 0x0, 0x8, 0x80000001, 0x7f, 0x1, 0x3, 0x0, 0x67cf, 0x0, 0x9, 0xc45e, 0x0, 0x9, 0x3, @perf_bp={0x0, 0x8}, 0x20000, 0x8, 0x1f, 0x3, 0xfffffffffffffff7, 0x6}, 0xffffffffffffffff, 0x5, r5, 0xb) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) ioctl$BLKROGET(r6, 0x125e, &(0x7f0000000100)) prctl$PR_CAPBSET_READ(0x17, 0x23) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f00000002c0)={0x7, {{0xa, 0x4e24, 0x1ff, @loopback, 0xfaf}}, {{0xa, 0x0, 0xc91d, @loopback, 0x2}}}, 0x108) readahead(r4, 0xffffffffffffff35, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 12:26:12 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0xfffffffffffffe30) 12:26:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x800454dd, 0x0) 12:26:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x100000003, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4c4800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:26:12 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x4000000000030) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r1, 0x0, r2) 12:26:12 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0xfffffffffffffe30) 12:26:12 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0xfffffffffffffe30) [ 301.964061] FAULT_INJECTION: forcing a failure. [ 301.964061] name failslab, interval 1, probability 0, space 0, times 0 12:26:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 302.038266] CPU: 0 PID: 11160 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 302.046912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.056272] Call Trace: [ 302.058880] dump_stack+0x244/0x39d [ 302.062538] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.067834] ? __kernel_text_address+0xd/0x40 [ 302.072359] ? unwind_get_return_address+0x61/0xa0 [ 302.077316] should_fail.cold.4+0xa/0x17 [ 302.081398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.081422] ? save_stack+0x43/0xd0 [ 302.081437] ? kasan_kmalloc+0xc7/0xe0 [ 302.081451] ? kmem_cache_alloc_trace+0x152/0x750 [ 302.081467] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 302.081480] ? __list_lru_init+0x4d6/0x840 [ 302.081503] ? graph_lock+0x270/0x270 [ 302.090258] ? gfs2_mount+0x1a7/0x712 [ 302.090277] ? legacy_get_tree+0x12f/0x260 [ 302.090293] ? vfs_get_tree+0x1cb/0x5c0 [ 302.090309] ? do_mount+0x82a/0x1ff0 [ 302.090328] ? ksys_mount+0x12d/0x140 [ 302.104250] ? __x64_sys_mount+0xbe/0x150 [ 302.112265] ? do_syscall_64+0x1b9/0x820 [ 302.112289] ? find_held_lock+0x36/0x1c0 [ 302.112310] ? __lock_is_held+0xb5/0x140 [ 302.112419] ? l2cap_chan_del+0x398/0xab0 [ 302.112449] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.120594] __should_failslab+0x124/0x180 [ 302.120615] should_failslab+0x9/0x14 [ 302.120632] kmem_cache_alloc_trace+0x2d7/0x750 [ 302.120648] ? __kmalloc_node+0x3c/0x70 [ 302.120666] ? __kmalloc_node+0x3c/0x70 [ 302.128377] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.136313] __memcg_init_list_lru_node+0x185/0x2d0 [ 302.136343] ? kvfree_rcu+0x20/0x20 [ 302.144455] ? __kmalloc_node+0x50/0x70 [ 302.152650] __list_lru_init+0x4d6/0x840 [ 302.152671] ? list_lru_destroy+0x500/0x500 [ 302.152690] ? up_write+0x7b/0x220 [ 302.152707] ? down_read+0x120/0x120 [ 302.152728] ? init_wait_entry+0x1c0/0x1c0 [ 302.162404] ? prealloc_shrinker+0x172/0x340 [ 302.170887] alloc_super+0x933/0xb40 [ 302.170912] ? destroy_unused_super.part.10+0x110/0x110 [ 302.170924] ? sget_userns+0x17c/0x850 [ 302.170940] ? lock_downgrade+0x900/0x900 [ 302.170960] ? kasan_check_read+0x11/0x20 [ 302.170976] ? do_raw_spin_trylock+0x270/0x270 [ 302.170993] ? security_capable+0x99/0xc0 [ 302.171017] sget_userns+0x278/0x850 [ 302.196559] ? gfs2_kill_sb+0x1a0/0x1a0 [ 302.196583] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 302.196601] ? vfs_get_super+0x270/0x270 [ 302.229957] ? kasan_check_read+0x11/0x20 [ 302.229974] ? do_raw_spin_unlock+0xa7/0x330 [ 302.229989] ? do_raw_spin_trylock+0x270/0x270 [ 302.230016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.230053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.238061] ? ns_capable_common+0x13f/0x170 [ 302.238084] ? gfs2_kill_sb+0x1a0/0x1a0 [ 302.238102] sget+0x10b/0x150 [ 302.258722] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 302.258741] gfs2_mount+0x1a7/0x712 [ 302.258758] ? fill_super+0x1a10/0x1a10 [ 302.303924] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.303943] ? rcu_pm_notify+0xc0/0xc0 [ 302.303971] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 302.322583] ? alloc_pages_current+0x17b/0x350 [ 302.322602] ? fill_super+0x1a10/0x1a10 [ 302.322624] legacy_get_tree+0x12f/0x260 [ 302.332034] ? security_fs_context_validate+0x80/0xa0 [ 302.332055] vfs_get_tree+0x1cb/0x5c0 [ 302.332073] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 302.332093] do_mount+0x82a/0x1ff0 [ 302.332116] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.358470] ? copy_mount_string+0x40/0x40 [ 302.371784] ? copy_mount_options+0x5f/0x430 [ 302.376268] ? kmem_cache_alloc_trace+0x353/0x750 [ 302.381127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.386679] ? _copy_from_user+0xdf/0x150 [ 302.390849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.390868] ? copy_mount_options+0x315/0x430 [ 302.390890] ksys_mount+0x12d/0x140 [ 302.390912] __x64_sys_mount+0xbe/0x150 [ 302.390933] do_syscall_64+0x1b9/0x820 [ 302.390956] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.412437] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.412453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.412474] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.412494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.412510] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.412536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.438203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.438217] RIP: 0033:0x459fda [ 302.438245] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 302.475394] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 302.483129] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda 12:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x0) [ 302.490410] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 302.490421] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 302.490430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 302.490440] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:13 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) io_setup(0x40, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 12:26:13 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x100200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 12:26:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfeffffff00000000) [ 302.715861] FAULT_INJECTION: forcing a failure. [ 302.715861] name failslab, interval 1, probability 0, space 0, times 0 [ 302.734807] CPU: 1 PID: 11198 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 302.743413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.752777] Call Trace: [ 302.755382] dump_stack+0x244/0x39d [ 302.759070] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.764295] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 302.769593] ? rcu_read_unlock_special+0x370/0x370 [ 302.774539] should_fail.cold.4+0xa/0x17 [ 302.778619] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.783735] ? kernel_text_address+0x79/0xf0 [ 302.788157] ? unwind_get_return_address+0x61/0xa0 [ 302.793111] ? __save_stack_trace+0x8d/0xf0 [ 302.797454] ? graph_lock+0x270/0x270 [ 302.801287] ? find_held_lock+0x36/0x1c0 [ 302.805387] ? __lock_is_held+0xb5/0x140 [ 302.809586] ? __fib_validate_source+0x168/0x1c50 [ 302.814464] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.819961] ? check_preemption_disabled+0x48/0x280 [ 302.825003] __should_failslab+0x124/0x180 [ 302.829296] should_failslab+0x9/0x14 [ 302.833132] kmem_cache_alloc_trace+0x2d7/0x750 [ 302.837821] ? __kmalloc_node+0x3c/0x70 [ 302.841817] ? __kmalloc_node+0x3c/0x70 [ 302.845824] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.850884] __memcg_init_list_lru_node+0x185/0x2d0 [ 302.855916] ? kvfree_rcu+0x20/0x20 [ 302.855935] ? __kmalloc_node+0x50/0x70 [ 302.855973] __list_lru_init+0x4d6/0x840 [ 302.855993] ? list_lru_destroy+0x500/0x500 [ 302.856011] ? up_write+0x7b/0x220 [ 302.856033] ? down_read+0x120/0x120 [ 302.879285] ? init_wait_entry+0x1c0/0x1c0 [ 302.883534] ? prealloc_shrinker+0x172/0x340 [ 302.887967] alloc_super+0x933/0xb40 [ 302.887994] ? destroy_unused_super.part.10+0x110/0x110 [ 302.888006] ? sget_userns+0x17c/0x850 [ 302.888026] ? lock_downgrade+0x900/0x900 [ 302.888051] ? kasan_check_read+0x11/0x20 [ 302.888071] ? do_raw_spin_trylock+0x270/0x270 [ 302.909334] ? security_capable+0x99/0xc0 [ 302.909361] sget_userns+0x278/0x850 [ 302.909379] ? gfs2_kill_sb+0x1a0/0x1a0 [ 302.909402] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 302.909415] ? vfs_get_super+0x270/0x270 [ 302.909434] ? kasan_check_read+0x11/0x20 [ 302.931279] ? do_raw_spin_unlock+0xa7/0x330 [ 302.931301] ? do_raw_spin_trylock+0x270/0x270 [ 302.931335] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.931377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.931394] ? ns_capable_common+0x13f/0x170 [ 302.931416] ? gfs2_kill_sb+0x1a0/0x1a0 [ 302.944042] sget+0x10b/0x150 [ 302.944062] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 302.944080] gfs2_mount+0x1a7/0x712 [ 302.944098] ? fill_super+0x1a10/0x1a10 [ 302.944119] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.944138] ? rcu_pm_notify+0xc0/0xc0 [ 302.959808] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 302.959840] ? alloc_pages_current+0x17b/0x350 [ 302.959858] ? fill_super+0x1a10/0x1a10 [ 302.959892] legacy_get_tree+0x12f/0x260 [ 302.959912] ? security_fs_context_validate+0x80/0xa0 [ 302.959932] vfs_get_tree+0x1cb/0x5c0 [ 302.959949] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 302.959969] do_mount+0x82a/0x1ff0 [ 302.971449] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.971474] ? copy_mount_string+0x40/0x40 [ 302.971497] ? copy_mount_options+0x5f/0x430 [ 302.971516] ? kmem_cache_alloc_trace+0x353/0x750 [ 302.971537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.971571] ? _copy_from_user+0xdf/0x150 [ 302.971590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:26:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = semget$private(0x0, 0x4, 0x248) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000000)=""/199) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) [ 302.980687] ? copy_mount_options+0x315/0x430 [ 302.980711] ksys_mount+0x12d/0x140 [ 302.980733] __x64_sys_mount+0xbe/0x150 [ 302.980756] do_syscall_64+0x1b9/0x820 [ 302.980776] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.980795] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.980810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.980837] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.994202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.994221] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.994254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.994282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.994295] RIP: 0033:0x459fda [ 302.994312] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 302.994326] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 303.029716] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 303.063995] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 303.064005] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 303.064015] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 303.064025] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x2, 0x7, 0x4000, 0x9, 0x2}, 0x10}}, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, 0x0}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'bpq0\x00', &(0x7f0000000480)=ANY=[]}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, &(0x7f0000000140), r0, &(0x7f0000000240), 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 12:26:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000b00)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0) 12:26:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto(r1, &(0x7f0000000280)="cd7188cc6246dee52cc0dfe9c3c2", 0xe, 0x0, 0x0, 0x0) 12:26:14 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001900)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x48080) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)='/', 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) 12:26:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000300)) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000200)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={"00ac730000000000ec973f820f7c4000", 0xc201}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{r3, r4/1000+10000}, {r5, r6/1000+30000}}, 0x100) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfdfdffff00000000) 12:26:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) [ 303.951934] FAULT_INJECTION: forcing a failure. [ 303.951934] name failslab, interval 1, probability 0, space 0, times 0 [ 304.012395] CPU: 0 PID: 11342 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 304.021041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.030415] Call Trace: [ 304.033025] dump_stack+0x244/0x39d [ 304.036714] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.041953] ? __kernel_text_address+0xd/0x40 [ 304.046493] ? unwind_get_return_address+0x61/0xa0 [ 304.051455] should_fail.cold.4+0xa/0x17 [ 304.055532] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.060672] ? save_stack+0x43/0xd0 [ 304.064308] ? kasan_kmalloc+0xc7/0xe0 [ 304.068215] ? kmem_cache_alloc_trace+0x152/0x750 [ 304.073102] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 304.078303] ? __list_lru_init+0x4d6/0x840 [ 304.082555] ? graph_lock+0x270/0x270 [ 304.086373] ? gfs2_mount+0x1a7/0x712 [ 304.090196] ? legacy_get_tree+0x12f/0x260 [ 304.094461] ? vfs_get_tree+0x1cb/0x5c0 [ 304.098450] ? do_mount+0x82a/0x1ff0 [ 304.102176] ? ksys_mount+0x12d/0x140 [ 304.105990] ? __x64_sys_mount+0xbe/0x150 [ 304.110166] ? do_syscall_64+0x1b9/0x820 [ 304.114286] ? find_held_lock+0x36/0x1c0 [ 304.118371] ? __lock_is_held+0xb5/0x140 [ 304.122459] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.127935] __should_failslab+0x124/0x180 [ 304.132274] should_failslab+0x9/0x14 [ 304.136091] kmem_cache_alloc_trace+0x2d7/0x750 [ 304.140775] ? __kmalloc_node+0x3c/0x70 [ 304.144760] ? __kmalloc_node+0x3c/0x70 [ 304.148766] ? rcu_read_lock_sched_held+0x14f/0x180 [ 304.153801] __memcg_init_list_lru_node+0x185/0x2d0 [ 304.158836] ? kvfree_rcu+0x20/0x20 [ 304.162494] ? __kmalloc_node+0x50/0x70 [ 304.166488] __list_lru_init+0x4d6/0x840 [ 304.170567] ? list_lru_destroy+0x500/0x500 [ 304.174903] ? up_write+0x7b/0x220 [ 304.178459] ? down_read+0x120/0x120 [ 304.182191] ? init_wait_entry+0x1c0/0x1c0 [ 304.186503] ? prealloc_shrinker+0x172/0x340 [ 304.190936] alloc_super+0x933/0xb40 [ 304.194676] ? destroy_unused_super.part.10+0x110/0x110 [ 304.200089] ? sget_userns+0x17c/0x850 [ 304.204029] ? lock_downgrade+0x900/0x900 [ 304.208213] ? kasan_check_read+0x11/0x20 [ 304.212409] ? do_raw_spin_trylock+0x270/0x270 [ 304.217004] ? security_capable+0x99/0xc0 [ 304.221188] sget_userns+0x278/0x850 [ 304.224917] ? gfs2_kill_sb+0x1a0/0x1a0 [ 304.228937] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 304.234399] ? vfs_get_super+0x270/0x270 [ 304.238475] ? kasan_check_read+0x11/0x20 [ 304.242633] ? do_raw_spin_unlock+0xa7/0x330 [ 304.247054] ? do_raw_spin_trylock+0x270/0x270 [ 304.251701] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.257299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.262855] ? ns_capable_common+0x13f/0x170 [ 304.267286] ? gfs2_kill_sb+0x1a0/0x1a0 [ 304.271274] sget+0x10b/0x150 [ 304.274407] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 304.279872] gfs2_mount+0x1a7/0x712 [ 304.283512] ? fill_super+0x1a10/0x1a10 [ 304.287505] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 304.293090] ? rcu_pm_notify+0xc0/0xc0 [ 304.297013] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 304.302588] ? alloc_pages_current+0x17b/0x350 [ 304.307208] ? fill_super+0x1a10/0x1a10 [ 304.311205] legacy_get_tree+0x12f/0x260 [ 304.315296] ? security_fs_context_validate+0x80/0xa0 [ 304.320509] vfs_get_tree+0x1cb/0x5c0 [ 304.324329] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 304.329114] do_mount+0x82a/0x1ff0 [ 304.332687] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 304.338255] ? copy_mount_string+0x40/0x40 [ 304.342510] ? copy_mount_options+0x5f/0x430 [ 304.346939] ? kmem_cache_alloc_trace+0x353/0x750 [ 304.351797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.357353] ? _copy_from_user+0xdf/0x150 [ 304.361517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.367070] ? copy_mount_options+0x315/0x430 [ 304.371584] ksys_mount+0x12d/0x140 [ 304.375240] __x64_sys_mount+0xbe/0x150 [ 304.379247] do_syscall_64+0x1b9/0x820 [ 304.383152] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.388547] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.393489] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.398358] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.403395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.408958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.414007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.418873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.424071] RIP: 0033:0x459fda [ 304.427295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 304.446205] RSP: 002b:00007f9babf78a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 304.453926] RAX: ffffffffffffffda RBX: 00007f9babf78b30 RCX: 0000000000459fda [ 304.461202] RDX: 00007f9babf78ad0 RSI: 0000000020000a00 RDI: 00007f9babf78af0 [ 304.468486] RBP: 0000000020000a00 R08: 00007f9babf78b30 R09: 00007f9babf78ad0 [ 304.475767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 304.483046] R13: 0000000000000000 R14: 00000000004d8c00 R15: 0000000000000003 12:26:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xffffffff00000000) 12:26:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x800, 0x2, 0x717, 0x0, 0x5, 0x10400, 0x0, 0x8, 0x4, 0x9, 0x6, 0x20, 0xd1c5, 0x4, 0x0, 0xf67b, 0x9, 0x100000001, 0x0, 0x3, 0x100000000, 0x7fff, 0x7a, 0x100, 0x9, 0x3721, 0x1, 0x7fff, 0x8, 0x6, 0x2, 0xfffffffffffff4d8, 0x2, 0x8, 0x8, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x100000000}, 0x8, 0x8000, 0x81, 0x6, 0x8, 0x7f, 0x8}, 0x0, 0x9, r1, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000140)='ns\x00') fsetxattr$security_ima(r3, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v1={0x2, "e000a088874f0f"}, 0x8, 0x1) 12:26:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001900)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x48080) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)='/', 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) 12:26:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x40, 0x0, "5c7d866ff43751f8873fcb0dab400c418118817f88dd32c8a5bd1f96947a61b9c9627f989c7f422dd7658bd36505c1c3e348680b100694e23cb170b6156fe10ef3d50b45685df5fda61c86a7608eaf0a"}, 0xd8) connect$inet6(r1, &(0x7f0000000140), 0x1c) 12:26:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) rt_sigpending(0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) dup(0xffffffffffffffff) 12:26:15 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 12:26:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfeffffff) 12:26:15 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:15 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x3) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/224) [ 305.640288] gfs2: not a GFS2 filesystem 12:26:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfdfdffff) 12:26:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x800204}, 0xc) 12:26:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x182, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0x20}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x408000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 12:26:16 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Ofs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x800204}, 0xc) 12:26:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:16 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '\'vmnet1\'md5sum\x00'}, 0x0, 0x0) 12:26:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 12:26:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000008fc0)=[{&(0x7f0000008cc0)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000380)="b4", 0x1, 0x0, 0x0, 0x0) 12:26:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) 12:26:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfffffffe) 12:26:17 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Sfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) 12:26:17 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='(&!eth0$md5sumwlan0\\selinux\x00', 0x1c, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x80000101, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140), 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:17 executing program 4: r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, 0x0, 0x0) 12:26:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x111002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x1, 0x0) r2 = accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfffffdfd) 12:26:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r0}], 0x1, 0x0, 0x0, 0x0) 12:26:17 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:17 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Dfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) ioctl$TCXONC(r1, 0x540a, 0x7) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') 12:26:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f0000000080)=""/118, 0x76) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x8) 12:26:17 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='(&!eth0$md5sumwlan0\\selinux\x00', 0x1c, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x80000101, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140), 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:17 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='(&!eth0$md5sumwlan0\\selinux\x00', 0x1c, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x80000101, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140), 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:17 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x800) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e21, @empty}}, 0x20, 0xa213, 0x2, "8886d32a6dbe17dc1872af49fd32e58f22d50d1aa9864ea820d33498b1725b4c1160e98b7c13154196b1711b2e2463f525e1cac3fbb2e155ad5dc1a716dd2b27b0379cc457f77df7bf84957e6c2ab332"}, 0xd8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={"00ac730000000000ec973f820f7c4000", 0x400}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x3) 12:26:18 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:18 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='hfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000100)={0xb5, &(0x7f0000000040)="0eab621a4b60028297ad9be3c913992d3ec935c52d8dadb8bbd798d3796bb15b97320b2eebb7d7594d77569fca47ded43d2fe12a13caac228c2bda78a51d23412c6953b1aa1fbc128d83b0abd927626c1df060eb5681dc9f2276d662d937be63da5451adfbc3b0385f0dadcd9d85e53dcedc1ec903e183ebcda064dc77a6d90db96c3edc494d47f909cafb58928f871c5a4a8a527e9617e848005a9157d99067723db4a4b6b356583b400ecc1ce189209ddf0cd1dc"}) 12:26:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0xfffd, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x0, 0x8, 0x863c}, 0x10) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140)=0x7, 0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) 12:26:18 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='(&!eth0$md5sumwlan0\\selinux\x00', 0x1c, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x80000101, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140), 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x200, 0x100) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x724cdaea, "1102ed28485c630463ba6bcf392c40fa5f65b387e0cd427e92075a772f037f74", 0x2, 0x0, 0x4, 0x3001700, 0x424, 0x2}) 12:26:18 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454cc, 0x0) 12:26:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0x9, 0x400, 0x5, 0x104}) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f00000000c0)=0x30, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x10001, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x6, r2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) 12:26:18 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x30041, 0x0) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="60ebf8e3528990cbc1cf3e270264c174ef6bf35042d8abbf2ee2351ed8e7ff6d67e31dc9f6dfc7fa0f6dca5b2eece55402dbce2b78ed477c72e434d3ab93363ca95183cde3750bdd9234a7b177b1e29f5bdfc237576f45f5cb7cba34669604a5fd9e3389934c1794c0d483c661f461d82b1958966840ca45c3fae65e7834954e999b185b1c65477408d568a10319813e5f2aadf96751b85ada8178413e47ef2cb7958d44682052757dac1bccb2a7376fdf2e974946c9a63a9b33bd9de6b4e97bce0dc6ac9329d817ac8af1675677b56436f24b264785372ab0d08763b7583a164df944ed538c4363b4b386415f79ce", 0xef}, {&(0x7f0000000140)="71025426bae77e306657ffd9b9f715096ed3587cdd3c031f99fe0bee140808b3561c9a5289604ff7c06e8eba2a8052c1dcd34e75720c003782f5c220bdf1f6edb64737b5f6a412821c145961d17577d7e9e8d7fe3cf09c4619cd841eef834e093a0f49f78a357443a5c2df9c15d7c43da985330a519ba3293d614a44c12b56353af8e08aca0e54456902338ba8940002f579ac", 0x93}, {&(0x7f0000000280)="9f8a5c93f0cacad196252578b6a4a1b38d51324d168988bcf7d23ae2e9f40ac3338068699f2ece18b5682a62dfbeae974b7b3ebb80a9d451bb0c45ac10203eb39144c6b91a362292320e055935da9b", 0x4f}, {&(0x7f0000000200)="dd64548b7361617f", 0x8}], 0x4, &(0x7f0000000340)=[@iv={0x40, 0x117, 0x2, 0x28, "30f23af3e0ab4271963cd1e3483edb1fbd3978e779cb5763b1d20ab8c2f7eb5dce53c497f2b52f98"}], 0x40, 0x4000000}], 0x1, 0xc1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x100000001, 0x6, 0x8, 0x3, 0x5}) write$FUSE_LK(r1, &(0x7f0000000400)={0x28, 0x0, 0x5, {{0x10001, 0x100000001, 0x2, r2}}}, 0x28) ftruncate(r0, 0x1ee00000) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) 12:26:18 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='rfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:18 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:19 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) bind$inet6(r1, &(0x7f0000000040), 0x1c) quotactl(0x80000101, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) msgget(0x0, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x210}) 12:26:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x113, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{}, {0x20, ',!{!\'wlan1wlan0em1}user%self^$'}, {0x20, '/dev/net/tun\x00'}, {}, {}, {0x20, '/dev/net/tun\x00'}], 0xa, "2b6cd42d200a6fb7e0acfd8ce69937152a6153ed4738ee4f51097cf15f31ce78826997495217b6f0062689fa283385a2368a9bff34a458bd97ef91b3cacb5eb9111582b5539176ce"}, 0x91) 12:26:19 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:19 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x3ff, 0x800000000000023c, [0x200, 0x3]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r1, 0x9}, &(0x7f00000001c0)=0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x3) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa4a80, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000080)={0x1, r4}) 12:26:19 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Gfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x0, [], [{0x4, 0x3, 0x5, 0x3, 0x3f}, {0x73, 0x10001, 0x100000000, 0x3f, 0x10000, 0x1}], [[], [], [], [], [], [], [], [], []]}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet6_int(r1, 0x29, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:26:19 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) bind$inet6(r1, &(0x7f0000000040), 0x1c) quotactl(0x80000101, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x18) 12:26:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xbd5, 0x101b80) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000040)=0x7) 12:26:19 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 12:26:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x800000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"64000000000a37b9106e82d76800", 0x20000000001000}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x81) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x5, 0x2, 0x3800000000, 0x4}, {0x1, 0xcf1, 0x0, 0x80000000}, {0x0, 0x5, 0x5e8, 0x8000}, {0x3f, 0x4, 0x8001, 0xc7a}]}) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000080)={'syz_tun\x00', 0x6}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'syzkaller0\x00', 0x600}) 12:26:19 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 12:26:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"00ac730000000000ec973f820f7c4000", 0x1000000000c201}) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x7fffc) 12:26:20 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='xfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:20 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 12:26:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:20 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x181000, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xfff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0xffffffff, 0x9, 0x0, 0x100000000, 0x80000000, 0x1, 0x3, 0x47, 0x9, 0x1, 0xf6}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r1, 0x400454cc, 0x0) 12:26:20 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") 12:26:20 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") 12:26:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40800, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x6, 0xffffffffffffffff, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0xfe, 0x3, &(0x7f00000000c0)=0x7}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000040)={0x7a, 0x95}, 0x2) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 12:26:20 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x410100, 0x0) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x6, {0x7, 0x1c, 0x4f4, 0x1, 0x10000, 0x8, 0x2, 0x6}}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) open_by_handle_at(r0, &(0x7f0000000000)={0x25, 0x6, "0cec99d6e2bdeead57b1f3f88d3ffd4a87862850bf33d431387b814cf8"}, 0x8000) ioctl$TUNSETOFFLOAD(r0, 0x400454cc, 0xfffffffffffffffe) 12:26:20 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Cfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:20 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x800, 0x3, 0x7ff, 0x2759, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x4, 0x30}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @empty}}, 0xfff, 0x1ff, 0x3, 0x8001, 0x4}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000005c0)={0x0, 0x7ff, 0x30}, &(0x7f0000000600)=0xc) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f00000001c0)=@in6={0xa, 0x4e24, 0x80000001, @ipv4={[], [], @multicast1}, 0x92fc}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000280)="61206c7a950c47856e67e07a476d6d9d94db43dbd0bb245d28fa6b0233578f1b71e0521b45c158347ccffff9496e1c1e6f539fb8513a63bd64bb6b37025621be5242795b88f0cdce1e0310b746748f8297ef83a923b90e4c8824ea3b9d493af5c8febcf9c0aed8af3031e93bcceeb37a7a9c10bb9d28419381d5b86baf7a0313ec202720efd4eaebdd295d7fe49d24b7a4590c5c0da6546c4948efbabd2644d9b20ea305fedcbb2ce16118e1a1c52c949d8c794add92b539e579b9b418e2b7e04c2477de78145d8a9c079691fd0da00cc3869d7036c790d4dd29d228fc81bce1e9c57ecaaa13f0ee19f1976885", 0xed}, {&(0x7f0000000380)="42db472eb73b5b30810c96507a0f9c0b72f78817e07ed01e1d1cb137b8c97d6c8624b829b87e10cf8c8a609ba40f7834236c1e66df35d3cd98e8788a471859a301a534af12d653273e5ed28a80441a8da7b7d6a94329b553fe82c858d1d839dfac00992a4e807d0ccc688a97df9634c3", 0x70}, {&(0x7f0000000200)="ff2a6fb13dd47c0489d12508301d7343777494948055a12519fda674cd3a14eafd5025dfa8f2cdfe", 0x28}], 0x3, &(0x7f0000000640)=[@sndinfo={0x20, 0x84, 0x2, {0x4b8, 0x2, 0x401, 0x1f, r1}}, @authinfo={0x18, 0x84, 0x6, {0xff}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x8, 0x2, 0x6a, r2}}, @sndinfo={0x20, 0x84, 0x2, {0x800000, 0x8005, 0x9, 0x7, r3}}], 0xa8, 0x4}, 0x1) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x20) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0xefd, {0x2, 0x4e24, @local}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}, {0x2, 0x4e24, @empty}, 0x80, 0x6, 0xcdc6, 0x1, 0x0, &(0x7f00000000c0)='ip6gretap0\x00', 0x100000000, 0x101, 0x3}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={"00ac730000000000ec973f820f7c4000", 0xc202}) 12:26:20 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) 12:26:20 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 12:26:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)='keyring!!mime_typesecuritynodevsystemem0\x00', 0xffffffffffffffff}, 0x30) rt_tgsigqueueinfo(r1, r2, 0x12, &(0x7f00000000c0)={0x25, 0xfffffffffffffff7, 0x1, 0x7}) [ 310.451387] QAT: Invalid ioctl [ 310.458160] QAT: Invalid ioctl [ 310.469378] QAT: Invalid ioctl [ 310.483817] QAT: Invalid ioctl [ 310.487570] QAT: Invalid ioctl [ 310.491568] QAT: Invalid ioctl 12:26:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001fbc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000440)=0x1e) 12:26:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') connect$netlink(r0, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x100408}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETOFFLOAD(r1, 0x400454cc, 0x0) 12:26:21 executing program 2: syz_mount_image$gfs2(&(0x7f00000009c0)='Rfs2\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:26:21 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='(&!eth0$md5sumwlan0\\selinux\x00', 0x1c, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) quotactl(0x80000101, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2") fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140), 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) 12:26:21 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) quotactl(0x0, 0x0, 0x0, &(0x7f0000000800)="b0b7ce5f7306f09d87f79f3da10be46adc4548d6d65c0a766419473f8070b61810d50d63bf38fa2efd0264842f067259e6bc8d9c4b949b981077b2bb960891970b8167619bdb1ea2d7ef5edce8a0d8f6a770d4edf3b6a68f8e8f87b79ff8b6931ad85409daf2a658a2aa2214a441001c68103274b6126ac5e23624f7db096f94ea0ce4e0a4fd") 12:26:21 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) setxattr(0x0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 310.846521] ------------[ cut here ]------------ [ 310.851316] DEBUG_LOCKS_WARN_ON(depth <= 0) [ 310.851472] WARNING: CPU: 0 PID: 11799 at kernel/locking/lockdep.c:3595 lock_release+0x740/0xa10 [ 310.864705] Kernel panic - not syncing: panic_on_warn set ... [ 310.867993] kobject: 'integrity' (00000000e8303cb8): kobject_uevent_env [ 310.870599] CPU: 0 PID: 11799 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 310.870610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.870614] Call Trace: [ 310.870635] dump_stack+0x244/0x39d [ 310.870654] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.870775] panic+0x2ad/0x55c [ 310.870798] ? add_taint.cold.5+0x16/0x16 [ 310.877706] kobject: 'integrity' (00000000e8303cb8): kobject_uevent_env: filter function caused the event to drop! [ 310.886123] ? __warn.cold.8+0x5/0x45 [ 310.886141] ? lock_release+0x740/0xa10 [ 310.886155] __warn.cold.8+0x20/0x45 [ 310.886170] ? lock_release+0x740/0xa10 [ 310.886184] report_bug+0x254/0x2d0 [ 310.886206] do_error_trap+0x11b/0x200 [ 310.897635] kobject: 'integrity' (00000000e8303cb8): kobject_cleanup, parent (null) [ 310.898119] do_invalid_op+0x36/0x40 [ 310.898134] ? lock_release+0x740/0xa10 [ 310.898150] invalid_op+0x14/0x20 [ 310.898169] RIP: 0010:lock_release+0x740/0xa10 [ 310.902226] kobject: 'integrity' (00000000e8303cb8): does not have a release() function, it is broken and must be fixed. [ 310.906975] Code: 03 38 d0 7c 08 84 d2 0f 85 da 02 00 00 8b 35 a7 95 b3 08 85 f6 75 15 48 c7 c6 20 66 2b 88 48 c7 c7 c0 33 2b 88 e8 10 36 e7 ff <0f> 0b 48 8b 95 e8 fe ff ff 4c 89 f7 48 8b b5 f0 fe ff ff e8 e8 58 [ 310.906983] RSP: 0018:ffff8801c021f868 EFLAGS: 00010086 [ 310.906994] RAX: 0000000000000000 RBX: 1ffff10038043f12 RCX: ffffc90005ddd000 [ 310.907002] RDX: 0000000000006c8c RSI: ffffffff8165ba15 RDI: 0000000000000006 [ 310.907010] RBP: ffff8801c021f998 R08: ffff8801bf86a700 R09: fffffbfff12b2254 [ 310.907030] R10: fffffbfff12b2254 R11: ffffffff895912a3 R12: ffffffff8b0e27a0 [ 310.910694] kobject: 'integrity': free name [ 310.914347] R13: ffff8801c021f970 R14: ffff8801bf86a700 R15: ffff8801c021f8b0 [ 310.914367] ? vprintk_func+0x85/0x181 [ 310.914383] ? lock_release+0x740/0xa10 [ 310.914400] ? loop_control_ioctl+0xf5/0x4e0 [ 310.914415] ? lock_downgrade+0x900/0x900 [ 310.914448] ? __radix_tree_lookup+0x3a7/0x500 [ 311.068683] ? radix_tree_insert+0x870/0x870 [ 311.073103] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 311.077703] ? retint_kernel+0x2d/0x2d [ 311.081596] __mutex_unlock_slowpath+0x102/0x8c0 [ 311.086342] ? __fget+0x4aa/0x740 [ 311.089781] ? wait_for_completion+0x8a0/0x8a0 [ 311.094359] ? radix_tree_lookup+0x21/0x30 [ 311.098585] ? idr_find+0x44/0x50 [ 311.102022] ? loop_lookup+0x105/0x230 [ 311.105890] ? loop_exit_cb+0x20/0x20 [ 311.109681] ? loop_control_ioctl+0xab/0x4e0 [ 311.114081] mutex_unlock+0xd/0x10 [ 311.117610] loop_control_ioctl+0xf5/0x4e0 [ 311.121838] ? loop_add+0xa20/0xa20 [ 311.125452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 311.130207] ? loop_add+0xa20/0xa20 [ 311.133847] do_vfs_ioctl+0x1de/0x1790 [ 311.137718] ? ioctl_preallocate+0x300/0x300 [ 311.142105] ? __fget_light+0x2e9/0x430 [ 311.146067] ? fget_raw+0x20/0x20 [ 311.149506] ? _copy_to_user+0xc8/0x110 [ 311.153478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.159002] ? put_timespec64+0x10f/0x1b0 [ 311.163132] ? nsecs_to_jiffies+0x30/0x30 [ 311.167277] ? do_syscall_64+0x9a/0x820 [ 311.171264] ? do_syscall_64+0x9a/0x820 [ 311.175245] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 311.179828] ? security_file_ioctl+0x94/0xc0 [ 311.184222] ksys_ioctl+0xa9/0xd0 [ 311.187681] __x64_sys_ioctl+0x73/0xb0 [ 311.191553] do_syscall_64+0x1b9/0x820 [ 311.195443] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.200811] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.205737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.210576] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.215629] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.220642] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.225679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.230514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.235695] RIP: 0033:0x457569 [ 311.238884] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.257790] RSP: 002b:00007f220808ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.265503] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 311.272767] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 311.280032] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.287321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f220808f6d4 [ 311.294586] R13: 00000000004c06f1 R14: 00000000004d1028 R15: 00000000ffffffff [ 311.302938] Kernel Offset: disabled [ 311.306604] Rebooting in 86400 seconds..